COD 318: Creating Secure Android Code in Java
In this course you will learn how to identify and mitigate the most common Android application security vulnerabilities and attack vectors, including: Weak Server Side Controls, Threats to Data, SQL Injection, Cross-Site Scripting (XSS), Session Hijacking, Threats to User Privacy and Confidentiality, Native Code Attacks, and Missing Data Encryption. Mitigation and best-practices include the Android software stack, the Android security model, access control methods, sandboxing, interprocess communications and implementing the security features of open-source developer tools.
Upon completion of this course, participants will be able to:
- Describe the open-source developer tools available for securing Android applications
- Introduce the different types of Android application security vulnerabilities and attack vectors
- Describe how to protect confidential data by using secure UUIDs
- Describe how to use parameterized queries and implement input validation to prevent malicious attacks on a database
- Explain how to use the AccountManager class to avoid the risks associated with unauthorized access
- Describe how to use different methods and cryptography to secure the WebView class
This course can be customized for Instructor-Led training. Course contents and duration may vary. Contact us for details.