- Installing the analysis tools on Mac and Windows
- Viewing app resources
- Decompiling applications
- Analyzing permissions
- Spyware types
- Exfiltrated data, C2 servers, and strings
Skill Level Intermediate
- As mobile device use increases year over year, the number of malicious mobile applications is rising to meet this demand. If you're interested in cyber security or malware, it's imperative that your skillset expands to include this brave new platform. In this course we're going to cover the foundations of Android malware analysis, including what tools to use, where to find sample applications and where to look for malicious activity within the code base of the app. Hi, I'm Kristina Balaam, and I'm a security intelligence engineer with Lookout Mobile Security. I reverse engineer malicious mobile applications to determine how and why they're targeting our consumers. I'm excited to share these tools and skills that will enable you to dissect and detect apps that could pose a risk to you or to your organization. So please join me on my LinkedIn Learning course all about analyzing malicious Android applications.