Announcement: Mindasys is now Skillet! Check out our new website.

Key points about this course

Duration : 2 Days
Course Fee : RM 2,599.00

HRD Corp Claimable Course

Android™ Security Essentials
Exam Code : AND-802

Virtual Class

Public Class

In House Training

Private Class

Course Overview

This is a two-day (12 hours) professional course, which thoroughly covers the Android security model and concerns of both the developer and end-user point of view. This course is mapped for AND-802 exam.

Course Prerequisites

It’s highly recommended that the attendees of this course know the basics of Android application development knowledge.To acquire good knowledge of Android application development, trainees may attend the “Android Application Development” course provided by Android ATC

Course Objectives

Upon completing this course, students will be able to:

1- Understand Android software architecture.
2- Understand Android’s security model.
3- Build Android applications with security best practices in mind.
4- Build more secure and more robust application that appeals to clients.

Course Content

Lesson 1 Permissions

Introduction

Android Platform Architecture

Android Security Architecture

  • Application Signing
  • Installing Applications

Permissions

  • Why Permissions?
  • Enforcing Permissions
  • Levels of Permissions Protection
  • Application - Level Permissions
  • Component - Level Permissions
  • Extending Android Permissions

Lab 1: Permission

  • Creating and Accessing App Permissions
  • Configuring Permissions Among Different Apps

 

Lesson 2 Managing the Policy File

Introduction

The Manifest File

  • Manifest Tag Attributes
  • Application Tag Attributes

Modifying the Application Policy

  • Application Running with the Same Linux ID
  • Setting Application Permissions
  • Permissions for External Applications
  • External Storage
  • Debugging Mode

Backup

Lab 2

  • Creating Two Applications with the Same Linux ID
  • Backing up Data on Cloud Storage

 

Lesson 3 User Data Privacy and Protection

Introduction

Data Security Principles

  • Confidentiality
  • Integrity
  • Availability

The Mobile Environment

Data States

Vulnerabilities and Attacks Against Stored Data

  • Vulnerabilities of Stored Data
  • Threats on Stored Data

Protection Principles

Tips for Android Coding Vulnerabilities

Lab 3

  • Ensuring Data Confidentiality – Hacking Applications
  • Protecting Application Data with Permissions

 

Lesson 4 Securing Storage

Introduction

Data Storage Decisions

  • Privacy
  • Data Storage Period

Storage Mechanisms

  • SharedPreferences
  • File

File Operations on an External Storage

Cache

Database

Lab 4: Data Storage Applications

  • Using SharedPreferences
  • File Storage Operations
  • Storing Data in Cache
  • SQLite Database Storage

  • Android™ Security Essentials

  • Ask For