Securing or “hardening” Android apps is an important final step to ensure code, keys, and credentials, as well as the developer’s intellectual property, are well protected. This course provides an introduction to the key features of the Android security model: from the Android operating system to the hardware it runs on. Instructor Malcolm Shore demonstrates the weaknesses in some sample commercial Android apps, and shows the default output from existing development environments, including Android Studio, PhoneGap, and RAD Studio. He then explains a range of tools and techniques to increasingly harden an Android app, secure known vulnerabilities, and test your work. Malcolm also reviews advanced techniques for securing enterprise apps and leveraging the security enhancements in Android O. Using these tutorials, you’ll be able to develop more secure and more robust mobile applications.
- Understanding Android OS, app, and hardware security components
- Using the Trusted Execution Environment
- Developing Android apps with security in mind
- Analyzing existing applications
- Understanding Android vulnerabilities
- Securing Android apps
- Developing secure enterprise apps
Note: Comment below if you find any link dead or getting problem in downloading files.