Android Security
Start Date: Please contact us
Price 2,094 ILS
DURATION 1 Day
Course Overview
Android is an open source platform developed by Google for mobile development. Applications for the Android platform are developed in Java. The course overviews Android’s fundamental topics and presents its security model and guidelines in coding secure Android applications.
Who should attend?
Android developers, team leaders, software system engineers and system architects.Prerequisite:
Some experience in Java development and understanding of the Android development platform. There is an advantage to having attended the “Building secure applications” course.
Course Outline:
1. Introduction
• What is Android?
• Android development
• Why deal with Android security
• Android development
• Why deal with Android security
2. Android Applications
• Artifacts
• Basic system tools
• Installing user applications
• Basic system tools
• Installing user applications
3. Android Challenges
• Battery life
• Android market
• Services
• External access
• Android market
• Services
• External access
4. Android Architecture
• Linux kernel
• Java and Native
• Dalvik VM
• SQLite
• Binder component framework
• Components
• Middleware
• Application layer
• Java and Native
• Dalvik VM
• SQLite
• Binder component framework
• Components
• Middleware
• Application layer
5. Components
• Component model
• Activities
• Services
• Content providers
• Broadcasts
• Intents
• Activities
• Services
• Content providers
• Broadcasts
• Intents
6. Security Enforcement
• Protect application
• Dalvik VM
• Reference monitor
• Access permission logic
• Signing application
• Pros and cons
• Dalvik VM
• Reference monitor
• Access permission logic
• Signing application
• Pros and cons
7. Manifest Files
• AndroidManifest.xml
• Defining security policy
• Public and private components
• Implicit open components
• Content provider permissions
• Intent broadcast permissions
• Service hooks
• Protected APIs
• Pending intents
• Permission protection levels
• Permission granularity
• Defining security policy
• Public and private components
• Implicit open components
• Content provider permissions
• Intent broadcast permissions
• Service hooks
• Protected APIs
• Pending intents
• Permission protection levels
• Permission granularity
8. Summary