Mastering Android Privacy & Security
Mastering Android Privacy & Security, available at $19.99, has an average rating of 4.75, with 170 lectures, 33 quizzes, based on 18 reviews, and has 3044 subscribers.
You will learn about Understand how to design apps with privacy and security in mind Be able to discuss a wide variety of privacy and security-related topics Know about fundamental Android security concepts Understand symmetric and asymmetric cryptography algorithms, and how to apply it on Android Understand hashing algorithms, and how to apply it on Android Learn how to protect data at rest and data in transit This course is ideal for individuals who are Android developers wanting to deep dive into privacy and security or Software engineers preparing for system design interviews It is particularly useful for Android developers wanting to deep dive into privacy and security or Software engineers preparing for system design interviews.
Enroll now: Mastering Android Privacy & Security
Summary
Title: Mastering Android Privacy & Security
Price: $19.99
Average Rating: 4.75
Number of Lectures: 170
Number of Quizzes: 33
Number of Published Lectures: 170
Number of Published Quizzes: 33
Number of Curriculum Items: 203
Number of Published Curriculum Objects: 203
Original Price: €29.99
Quality Status: approved
Status: Live
What You Will Learn
- Understand how to design apps with privacy and security in mind
- Be able to discuss a wide variety of privacy and security-related topics
- Know about fundamental Android security concepts
- Understand symmetric and asymmetric cryptography algorithms, and how to apply it on Android
- Understand hashing algorithms, and how to apply it on Android
- Learn how to protect data at rest and data in transit
Who Should Attend
- Android developers wanting to deep dive into privacy and security
- Software engineers preparing for system design interviews
Target Audiences
- Android developers wanting to deep dive into privacy and security
- Software engineers preparing for system design interviews
Gain insightful knowledge about a wide spectrum of privacy and security topics in this course. In general, many topics are relevant across platforms and technologiessuch as cryptography and authentication & authorization standards. Specifically for Android, there is a deep dive into all the individual topics. This includes fundamental concepts, best practices, detailed walkthroughs, and plenty of demos taught by aTech Lead of a Google Developer Agency. Stefan started developing Android apps – almost from Android’s birth – in 2011, and since then had to design and develop a handful of Android apps. The apps involved privacy and security aspects as well and therefore he wants to share his experience in this course.
Privacy and securitytopics are often overlooked when designing and developing mobile appsbecause the concepts are often unclear. However, it is important to develop apps with privacy and security in mind to improve UX, data safety, and finally user satisfaction. Depending on the app to be developed, there may be special requirements when it comes to privacy and security, too. Furthermore, when you apply for a job at any of the big FAANG companies, system designquestions are likely to involve privacy and security aspects. So, knowing in detail about these topics will help you to stand out against other applicants.
More than 12 hours of on-demand video content will cover what you need to know to master privacy & security:
-
Learn about privacy & security concepts on Android by gaining lots of overall knowledge, knowing best practices, following detailed walkthroughsand demos
-
Be well prepared for system design interviewsat any of the big FAANG companies when it comes to privacy & security-related topics
-
Know how to improve privacy by minimizing permission requests
-
Approaches to ensure user data privacy: Package visibility, data storage & device IDs
-
Apply data access auditing and other techniques to ensure transparency & control
-
Deep dive into security concepts Android is built upon: From kernel security to app security
-
How to use the Android Keystore system for secure storage of a device’s Trusted Execution Environmentor Secure Element
