
This course provides a practical, hands-on introduction to Android application security testing, focusing on how modern Android applications are designed, deployed, and attacked in real-world environments.
Course Length: 16 Hours
Includes a Certificate of Completion
WWHF Deadwood 2026 - Link at bottom.
Description
This course provides a practical, hands-on introduction to Android application security testing, focusing on how modern Android applications are designed, deployed, and attacked in real-world environments. Students will learn the foundational concepts, tools, and methodologies required to assess the security posture of Android applications across the full application lifecycle.
The class emphasizes offensive and defensive security techniques, helping participants understand not only how vulnerabilities are discovered and exploited, but also how development and security teams can detect, mitigate, and prevent those issues in production environments.
All labs are performed using Corellium, a high-fidelity Android virtualization platform that enables safe, scalable, and repeatable mobile security testing. Corellium allows students to work with real Android operating system images, inspect application behavior at runtime, and perform advanced instrumentation without the instability and limitations commonly encountered on physical devices or traditional emulators.
Throughout the course, students will explore Android application architecture, inter-process communication, permissions, storage models, and common security controls. Hands-on exercises guide participants through tasks such as static analysis, dynamic analysis, traffic interception, runtime manipulation, and vulnerability identification using industry-standard tools and techniques.
By the end of the course, students will have a strong foundational understanding of how Android applications fail in practice, how attackers exploit those failures, and how organizations can build more resilient mobile applications.
FAQ
-
Application security engineers
-
Penetration testers and red team operators
-
Mobile developers interested in secure coding
-
Blue team and defensive security practitioners
-
Anyone responsible for assessing or defending Android applications
Students will be able to:
-
Understand Android application architecture and security boundaries
-
Perform static and dynamic analysis of Android applications
-
Identify common Android application vulnerabilities and misconfigurations
-
Use Corellium to safely emulate, instrument, and test Android devices
-
Analyze application behavior, network traffic, and runtime execution
-
Communicate Android security risks clearly and effectively
About the Instructor
John Strand
"Managing Intern for all things Black Hills Information Security"Bio
John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2026.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive16 Hrs
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel
View Course -
Eric KuehnLive8 Hrs
Red Team Fundamentals for Active Directory
View Course -
Jordan BonaguraLive16 Hrs
Professionally Evil Application Security: From Mapping to Exploitation
View Course This product has multiple variants. The options may be chosen on the product page -
Chris TraynorLiveOD8 Hrs
Offensive Tooling Foundations with Chris Traynor
View Course This product has multiple variants. The options may be chosen on the product page

