HOME > Development > Android Hacking And Penetration Testing

Android Hacking And Penetration Testing

  • Development
  • Mar 18, 2025
SynopsisAndroid Hacking And Penetration Testing , available at $19.99...
Android Hacking And Penetration Testing  No.1

Android Hacking And Penetration Testing , available at $19.99, has an average rating of 3.6, with 62 lectures, based on 119 reviews, and has 2406 subscribers.

You will learn about By the end of the course , You will learn How to Fuzz applications By the end of the course, students will be able to understand the internals of android and its security They will be able to pentest android apps in an efficient way By the end of the course, you will learn how to carryout man in the middle attacks in real world They will be in a position to perform real world attacks on Android Devices and Apps By the end of the course , You will undertsand the internals of Android App Reversing and Malware Analysis This course is ideal for individuals who are Students or Pen testers or Developers or Security enthusiasts It is particularly useful for Students or Pen testers or Developers or Security enthusiasts.

Enroll now: Android Hacking And Penetration Testing

Summary

Title: Android Hacking And Penetration Testing

Price: $19.99

Average Rating: 3.6

Number of Lectures: 62

Number of Published Lectures: 62

Number of Curriculum Items: 62

Number of Published Curriculum Objects: 62

Original Price: $79.99

Quality Status: approved

Status: Live

What You Will Learn

  • By the end of the course , You will learn How to Fuzz applications
  • By the end of the course, students will be able to understand the internals of android and its security
  • They will be able to pentest android apps in an efficient way
  • By the end of the course, you will learn how to carryout man in the middle attacks in real world
  • They will be in a position to perform real world attacks on Android Devices and Apps
  • By the end of the course , You will undertsand the internals of Android App Reversing and Malware Analysis
  • Who Should Attend

  • Students
  • Pen testers
  • Developers
  • Security enthusiasts
  • Target Audiences

  • Students
  • Pen testers
  • Developers
  • Security enthusiasts
  • Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications

    Course Instructors :-

    Srinivas

    Srinivas is one of the Founders of JSinfosec. He is a Cyber Security Enthusiast, writer and a Speaker. He is one the coauthors of the book Hacking S3rets, He is an active member of Null Hyderabad. His area of Interests Include Web Application Pentesting, Android application Fuzzing and Pentesting.

    John
    John is one of the founders of JSinfosec. He is an Infosec researcher, Freelance Pen tester and a blogger. He has more than 5 Years of experience in the field of Information Security. His area of Interests Include Wireless Security and Penetration Testing, Android Security & Forensics

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction To The Course

    Lecture 2: About the Instructors

    Lecture 3: Course Instructions

    Lecture 4: Need For Mobile Security And Owasp Top 10 Mobile Risks

    Chapter 2: Lab Setup For The Course

    Lecture 1: Lab Setup

    Lecture 2: Installing Ubuntu On VMware

    Lecture 3: Setting Up An Android Pen-testing Environment on Ubuntu

    Chapter 3: Getting Familiar With Android Developer Tools

    Lecture 1: Eclipse IDE

    Lecture 2: Android Debug Bridge

    Chapter 4: Android Architecture And Security Model

    Lecture 1: A Brief Intro to Android

    Lecture 2: Android booting process

    Lecture 3: Androids Architecture

    Lecture 4: Android Data Structures and File Systems

    Lecture 5: Android Apps

    Lecture 6: Android Security Model

    Lecture 7: Android Permissions

    Lecture 8: Google Bouncer

    Chapter 5: Interacting With an Android Device

    Lecture 1: Difference Between Android Emulator & Android Device

    Lecture 2: Interacting With Android device Via Usb

    Lecture 3: All About Rooting

    Lecture 4: SSH

    Lecture 5: VNC

    Lecture 6: Busy Box

    Chapter 6: Android Network Analysis

    Lecture 1: Setting Up A Proxy for Android Emulator

    Lecture 2: Setting Up A Proxy for Android Device

    Lecture 3: Installing CA certificate

    Lecture 4: Real World MITM and SSL MITM Attacks Part-1

    Lecture 5: Real World MITM and SSL MITM Attacks Part -2

    Lecture 6: Data Manipulation

    Chapter 7: Android Reversing and Malware Analysis

    Lecture 1: Apk files in a nutshell

    Lecture 2: Introduction to Reverse Engineering

    Lecture 3: Reversing to get Source Code of Android Apps

    Lecture 4: Reverse Engineering with APKTOOL

    Lecture 5: Introduction to Android Malwares

    Lecture 6: Dynamic Vs Static Analysis

    Lecture 7: Static analysis of Android Malwares

    Lecture 8: Dynamic analysis of Android Malwares

    Lecture 9: Introduction to Android Tamer

    Lecture 10: Dynamic Analysis with DroidBox

    Chapter 8: Android Application Pen testing and Exploitation

    Lecture 1: Installing JSinfosec Vulnerable Apps

    Lecture 2: Introduction to Android App pentesting

    Lecture 3: Fuzzing Android Apps with Burp – Proxy

    Lecture 4: Fuzzing Android Apps with Burp – Intruder

    Lecture 5: Attacking Authentication

    Lecture 6: Content Provider Leakage

    Lecture 7: Client Side Injection

    Lecture 8: Insecure Data Storage – Shared Preferences

    Lecture 9: Insecure Data Storage – SQLite Databases

    Lecture 10: Unintended Data Leakage

    Lecture 11: Broken Cryptography

    Lecture 12: Automated Security Assessments with Drozer

    Lecture 13: Exploiting Android Devices Using Metasploit

    Chapter 9: Android Device And Data Security

    Lecture 1: Android Device Protection

    Lecture 2: Bypassing Android Locks

    Lecture 3: Android Data Extraction

    Chapter 10: Using Android as a Pen testing Platform

    Lecture 1: A Look Into Commonly Used Pen testing and Hacking Apps

    Lecture 2: PWN Pad on Nexus 7

    Lecture 3: Kali Linux on Android

    Chapter 11: Conclusion And Road Ahead

    Lecture 1: Mobile Pen-testing Check List

    Lecture 2: Android Security Practices

    Lecture 3: Course Summary And Revision

    Lecture 4: Conclusion

    Instructors

  • Android Hacking And Penetration Testing  No.2
    Js Infosec
    Next-Gen Information Security Training
  • Rating Distribution

  • 1 stars: 15 votes
  • 2 stars: 9 votes
  • 3 stars: 29 votes
  • 4 stars: 34 votes
  • 5 stars: 32 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!