-
Understand symmetric & asymmetric cryptography, and hashing: Concepts, algorithms walkthrough, demos, implementation on Android
-
Get insights into how to protect local dataincluding EncryptedFile and EncryptedSharedPreferences, and secure SQL & NoSQL databases
-
Discussion of network security concepts: Public Key Infrastructure & TLS
-
Choosing the right approach to securely transmit network dataon Android by using certificate pinning, certificate transparency, or the Android network security config
-
Overview of authentication & authorizationstandards like OAuth 2.0 and OpenID Connect, and how they can be applied on Android
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: Course Overview
Lecture 3: Download your slides
Chapter 2: Privacy: Permissions
Lecture 1: Permissions
Lecture 2: Permissions: Overview
Lecture 3: Permissions: Intro
Lecture 4: Permissions: Workflow
Lecture 5: Permissions: Demo
Lecture 6: Permissions: Special Permissions
Lecture 7: Permissions: Best Practices
Lecture 8: Permissions: Request Minimization
Lecture 9: Permissions: Demo Request Minimization
Lecture 10: Permissions: Prominent Disclosure & Consent
Chapter 3: Privacy: Location
Lecture 1: Location
Lecture 2: Location: Overview
Lecture 3: Location: Intro
Lecture 4: Locations: Background
Lecture 5: Location: Permission Best Practices
Lecture 6: Location: Use Minimization
Lecture 7: Location: Demo
Chapter 4: Privacy: Data
Lecture 1: Data
Lecture 2: Data: Overview
Lecture 3: Data: Package Visibility
Lecture 4: Data: Package Visibility Use Cases
Lecture 5: Data: Scoped Storage
Lecture 6: Data: Unique Identifiers
Lecture 7: Data: Unique Identifiers Use Cases
Chapter 5: Transparency & Control
Lecture 1: Transparency & Control
Lecture 2: Transparency & Control: Overview
Lecture 3: Transparency & Control: Data Access Auditing
Lecture 4: Transparency & Control: Data Access Auditing Demo
Lecture 5: Transparency & Control: Data Safety
Lecture 6: Transparency & Control: Data Safety Demo
Lecture 7: Transparency & Control: Privacy UI Elements
Lecture 8: Transparency & Control: Privacy UI Elements Demo
Chapter 6: Privacy: App Hibernation
Lecture 1: App Hibernation
Chapter 7: Privacy: Privacy Sandbox
Lecture 1: Privacy Sandbox
Lecture 2: Privacy Sandbox: Overview
Lecture 3: Privacy Sandbox: SDK Runtime
Lecture 4: Privacy Sandbox: Privacy-Preserving APIs
Chapter 8: Security: Android Security Concepts
Lecture 1: Android Security Concepts
Lecture 2: Android Security Concepts: Overview
Lecture 3: Android Security Intro
Lecture 4: Kernel Security: Linux Kernel
Lecture 5: Kernel Security: App Sandbox
Lecture 6: Kernel Security: SELinux
Lecture 7: Kernel Security: Verified Boot
Lecture 8: Kernel Security: Rooting
Lecture 9: Kernel Security: User Security
Lecture 10: Kernel Security: Additional Concepts
Lecture 11: App Security: Permissions
Lecture 12: App Security: IPC
Lecture 13: App Security: Signing
Lecture 14: App Security: Additional Concepts
Chapter 9: Security: Secure Storage
Lecture 1: Secure Storage
Lecture 2: Secure Storage: Overview
Lecture 3: Secure Storage: Trusty TEE
Lecture 4: Secure Storage: Secure Element
Lecture 5: Secure Storage: Keystore
Lecture 6: Secure Storage: Authentication
Lecture 7: Secure Storage: Applications
Chapter 10: Symmetric Cryptography
Lecture 1: Symmetric Cryptography
Lecture 2: Symmetric Cryptography: Overview
Lecture 3: Cryptography: Intro
Lecture 4: Symmetric Cryptography
Lecture 5: Symmetric Cryptography: Modes of Operation
Lecture 6: Modes of Operation: ECB
Lecture 7: Modes of Operation: CBC
Lecture 8: Modes of Operation: CFB
Lecture 9: Modes of Operation: OFB
Lecture 10: Modes of Operation: CTR
Lecture 11: Symmetric Cryptography: Data Encryption Standard
Lecture 12: Data Encryption Standard: Walkthrough
Lecture 13: Data Encryption Standard: Demo
Lecture 14: Cracking Data Encryption Standard
Lecture 15: Symmetric Cryptography: Triple DES
Lecture 16: Triple DES: Demo
Instructors
-
Stefan Jaindl
Mobile Tech Lead and Instructor at Udemy
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 0 votes
- 3 stars: 0 votes
- 4 stars: 7 votes
- 5 stars: 11 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple