Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Securing Android Applications Version 4.2
Android Training Overview:

This course explores the Android mobile operating system from the perspective of user, application, and server security; and shows experienced Android developers how to apply best practices to secure their applications.

Android Training Prerequisites:

  • Java programming experience is required; Course, "Java Programming," is excellent preparation.
  • Introductory knowledge of Android programming is required: Course, "Introduction to Android Development," or similar
  • We recommend intermediate Android programming in advance of this course -- Course , "Intermediate Android Development" would be ideal -- but this is not required.
Android Training Objectives:

  • Understand the security characteristics of mobile computing, and the Android OS in particular.
  • Manage application data in a secure fashion.
  • Apply appropriate safeguards over entry points to applications, including intent filters, bound services, and broadcast receivers.
  • Use cryptography as appropriate, especially in remote communications.
  • Manage user credentials, including passwords and issued tokens.
Android Training Course duration:

1 Day

Android Training Course Topics:

Chapter 1. Mobile OS Security
  • Vulnerabilities of Mobile Systems
  • Security Overview of Android
  • For Comparison: iOS
  • Analysis and Areas of Concern
  • Digital Signature of Applications
  • Rooted Devices
  • Clickjacking
  • Best Practices
  • The OWASP Mobile Top 10
Chapter 2. Application Security
  • Permissions
  • Custom Permissions
  • Security Configuration
  • Storage Models
  • Internal Storage
  • USB, Bluetooth, WiFi, and External Media
  • File System Security
  • Encrypted File Systems
  • Injection Vulnerabilities
  • Inter-Process Communication
  • Guarding IPC Entrances
  • Services and Broadcast Receivers
  • Logging
Chapter 3. Remote Connectivity
  • Remote Connections from Mobile Devices
  • The INTERNET Permission
  • HTTP and HTTPS Communication
  • Keystores and Cryptography
  • Username/Password Login
  • Managing Credentials
  • HMACs
  • Managing Token Pairs
Appendix A. Learning Resources

System Requirements

Hardware Requirements (Minimum) : Core i5, 1.5 GHz, 4 gig RAM, 1 gig disk space.

Hardware Requirements (Recommended) : Core i5, 2.5 GHz GHz, 8 gig RAM, 1 gig disk space.

Operating System :Tested on Windows 7. Course software should be viable on all systems which support a Java 6 Developer's Kit.

Network and Security :Limited privileges required -- please see our standard security requirements.

Software Requirements :All free downloadable tools.


Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved