COD 318: Creating Secure Android Code in Java

E-Learning English
Duration: 90 minutes | Course is offered in English

Course Overview

In this course you will learn how to identify and mitigate the most common Android application security vulnerabilities and attack vectors, including: Weak Server Side Controls, Threats to Data, SQL Injection, Cross-Site Scripting (XSS), Session Hijacking, Threats to User Privacy and Confidentiality, Native Code Attacks, and Missing Data Encryption. Mitigation and best-practices  include the Android software stack, the Android security model, access control methods, sandboxing, interprocess communications and implementing the security features of open-source developer tools.

Course Objectives

Upon completion of this course, participants will be able to:

  • Describe the open-source developer tools available for securing Android applications
  • Introduce the different types of Android application security vulnerabilities and attack vectors
  • Describe how to protect confidential data by using secure UUIDs
  • Describe how to use parameterized queries and implement input validation to prevent malicious attacks on a database
  • Explain how to use the AccountManager class to avoid the risks associated with unauthorized access
  • Describe how to use different methods and cryptography to secure the WebView class

This course can be customized for Instructor-Led training. Course contents and duration may vary. Contact us for details.