Sign Up for our Free One-Day SOC Summit Event March 25, 2026 Register Here

Fundamentals of Android Application Security Testing

Course Authored by .

This course provides a practical, hands-on introduction to Android application security testing, focusing on how modern Android applications are designed, deployed, and attacked in real-world environments.

Course Length: 16 Hours

Includes a Certificate of Completion



WWHF Deadwood 2026 - Link at bottom.

Description

This course provides a practical, hands-on introduction to Android application security testing, focusing on how modern Android applications are designed, deployed, and attacked in real-world environments. Students will learn the foundational concepts, tools, and methodologies required to assess the security posture of Android applications across the full application lifecycle.

The class emphasizes offensive and defensive security techniques, helping participants understand not only how vulnerabilities are discovered and exploited, but also how development and security teams can detect, mitigate, and prevent those issues in production environments.

All labs are performed using Corellium, a high-fidelity Android virtualization platform that enables safe, scalable, and repeatable mobile security testing. Corellium allows students to work with real Android operating system images, inspect application behavior at runtime, and perform advanced instrumentation without the instability and limitations commonly encountered on physical devices or traditional emulators.

Throughout the course, students will explore Android application architecture, inter-process communication, permissions, storage models, and common security controls. Hands-on exercises guide participants through tasks such as static analysis, dynamic analysis, traffic interception, runtime manipulation, and vulnerability identification using industry-standard tools and techniques.

By the end of the course, students will have a strong foundational understanding of how Android applications fail in practice, how attackers exploit those failures, and how organizations can build more resilient mobile applications.

FAQ

Who Should Take this Class
  • Application security engineers

  • Penetration testers and red team operators

  • Mobile developers interested in secure coding

  • Blue team and defensive security practitioners

  • Anyone responsible for assessing or defending Android applications

Key Takeaways

Students will be able to:

  • Understand Android application architecture and security boundaries

  • Perform static and dynamic analysis of Android applications

  • Identify common Android application vulnerabilities and misconfigurations

  • Use Corellium to safely emulate, instrument, and test Android devices

  • Analyze application behavior, network traffic, and runtime execution

  • Communicate Android security risks clearly and effectively

About the Instructor

Pixel splash background
"Managing Intern for all things Black Hills Information Security"
Bio

John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.

This class is being taught at Wild West Hackin’ Fest – Deadwood 2026.

For more information about our conferences, visit Wild West Hackin’ Fest!

REGISTER HERE

Clicking on the button above will take you to our registration page

Shopping Cart

No products in the cart.