Mar

20

2022

Learn Reverse Engineering Through Android Games

Laser 20 Mar 2022 07:06 LEARNING » e-learning - Tutorial

Learn Reverse Engineering Through Android Games
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English + srt | Duration: 11 lectures (41m) | Size: 779.7 MB

The building blocks for starting a career in offensive security by taking apart, patching, and altering Android games

Learn how Android applications are developed
Learn how to reverse eeer Android applications and games
Learn how to patch and dynamically instrument Android applications for security testing
Develop your skills with challenges that will assess your understanding through the course

A foundation knowledge of computing - including how to and install tools, how to use a command line interface, and experience with a programming language such as Python.

An understanding of what Android is and how Android games are used by end users.

About The Course
During this course you'll develop the skills required to reverse eeer Android games and applications, statically and dynamically modify those applications, and develop simple proof of concept applications.
By the end of this course you'll be able to create simple Android applications, reverse eeer your own and the applications of others, and modify these applications both statically and dynamically.
There are several Quiz and Assignment style challenges through the course designed to support your learning and provide practical learning opportunities.
This course will teach you all you need to know about Android reverse eeering, however, it is advised to come into this course with an already existing knowledge of programming and computational skills (such as using a CLI and computational thinking).
About The Author
James Stevenson has been working in the programming and computer security industry for over 5 years, and for most of that has been working as an Android software eeer and vulnerability researcher. Prior to this, James graduated with a BSc in computer security in 2017. James has featured articles on both personal websites and industry platforms such as Infosecurity Magazine - covering topics from security principles to android programming and security to cyber terrorism. James is a full- security researcher, part- PhD student, and occasional conference speaker. Outside of Android internals, James' research has also focused on offender profiling and cyberc detection capabilities.

People with a foundation knowledge in computing that want to develop their skills in offensive security, vulnerability research, and reverse eeering
People who are interested in how Android and Android games work






DOWNLOAD
uploadgig.com



rapidgator.net


nitro.download

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis