We may earn an affiliate commission when you visit our partners.
Course image
droidcon NYC
In this talk, Jeb Ware walks through the APIs that expose your resources, shows how to put them into action, and demonstrates how to inspect and even execute another app's code. You will gain a better understanding of what is and is not protected by the...
Read more
In this talk, Jeb Ware walks through the APIs that expose your resources, shows how to put them into action, and demonstrates how to inspect and even execute another app's code. You will gain a better understanding of what is and is not protected by the Android Application Sandbox, and which parts of your app are freely available for reverse-engineering.
Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores topics that are highly relevant to Android application security and app building in general
Taught by droidcon NYC, who are recognized for their work in Android app development
Helps learners gain a deeper understanding of the Android Application Sandbox
Develops practical skills and knowledge in inspecting and executing code
May require students to have some background knowledge in Android app development
May be more relevant for intermediate learners

Save this course

Save droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go? to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go?. These are activities you can do either before, during, or after a course.

Career center

Learners who complete droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go? will develop knowledge and skills that may be useful to these careers:
Mobile Application Developer
Mobile Application Developers are in charge of the design, development, and deployment of mobile apps. This course can help aspiring and current Mobile Application Developers to learn how to analyze and reverse app behaviors on Android. This would allow them to debug other applications, create new apps based off existing ones, and identify security and privacy concerns in apps.
Security Engineer
Security Engineers implement and configure security controls to protect an organization's infrastructure and data from unauthorized access and attacks. This course may be useful for Security Engineers who wish to develop a specialized focus in mobile security.
Software Developer
Software Developers use programming languages and software development tools to create and maintain software applications. This course may be useful for Software Developers who wish to move into the field of mobile application development.
Information Security Analyst
Information Security Analysts are responsible for identifying and mitigating security risks to an organization's information assets. This course may be useful for Information Security Analysts who wish to learn more about mobile application security.
Database Administrator
Database Administrators are responsible for the maintenance and security of an organization's databases. This course may be useful for Database Administrators who wish to understand how to protect sensitive data stored in mobile apps.
System Administrator
System Administrators are responsible for the maintenance and security of an organization's computer systems. This course may be useful for System Administrators who wish to learn more about mobile device management.
Computer Systems Analyst
Computer Systems Analysts study an organization's computer systems and procedures, and recommend ways to improve them. This course may be useful for Computer Systems Analysts who wish to learn more about mobile application development.
Information Systems Manager
Information Systems Managers are responsible for the management and security of an organization's information systems. This course may be useful for Information Systems Managers who wish to learn more about mobile application development.
Computer Network Architect
Computer Network Architects design and build computer networks for organizations. This course may be useful for Computer Network Architects who wish to learn more about mobile application development.
Data Scientist
Data Scientists collect and analyze data to identify patterns and trends. This course may be useful for Data Scientists who wish to learn more about mobile application development.
Technical Architect
Technical Architects design and build the technical infrastructure of an organization. This course may be useful for Technical Architects who wish to learn more about mobile application development.
Information Technology Specialist
Information Technology Specialists are responsible for managing and supporting the technology needs of an organization. This course may be useful for Information Technology Specialists who wish to learn more about mobile application development.
Computer Hardware Engineer
Computer Hardware Engineers design and develop computer hardware for organizations. This course may be useful for Computer Hardware Engineers who wish to learn more about mobile application development.
Technical Writer
Technical Writers create and maintain user documentation for software and other technical products. This course may be useful for Technical Writers who wish to learn more about mobile application development.
Computer Support Specialist
Computer Support Specialists provide technical support to users of computer systems. This course may be useful for Computer Support Specialists who wish to learn more about mobile application development.

Reading list

We've selected three books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go?.
Provides a deep dive into the security features of the Android platform. It covers topics such as the Android security model, application sandboxing, and security vulnerabilities.
Provides a comprehensive guide to Android hacking. It covers topics such as rooting, exploit development, and malware analysis.
Provides a comprehensive introduction to reverse engineering. It covers topics such as disassembly, debugging, and binary analysis.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser