Careertail
About UsCoursesCareer PathsBlogOpportunities
Log In
Courses>Network & Security>Learn Reverse Engineering By Taking Apart Android Games
IT & SoftwareLearn Reverse Engineering By Taking Apart Android Games
Price:Paid
Length:1 hour
Content type:video
level:beginner
Updated:04 March 2024
Published:21 August 2022
Similar courses
Opportunities
Courses>Network & Security>Learn Reverse Engineering By Taking Apart Android Games
Learn Reverse Engineering By Taking Apart Android Games
4.9 (2.2k)
1 hour
2175 students
What you will learn
1Learn how Android applications are developed
2Learn how to reverse engineer Android applications and games
3Learn how to patch and dynamically instrument Android applications for security testing
4Develop your skills with challenges that will assess your understanding through the course
Target audiences
1People with a foundation knowledge in computing that want to develop their skills in offensive security, vulnerability research, and reverse engineering
2People who are interested in how Android and Android games work
Requirements
1A foundation knowledge of computing - including how to download and install tools, how to use a command line interface, and experience with a programming language such as Python.
2An understanding of what Android is and how Android games are used by end users.
FAQ
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
Description

About The Course:

During this course you'll develop the skills required to reverse engineer Android games and applications, statically and dynamically modify those applications, and develop simple proof of concept applications.

By the end of this course you'll be able to create simple Android applications, reverse engineer your own and the applications of others, and modify these applications both statically and dynamically.

There are several quiz and assignment style challenges through the course designed to support your learning and provide practical learning opportunities.

This course will teach you all you need to know about Android reverse engineering, however, it is advised to come into this course with an already existing knowledge of programming and computational skills (such as using a CLI and computational thinking).


About The Author:

James Stevenson has been working in the programming and computer security industry for over 5 years, and for most of that has been working as an Android software engineer and vulnerability researcher. Prior to this, James graduated with a BSc in computer security in 2017. James has featured articles on both personal websites and industry platforms such as Infosecurity Magazine - covering topics from security principles to android programming and security to cyber terrorism. James is a full-time security researcher, part-time PhD student, and occasional conference speaker. Outside of Android internals, James’ research has also focused on offender profiling and cybercrime detection capabilities.

Similar courses
Opportunities
Make the most out of your online education
Careertail
Copyright © 2021 Careertail.
All rights reserved
Quick Links
Get StartedLog InAbout UsCourses
Company
BlogContactsPrivacy PolicyCookie PolicyTerms and Conditions
Stay up to date
Trustpilot
Careertail
Courses>Network & Security>Learn Reverse Engineering By Taking Apart Android Games
IT & SoftwareLearn Reverse Engineering By Taking Apart Android Games
Price:Paid
Length:1 hour
Content type:video
level:beginner
Updated:04 March 2024
Published:21 August 2022
Similar courses
Opportunities
Courses>Network & Security>Learn Reverse Engineering By Taking Apart Android Games
Learn Reverse Engineering By Taking Apart Android Games
4.9 (2.2k)
1 hour
2175 students
What you will learn
1Learn how Android applications are developed
2Learn how to reverse engineer Android applications and games
3Learn how to patch and dynamically instrument Android applications for security testing
4Develop your skills with challenges that will assess your understanding through the course
Target audiences
1People with a foundation knowledge in computing that want to develop their skills in offensive security, vulnerability research, and reverse engineering
2People who are interested in how Android and Android games work
Requirements
1A foundation knowledge of computing - including how to download and install tools, how to use a command line interface, and experience with a programming language such as Python.
2An understanding of what Android is and how Android games are used by end users.
FAQ
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
Description

About The Course:

During this course you'll develop the skills required to reverse engineer Android games and applications, statically and dynamically modify those applications, and develop simple proof of concept applications.

By the end of this course you'll be able to create simple Android applications, reverse engineer your own and the applications of others, and modify these applications both statically and dynamically.

There are several quiz and assignment style challenges through the course designed to support your learning and provide practical learning opportunities.

This course will teach you all you need to know about Android reverse engineering, however, it is advised to come into this course with an already existing knowledge of programming and computational skills (such as using a CLI and computational thinking).


About The Author:

James Stevenson has been working in the programming and computer security industry for over 5 years, and for most of that has been working as an Android software engineer and vulnerability researcher. Prior to this, James graduated with a BSc in computer security in 2017. James has featured articles on both personal websites and industry platforms such as Infosecurity Magazine - covering topics from security principles to android programming and security to cyber terrorism. James is a full-time security researcher, part-time PhD student, and occasional conference speaker. Outside of Android internals, James’ research has also focused on offender profiling and cybercrime detection capabilities.

Similar courses
Opportunities
Make the most out of your online education
Careertail
Copyright © 2021 Careertail.
All rights reserved
Quick Links
Get StartedLog InAbout UsCourses
Company
BlogContactsPrivacy PolicyCookie PolicyTerms and Conditions
Stay up to date
Trustpilot