Course Overview

Mobile devices have become part of our daily life and routine. Their use tremendously increased over the last couple of years, so that they have become ubiquitous. Given this fact, the number of malicious mobile applications is tremendously increasing. If you work in cybersecurity, it is imperative to expand your skillset on how to understand and analyze mobile malware. 

This course will be your go-to guide on how to reverse engineer Android mobile applications and understand its components. We will begin with a quick introduction on Android security, then we will setup our Kali lab with all the necessary tools, then learn about major mobile attack vectors before getting hands on with actually decompiling and decoding APK files in order to perform static analysis. We will wrap up the course by performing dynamic analysis. The android applications used in this course have live malware, nothing is theoretical! 

By the end of the course, you will be confident to utilize Kali tools to spot any data exfiltration or malicious behavior of Android applications. 

What You Will Learn

  • Perform static malware analysis
  • Perform dynamic malware analysis
  • Detect malicious and data exfiltration code
  • Reverse engineer APKs
  • Understand Android security architecture
  • Understand Android attack surface

Program Curriculum

  • Why Android?
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Android Platform
  • Android Security Architecture
  • Android Security Features
  • Google Security Features
  • Chapter 2 Quiz

  • Android Application Anatomy
  • APK File Structure
  • DEX File
  • Chapter 3 Quiz

  • Mobile Malware Types
  • Chapter 4 Quiz

  • Attack Tools Explained
  • Setup Your Kali Lab
  • Chapter 5 Quiz

  • Malware Distribution Mechanism
  • Acquire Malicious Mobile Apps
  • Create a Malicious Mobile App
  • Extract a Mobile App from a Phone
  • Chapter 6 Quiz

  • Static vs. Dynamic Malware Analysis
  • Chapter 7 Quiz

  • Unzip vs. Decode
  • Decode and Decompile Android Apps
  • Chapter 8 Quiz

  • Keyword Search Techniques
  • Dangerous Permissions
  • Analysis of a Spyware APK
  • Analysis of a Stalkware APK
  • Analysis of a Trojan APK
  • Chapter 9 Quiz

  • Inject WhatsApp Application with Malware
  • Inject a Legit APK and Analyze It
  • Chapter 10 Quiz

  • Download and Setup an Emulator
  • Dynamic Analysis
  • SSL Interception
  • Chapter 11 Quiz
Load more modules

Instructor

Mohamad Mahjoub

Mohamad Mahjoub is a highly accomplished author, trainer, speaker, and esteemed expert in the field of cyber security. Holding a prestigious array of licenses and certifications, including CISSP, ISO 27005 Risk Manager, ISO 27001 Lead Implementer, CISA, PMP, ITIL, and Data Protection Officer (GDPR), he brings a wealth of knowledge and experience to the realm of information security. Mohamad earned his Master's Degree in Computer Science with magna cum laude distinction from the Lebanese American University, a testament to his dedication to academic excellence. He is notably recognized as the author of the influential book "Ethical Hacking with Kali and More" and has been a featured speaker at prominent cyber security events. With an unwavering commitment to professionalism, Mohamad leverages his extensive training and certifications to provide expert cyber security services to both individuals and organizations. Since 2012, he has conducted numerous cyber security courses and seminars, catering to a diverse audience, including recent graduates, IT professionals, senior executives, and business owners. Additionally, he has reached a global audience through his multilingual online cyber security courses, boasting an enrolment of over 100,000 students worldwide. Currently serving as the Chief Information Security Officer (CISO) for a multinational corporation, Mohamad oversees the security of IT and OT operations across the Middle East region. With a remarkable 17-year career in the field of cyber security, he has earned a reputation as a trusted authority, consistently achieving success in the domain. In an era dominated by pervasive technology, Mohamad's steadfast belief underscores the critical importance of cyber security in safeguarding our digital world.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8