Android Security & Exploitation
Android devices now make up more than half of the mobile phone market. Android is made available on a variety of hardware (both smart phones and tablets) by many manufacturers, and on a variety of cellular networks. These variables can make securing these devices a challenge. This class was developed with the goal of teaching the foundations and security principals as they apply to the Android mobile operating system.
More than a development class, this course teaches how to deploy mobile devices into an environment safely and securely. The course is a combination of lecture and lab, with exercises in each area of study. All equipment is supplied.
This course will teach which software tools (open source, freeware and low cost) to add to your toolbox, the advantages and disadvantages of rooting a device, and how the SD Card plays an important role in the security of the Android device. This course also covers development of applications, specifically social media apps using Eclipse and Java.
Topics covered include:
- The Stack
- Installing Custom Roms
- Android File System Access and Structure
- Main Building Blocks
- Programming in Android Overview
- Pirates of the Amason
- Call of Android: Mobile Enterprise Warfare
- The Trolling Android
- Attacking Android
- Advanced Android Forensics
Familiarity with computer operating systems and TCP/IP networking; some computer programming experience; experience using Andoid (e.g. phone or tablet) devices.
3 Days (an extended 5 day class is also available)
E-mail email@example.com or call (443) 692-6599:
- if you have any questions about this course,
- to be notified when this course and any closely related courses are scheduled for open enrollment,
- to request a quote for group training at your location or ours.