Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Foundations of Android Security

This course covers best practices to develop secure Android applications and to secure devices for the enterprise.

GK# 7311

Course Overview

TOP

In this course, you will be introduced to the Android environment and overall architecture, presented with a basic understanding of key Android OS security features, and will learn how to protect Android application code using various proven techniques as well as best practices to employ in order to develop secure Android applications. You will also learn about various vulnerabilities as they pertain specifically to Android applications, how to secure Android devices and applications for the enterprise environment, how to plan and carry out penetration testing using a variety of tools and best practices in addition to performing forensics and hacking techniques on Android applications.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Android Architecture, Protection, and Development Best Practices
  • Android Security Vulnerabilities, Testing, and Enterprise Considerations

Outline

TOP
Viewing outline for:

On-Demand Outline

Android Architecture, Protection, and Development Best Practices

  • Describe the major components of the Android Environment, specifically the Android SDK, Eclipse IDE and ADT, Tools (DDMS, ADB)
  • Download and install the Android standalone SDK tools package
  • Download and install the Android Studio IDE
  • Describe how the Linux kernel provides security on the Android platform, including Linux permissions enforcement
  • Describe Android runtime components, specifically the Dalvik VM and Core Libraries
  • Describe how to start, bind, and create an application service, as well as how to declare a service in the Manifest.xml file
  • Define an activity and describe activity stack and callback methods used to implement activity lifecycles
  • Describe the Android application framework layer services, specifically the Resource Manager, Activity Manager, Location Manager, Notification Manager, Package Manager, Views, and Content Providers
  • Describe Android software stack layers
  • Define the user protection levels that can be assigned in a Manifest permissions file
  • Describe the process of application code signing
  • Securely package an Android application
  • Install and test operation of the Android Debug Bridge tool from the standalone SDK tools package
  • Identify application-based permissions, specifically Android Manifest Permissions
  • Enable the ProGuard code obfuscation tool in Android SDK
  • Create an Android application signing key and certificate in Android Studio
  • Use code signing to protect Android application code from malware attacks
  • Use Linux security services to protect Android application data
  • Describe how permissions and process attributes are assigned in Android OS
  • Describe how permissions are granted and managed for applications with shared user IDs
  • Declare Android application permissions in a Manifest permissions file
  • Describe how permissions are enforced at the kernel level, native daemon level, and the framework level in Android OS
  • Declare a custom permission in a Manifest permissions file
  • Identify the permissions for a sample application and sign application code in Android Studio

Android Security Vulnerabilities, Testing, and Enterprise Considerations

  • Identify common mobile device security issues
  • Describe the methodology used for identifying malware on Android
  • Describe the general methodology used to reverse engineer an Android application so as to reveal malicious threats
  • Describe Android mobile browser vulnerabilities
  • Describe Android security concerns that ought to be addressed in the enterprise environment
  • Describe compliance and audit considerations that must be taken into account when developing Android apps for enterprise
  • Describe considerations for using user-owned, untrusted devices as well as untrusted applications and networks
  • Describe considerations for dealing with untrusted systems and content on an enterprise network
  • Describe recommended security practices for mobiles in the enterprise environment
  • Identify device administration policies and describe how they are implemented on an Android device
  • Describe Android device penetration testing methodology
  • Describe main steps for carrying out a generic penetration test on Android OS and devices
  • Carry out a network scan using Nmap
  • Install and use BusyBox on an Android device to examine its network port and socket activity
  • Analyze network traffic on an Android device using Wireshark
  • Use Burp suite to intercept traffic for a browser application on a virtual Android device
  • Describe the Android app development best practices against which penetration tests should be carried out
  • Analyze Android device mount points
  • Examine some file systems that typically exist on an Android device
  • Examine Android device directory structure
  • Describe storage options for Android application data
  • Explore the contents of the application data directory for default Android e-mail application
  • Identify the advantages and pitfalls of enabling root access on an Android device
  • Create a system image for an Android device
  • Retrieve and access an Android application database
  • Capture and analyze traffic from a sample application, retrieve its database, and view its database contents

Prerequisites

TOP

Android App Development Essentials prepares today's developers for the high demand in the IT field. The high demand is based on Android's penetration of various devices. These essentials allow entrepreneurs to use the open source elements to bring into reality whatever app idea they have. This path of courses covers the various features of the Android mobile operating system and the basic skills required to become a mobile application developer by using the Android platform. These courses also describe the Android SDK, Android Studio, App creation, main Android components, Android life cycle, life cycle management, and general debugging.

Who Should Attend

TOP

Application developers on the beginner and intermediate level seeking to create and deploy secure Android applications.

Follow-On Courses

TOP

Mobile applications have become an essential part of everyday life and enjoy widespread usage. In this learning path, you will learn about the ever-changing security risks associated with mobile apps and explore tips and tricks to create secure mobile applications.

Course Delivery

This course is available in the following formats:

On-Demand

Train at your own pace with 24/7 access to courses that help you acquire must-have technology skills.



Request this course in a different delivery format.
Enroll