
“Because in this course we are heavily dependent on mastering software reverse engineering, we provide separate chapters for both software reverse engineering and Android malware analysis.”
🥁 The review and introduction video of the “Android Malware Analysis” face-to-face course taught by “Mohammad Hossein Ashfete-Yazdi” was released. On the academy website, you can watch this video in full and register online.
🔗 ravinacademy.com/courses/android-malware-analysis/
🕘 54 hours
🗓 from Thursday, September 30 (during 6 sessions of 9 hours, on Thursdays and Fridays from 9:00 to 18:00)
📣 This course will only be attended and the video of the content of the sessions will not be recorded.
✅ It is possible to register in installments for this course, and you can contact Ravin Academy’s training unit to get more information and to use installment payment conditions according to your ability.
▫️ Communication with the education office of Ravin Academy for registration:
☎️ Contact number: 021-91693023 (extension 1)
Ravin Academy
in person
About this course
Cyber attacks are increasing rapidly, and to combat them, security analysts need to use new and updated methods to detect malicious programs and take necessary precautions. Considering that mobile phones have become an inseparable part of our daily lives, in this regard, the Android Malware Analysis course is considered one of the most important courses in the field of cyber security. Of course, this course is not only about checking malware. The topics are arranged in such a way that you will reach a very good level in the field of reverse engineering. Learning reverse engineering by analyzing malware will definitely be much sweeter and more interesting. In this course, you will learn the techniques of analyzing malicious programs by using different tools such as decompilers, Android emulators, debugging tools, and other related tools, and you will get to know different methods for identifying and preventing cyber attacks. Also, you call the latest techniques and methods of the world in the field of attacks on the platform of the Android operating system. A large number of test software have been developed for this period, which are very similar to malware in the real environment. This topic will help you to record the learned theoretical topics in your mind by doing practical examples and gain the necessary experience. In general, this course is a very good opportunity to improve the level of knowledge of reverse engineering of Android software and also to learn advanced malware analysis. It will be in this area. The duration of this course is 54 hours, which will be held in person at Ravin Academy during 6 9-hour sessions on Thursdays and Fridays from 9:00 AM to 6:00 PM. This course will start on Thursday, September 30.
To whom is this course recommended?
Specialists interested in Android malware analysis topics
Penetration testing professionals who want to improve their reverse engineering skills
People who want to enter the world of Android device security
Android developers interested in the security of Android devices
What knowledge do I need to attend this course?
Familiarity with Android programming
Familiarity with Android penetration testing
Course topics
Open all
Reverse Engineering
Setup Environments
Developer Options
Android Debug Bridge
Android Applications Structure
Dalvik Virtual Machine
Android Application Decompiling
Android Manifest
Permissions
Activities
Intents
Broadcast receivers
Services
Content Provider
Application Signing
BlueBox key master vulnerability
Dex2jar
Jadx-GUI
Application Reverse Engineering
Introduction to Smali
SMALI Instructions IF/ELSE/GOTO
Filling Logic in SMALI
Removing SMALI Section
Jumping SMALI Section
Root Detection (Bypass)
Objects & Methods in SMALI
Static Methods in SMALI
Traffic Interception Theory in Android
How HTTPS Work?
Certificate Pinning
Certificate Pinning Bypass Methods
What is Frida?
Hooking Theory
Calling a Java Method Using Frida
Constructor Hooking
Manipulating UI Thread Using Frida
Hooking C/C++ Methods Using Frida
Overwriting C/C++ Method Using Frida
Analyzing C/C++ Library Using Ghidra
Analyzing C/C++ Library Using Cuter

You must be logged in to post a comment.