X

CompTIA Mobile App Security+ - Android Edition

Course Overview

In this course, you will learn why it's critical to build security into your Android apps, how to improve programming processes to promote security, & how to provide countermeasures for the numerous threats to which a 'Droid app and its users are exposed.

Who Should Attend

This course is intended for a programmer or web developer who is experienced with mobile app development in Android and wants to learn how to develop secure apps that are hardened against attack to levels that are appropriate for the risk model of the app. The student has experience developing Android apps, and is familiar with the Android SDK, development tools, and processes.

Course Outline

1 - The Rationale for Android App Security

  • Identify Why Security is Necessary
  • Strengths and Weaknesses of the Android Security Architecture

2 - The Android Security Architecture

  • Strengths and Weaknesses of the Android Security Architecture
  • The Android Permissions Model
  • Android Vulnerabilities

3 - Employing Secure Mobile App Development Strategies

  • Follow App Security Best Practices
  • Promote Security Throughout the Process
  • Design for Security
  • Write Secure Java Code

4 - Accessing Local Processes and Devices Securely

  • Identify Threats to Access of Local Processes and Hardware
  • Select Countermeasures to Local Process and Hardware Threats
  • Implement Secure Access of Local Processes and Hardware

5 - Accessing Local Storage Securely

  • Identify Threats to Local Storage
  • Select Countermeasures to Local Storage Threats
  • Implement Secure Access of Local Storage

6 - Communicating over Networks Securely

  • Identify Threats to Network Communication and Web Services
  • Select Countermeasures to Network Communication Threats
  • Implement Secure Network Communication

7 - Using the WebView Component Securely

  • Identify Threats to the WebView Component
  • Select Countermeasures to Secure the WebView Component
  • Implement WebView Security

8 - Using the KeyChain Object Securely

  • Identify Threats to the KeyChain Object
  • Select Countermeasures to Secure the KeyChain Object
  • Implement KeyChain Security

9 - Securing Data through Encryption

  • Identify Threats to Plaintext Storage and Transmission
  • Select Appropriate Encryption to Secure Data
  • Implement Encryption

10 - Hardening Apps Against Attack

  • Identify Threats Related to Reverse Engineering
  • Select Reverse Engineering Countermeasures
  • Harden an App

Enroll Today

This is a 3-day class

Price: $2,000.00
Payment Options

ILT Instructor‑Led Training

OLL Online LIVE

GTR  Guaranteed to Run

Class times are listed Eastern time. This class is available for Private Group Training

To sort by location or date, click the ‘When’ and ‘Where’ column headings.

Class dates not listed.
Please contact us for available
dates and times.