Android Security & Exploitation
Android devices now make up more than half of the mobile phone market. Android is made available on a variety of hardware (both smart phones and tablets) by many manufacturers, and on a variety of cellular networks. These variables can make securing these devices a challenge. This class was developed with the goal of teaching the foundations and security principals as they apply to the Android mobile operating system.
More than a development class, this course teaches how to deploy mobile devices into an environment safely and securely. The course is a combination of lecture and lab, with exercises in each area of study. All equipment is supplied.
This course will teach which software tools (open source, freeware and low cost) to add to your toolbox, the advantages and disadvantages of rooting a device, and how the SD Card plays an important role in the security of the Android device. This course also covers development of applications, specifically social media apps using Eclipse and Java.
- The Stack
- Main Building Blocks
- Yamba Project overview
- Android User Interface
- Preferences, Filesystem, Options Menus and Intents
- The Database
- List Send Adapters
- Broadcast Receivers
- Content Providers
- System Services
- The Android Interface Definition Language (a IDL)
- Android Hacking Basics
- Advanced Android Forensics
- Android Network Hacks
- Scenario Day
Familiarity with computer operating systems and TCP/IP networking; some computer programming experience; experience using Andoid (e.g. phone or tablet) devices.
E-mail firstname.lastname@example.org or call (443) 692-6599:
- if you have any questions about this course,
- to be notified when this course and any closely related courses are scheduled for open enrollment,
- to request a quote for group training at your location or ours.