- Fees / Price TBA
- Duration 3 Days
- Locations 5 mesaha square , dokki
In this course, you will learn why it's critical to build security into your Android apps, how to improve programming processes to promote security, & how to provide countermeasures for the numerous threats to which a 'Droid app and its users are exposed.
Who Should Attend:
This course is intended for a programmer or web developer who is experienced with mobile app development in Android and wants to learn how to develop secure apps that are hardened against attack to levels that are appropriate for the risk model of the app. The student has experience developing Android apps, and is familiar with the Android SDK, development tools, and processes.
At Course Completion:
In this course, you will harden native Android mobile apps against attack, and ensure secure network communications and backend web services. You will: Explain why an organization should devote time and resources to app security, including a specific rationale for Android app development. Identify where and how the Android system architecture is vulnerable to security threats. Employ strategies to promote the security of mobile apps, including specific strategies for Android. Enable an Android app to communicate securely with hardware and software on the device. Enable an Android app to secure data through encryption. Enable an Android app to store data securely. Enable an Android app to communicate securely over networks and with web services. Use the WebView component securely. Protect credentials in storage and in transit. Harden an Android app against attack to levels appropriate for the risk model.
- Lesson 1: The Rationale for Android App Security
- Lesson 2: The Android Security Architecture
- Lesson 3: Employing Secure Mobile App Development Strategies
- Lesson 4: Accessing Local Processes and Devices Securely
- Lesson 5: Accessing Local Storage Securely
- Lesson 6: Communicating over Networks Securely
- Lesson 7: Using the WebView Component Securely
- Lesson 8: Using the KeyChain Object Securely
- Lesson 9: Securing Data through Encryption
- Lesson 10: Hardening Apps Against Attack
It is the first and largest provider of computer software and hardware training in Egypt.
We_They is fast growing training provider over 20 years of experience in the delivery of computer training.
Our organization is dedicated to provide education excellence to meet the needs of each technology, simultaneously, as customer expand designed solutions to meet his particular organization's business needs.
Also Compuek is aimed by great companies and institutions for training their human resources looking for their progress and growth, and to make HR learn this promising technology at that time. For 20 years, the center is supplying the career market by highly qualified HR members who having broad minded, acquired with high technique and capable to work on the most difficult systems by all easiness and facility.
Computek is distinguished by its remote sighted management that enjoyed advanced thinking and firmness in order to enable the trainees to get as much training as possible by easy and simple way and in fine, splendid, and very organized training halls acquired with high capability PCs that are continuously upgraded to maintain high performance.See all Computek Training Center courses