Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Evading Vulnerability Exploitation Through Secure Android Development

NorthSec via YouTube

Overview

Learn how to protect Android users from security threats by understanding the unique challenges of Android security compared to iOS and the web. This course covers common attack vectors for the Android operating system and provides best practices for secure Android development. Students will gain skills in setting up secure development environments, analyzing tools, managing application and file permissions, detecting private key tampering, and more. The teaching method includes theoretical discussions, practical examples, and real-world case studies. This course is intended for software developers looking to enhance their Android security knowledge and skills.

Syllabus

Intro
OVERVIEW
SETTING UP THE ENVIRONMENT
ANALYSIS TOOLS
APPLICATION DERMISSIONS
FILE PERMISSIONS
REAL WORLD EXAMPLE
PRIVATE KEYS
TAMPER DETECTION

Taught by

NorthSec

Reviews

Start your review of Evading Vulnerability Exploitation Through Secure Android Development

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.