Course: Foundations of Android Security
duration: 7 hours |
Language: English (US) |
access duration: 90 days |
Details
In this Android training course you will learn about sucuring the Android operating system. You will learn the basics of the Android environment, architecture and the main Android security features. Later in the course you will learn about the common vulnerabilities and the advanced test methods for the safety of Android.
Among subjects that covered are SDK, Eclipse IDE en ADT, Android Studio IDE, Busybox, Pitfalls, Burp suite and far more.
Result
After completing this course you will be familiar with the principles that are needed to develop safe Android applications.
Prerequisites
There is no specific knowledge required. We recommend basic knowledge of programming.
Target audience
Security Specialist
Content
Foundations of Android Security
Android Architecture, Protection, and Development Best Practices
- start the course
- describe the major components of the Android Environment, specifically the Android SDK, Eclipse IDE and ADT, Tools (DDMS, ADB)
- download and install the Android standalone SDK tools package
- download and install the Android Studio IDE
- describe how the Linux kernel provides security on the Android platform, including Linux permissions enforcement
- describe Android runtime components, specifically the Dalvik VM and Core Libraries
- describe how to start, bind, and create an application service, as well as how to declare a service in the Manifest.xml file
- define an activity and describe activity stack and callback methods used to implement activity lifecycles
- describe the Android application framework layer services, specifically the Resource Manager, Activity Manager, Location Manager, Notification Manager, Package Manager, Views, and Content Providers
- describe Android software stack layers
- define the user protection levels that can be assigned in a Manifest permissions file
- describe the process of application code signing
- securely package an Android application
- install and test operation of the Android Debug Bridge tool from the standalone SDK tools package
- identify application-based permissions, specifically Android Manifest Permissions
- enable the ProGuard code obfuscation tool in Android SDK
- create an Android application signing key and certificate in Android Studio
- use code signing to protect Android application code from malware attacks
- use Linux security services to protect Android application data
- describe how permissions and process attributes are assigned in Android OS
- describe how permissions are granted and managed for applications with shared user IDs
- declare Android application permissions in a Manifest permissions file
- describe how permissions are enforced at the kernel level, native daemon level, and the framework level in Android OS
- declare a custom permission in a Manifest permissions file
- identify the permissions for a sample application and sign application code in Android Studio
Android Security Vulnerabilities, Testing, and Enterprise Considerations
- start the course
- identify common mobile device security issues
- describe the methodology used for identifying malware on Android
- describe the general methodology used to reverse engineer an Android application so as to reveal malicious threats
- describe Android mobile browser vulnerabilities
- describe Android security concerns that ought to be addressed in the enterprise environment
- describe compliance and audit considerations that must be taken into account when developing Android apps for enterprise
- describe considerations for using user-owned, untrusted devices as well as untrusted applications and networks
- describe considerations for dealing with untrusted systems and content on an enterprise network
- describe recommended security practices for mobiles in the enterprise environment
- identify device administration policies and describe how they are implemented on an Android device
- describe Android device penetration testing methodology
- describe main steps for carrying out a generic penetration test on Android OS and devices
- carry out a network scan using Nmap
- install and use BusyBox on an Android device to examine its network port and socket activity
- analyze network traffic on an Android device using Wireshark
- use Burp suite to intercept traffic for a browser application on a virtual Android device
- describe the Android app development best practices against which penetration tests should be carried out
- analyze Android device mount points
- examine some file systems that typically exist on an Android device
- examine Android device directory structure
- describe storage options for Android application data
- explore the contents of the application data directory for default Android e-mail application
- identify the advantages and pitfalls of enabling root access on an Android device
- create a system image for an Android device
- retrieve and access an Android application database
- capture and analyze traffic from a sample application, retrieve its database, and view its database contents
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.
Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Award Winning E-learning | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.
FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.