Mastering Android Privacy & Security
- Description
- Curriculum
- FAQ
- Reviews
Gain insightful knowledge about a wide spectrum of privacy and security topics in this course. In general, many topics are relevant across platforms and technologies such as cryptography and authentication & authorization standards. Specifically for Android, there is a deep dive into all the individual topics. This includes fundamental concepts, best practices, detailed walkthroughs, and plenty of demos taught by a Tech Lead of a Google Developer Agency. Stefan started developing Android apps – almost from Android’s birth – in 2011, and since then had to design and develop a handful of Android apps. The apps involved privacy and security aspects as well and therefore he wants to share his experience in this course.
Privacy and security topics are often overlooked when designing and developing mobile apps because the concepts are often unclear. However, it is important to develop apps with privacy and security in mind to improve UX, data safety, and finally user satisfaction. Depending on the app to be developed, there may be special requirements when it comes to privacy and security, too. Furthermore, when you apply for a job at any of the big FAANG companies, system design questions are likely to involve privacy and security aspects. So, knowing in detail about these topics will help you to stand out against other applicants.
More than 12 hours of on-demand video content will cover what you need to know to master privacy & security:
-
Learn about privacy & security concepts on Android by gaining lots of overall knowledge, knowing best practices, following detailed walkthroughs and demos
-
Be well prepared for system design interviews at any of the big FAANG companies when it comes to privacy & security-related topics
-
Know how to improve privacy by minimizing permission requests
-
Approaches to ensure user data privacy: Package visibility, data storage & device IDs
-
Apply data access auditing and other techniques to ensure transparency & control
-
Deep dive into security concepts Android is built upon: From kernel security to app security
-
How to use the Android Keystore system for secure storage of a device’s Trusted Execution Environment or Secure Element
-
Understand symmetric & asymmetric cryptography, and hashing: Concepts, algorithms walkthrough, demos, implementation on Android
-
Get insights into how to protect local data including EncryptedFile and EncryptedSharedPreferences, and secure SQL & NoSQL databases
-
Discussion of network security concepts: Public Key Infrastructure & TLS
-
Choosing the right approach to securely transmit network data on Android by using certificate pinning, certificate transparency, or the Android network security config
-
Overview of authentication & authorization standards like OAuth 2.0 and OpenID Connect, and how they can be applied on Android
-
4PermissionsVideo lesson
-
5Permissions: OverviewVideo lesson
-
6Permissions: IntroVideo lesson
-
7Permissions: WorkflowVideo lesson
-
8Permissions: DemoVideo lesson
-
9Permissions: Special PermissionsVideo lesson
-
10Permissions: Best PracticesVideo lesson
-
11Permissions: Request MinimizationVideo lesson
-
12Permissions: Demo Request MinimizationVideo lesson
-
13Permissions: Prominent Disclosure & ConsentVideo lesson
-
14Permissions: QuizQuiz
-
31Transparency & ControlVideo lesson
-
32Transparency & Control: OverviewVideo lesson
-
33Transparency & Control: Data Access AuditingVideo lesson
-
34Transparency & Control: Data Access Auditing DemoVideo lesson
-
35Transparency & Control: Data SafetyVideo lesson
-
36Transparency & Control: Data Safety DemoVideo lesson
-
37Transparency & Control: Privacy UI ElementsVideo lesson
-
38Transparency & Control: Privacy UI Elements DemoVideo lesson
-
39Transparency & Control: QuizQuiz
-
47Android Security ConceptsVideo lesson
-
48Android Security Concepts: OverviewVideo lesson
-
49Android Security IntroVideo lesson
-
50Android Security: QuizQuiz
-
51Kernel Security: Linux KernelVideo lesson
-
52Kernel Security: App SandboxVideo lesson
-
53Kernel Security: SELinuxVideo lesson
-
54Kernel Security: Verified BootVideo lesson
-
55Kernel Security: RootingVideo lesson
-
56Kernel Security: User SecurityVideo lesson
-
57Kernel Security: Additional ConceptsVideo lesson
-
58Kernel Security: QuizQuiz
-
59App Security: PermissionsVideo lesson
-
60App Security: IPCVideo lesson
-
61App Security: SigningVideo lesson
-
62App Security: Additional ConceptsVideo lesson
-
63App Security: QuizQuiz
-
64Secure StorageVideo lesson
-
65Secure Storage: OverviewVideo lesson
-
66Secure Storage: Trusty TEEVideo lesson
-
67Secure Storage: Secure ElementVideo lesson
-
68Secure Storage: KeystoreVideo lesson
-
69Secure Storage: AuthenticationVideo lesson
-
70Secure Storage: ApplicationsVideo lesson
-
71Secure Storage: QuizQuiz

External Links May Contain Affiliate Links read more