Secure Coding for Android Platform Training

Secure Coding for Android Platform Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Secure Coding for Android Platform Training Course Description

Secure Coding for Android Platform Training 3-day Intense Course provides an in-depth review of Android security technology and services and common vulnerabilities related to Android native code and Java. Hands-on exercises offer a practical way of analyzing vulnerabilities attack, and mitigation techniques.

Secure Coding for Android Platform Training Course gives a comprehensive overview of these features putting an equal emphasis on both native code issues and Java security, allowing a deeper analysis of the vulnerabilities, attacks, protection techniques and counter attacks in three days.

Customize It:

• If you are familiar with some aspects of this Secure Coding for Android Platform Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

Secure Coding in .NET – C#/ASP.NET Training
Secure Coding in C/C++ Training

Audience / Target Group:

The target audience for this Secure Coding for Android Platform Training course:

Android application developers, architects and testers who extensively use both Java and native code to develop complex Android applications.

What You Will Learn:

Upon completing this Secure Coding for Android Platform Training course, learners will be able to meet these objectives:

• Understand basic concepts of security, IT security and secure coding
• Learn the security solutions on Android
• Learn to use various security features of the Android platform
• Get information about some recent vulnerabilities in Java on Android
• Get understanding on native code vulnerabilities on Android
• Learn about typical coding mistakes and how to avoid them
• Get practical knowledge in using security testing tools
• Get sources and further reading on secure coding practices

Secure Coding for Android Platform Training – Course Syllabus:

IT security and secure coding

o Nature of security
o IT security related terms
o Definition of risk
o IT security vs. secure coding
o From vulnerabilities to botnets and cybercrime
o Classification of security flaws

Android Security Overview

o Android fragmentation challenges
o The Android software stack
o OS security features and exploit mitigation techniques
o The Linux kernel
o Filesystem security
o Dalvik
o Deploying applications

Application Security

o Permissions
o Writing secure Android applications
o Protecting applications
o Digital Rights Management (DRM)
o Reverse engineering and debugging

Basics of Cryptography

o Cryptosystems
o Symmetric-key cryptography
o Other cryptographic algorithms
o Asymmetric (public-key) cryptography
o Public Key Infrastructure (PKI)
o Cryptography on Android

Android Native Code Security

o Buffer overflow possibilities in Android
o ARM architecture
o Buffer overflow on the stack
o Protection techniques – ASLR, XN, RELRO, …

Android and Java vulnerabilities

o Input validation
o SQL Injection
o Cross-Site Scripting (XSS)
o Improper use of security features
o Improper error and exception handling
o Code quality problems

Testing Android Code

o Testing Android code
o Android Lint o Android Lint – Security features
o Lint exercise
o PMD exercise
o FindBugs
o FindBugs exercise

Advice and Principles

o Matt Bishop’s principles of robust programming
o The security principles of Saltzer and Schroeder

Knowledge Sources

o Secure coding sources – a starter kit
o Vulnerability databases

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email