$1,399.00
Date | Day | Time | Duration |
27 Aug | Tuesday | 0900-17:00 ICT/GMT+7 | 8 Hours |
28 Aug | Wednesday | 0900-17:00 ICT/GMT+7 | 8 Hours |
Participants also gain hands-on experience in assessing device security, including techniques for bypassing security mechanisms, and key concepts and tricks in conducting efficiently and effectively Static Code Analysis (SCA) of Android apps and reverse engineered code. Moreover, the course provides insights into testing local authentication mechanisms, input validation, and the security implications of interacting with third-party applications. Finally, students are introduced to backend security considerations, focusing on securing APIs and web services.
By the end of the workshop, participants will have a good understanding of mobile application security principles and practical skills to identify, assess, and validate mobile app vulnerabilities effectively.
Introduction to Mobile App Security
Android App Reverse Engineering and Static Analysis
Android App Dynamic Analysis
Cezar Lungu is a cybersecurity professional specialized in Android application security and web application security assessment.
During his career, he has been delivering advanced penetration testing, secure code review, and reverse engineering services to government and private clients including Fortune Global 500 companies.
He has an in-depth knowledge of the security landscape of the Android platform and its application model; his expertise includes the security of Android developers’ toolchain, analysis and bypass of mechanisms implemented by armored / self-defending apps, and development of proprietary tools to increase testing coverage and support automated exploitation of vulnerabilities.
Cezar is a strong advocate of Open-Source, and he is a regular contributor to multiple projects.
Adverse Theory is a disruptive startup focused on delivering “unconventional” cybersecurity advisory services to support organizations in establishing security teams, managing large-scare security programs, and developing innovative security technologies.