Main Menu
My Infosec
Main Menu
My Infosec

Secure Coding for iOS Platform

In-depth coverage of iOS key security features as well as related vulnerabilities, attacks and mitigation techniques.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted IT training vendors - 42 industry awards!

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

iOS Secure Coding Course Overview

InfoSec Institute’s Secure Coding for iOS Platform 2-day Intense Course provides in-depth coverage of iOS key security features as well as related vulnerabilities, attacks and mitigation techniques.

iOS is a mobile operating system distributed exclusively for Apple hardware and designed with security at its core; key security features including sandboxing, native language exploit mitigations or hardware supported encryption all offer a very effective environment for secure software development. The devil is however in the details – a programmer can still commit plenty of mistakes to make the resulting apps vulnerable. This course introduces the iOS security model and the usage of various components, but also deals with the vulnerabilities and attacks, focusing on the mitigation techniques and the best practices to avoid them.

Our classroom trainings come with a number of easy-to-understand exercises providing live hacking fun. By accomplishing these exercises with the lead of the trainer, participants can analyze vulnerable code snippets and commit attacks against them in order to fully understand the root causes of certain security problems. All exercises are prepared in a plug-and-play manner by using a pre-set desktop virtual machine, which provides a uniform development environment. InfoSec Institute’s Secure Coding for iOS Platform Course offers you two (2) days of training with a real iOS Security expert. Our experts have extensive iOS development experience as well as years of experience performing security code reviews.

Secure Coding for iOS Course Objectives

Participants in our Secure Coding for iOS Platform Course will:

  • Understand basic concepts of security, IT security and secure coding
  • Learn the security solutions on iPhone
  • Learn to use various security features of iOS
  • Get information about some recent vulnerabilities of iOS
  • Learn about typical coding mistakes and how to avoid them
  • Get practical knowledge in using security testing tools
  • Get sources and further reading on secure coding practices

Who Should Attend:

  • iOS application developers, architects and testers who want to understand the security features of iOS as well as the typical mistakes one can commit on this platform

The courses below are excellent follow-on classes:

  • Secure Coding in Java
  • Secure Coding in .NET
  • Secure Coding for Android Platform

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Award-Winning Training

The Secure Coding in iOS Experience

During the Two (2) Day program, our instructors give you 110% of their time and dedication to ensure that your time is well spent. You will receive an all-inclusive immersion experience by receiving your hotel stay and most meals during your training experience; therefore you eat, sleep and train at the learning facility with no distractions! The schedule rolls out as follows:

Program Content Outline

  • IT security and secure coding
    • Nature of security
    • IT security related terms
    • Definition of risk
    • IT security vs. secure coding
    • From vulnerabilities to botnets and cybercrime
    • Classification of security flaws
  • iOS Security Overview
    • Evolution of iOS security features
    • iOS architecture
    • iOS sandboxing and app interactions
    • Securing data storage
    • Deploying applications
  • Application Security
    • iOS permissions
    • Writing secure iOS applications
    • Protecting applications
    • Cryptography
    • Digital Rights Management (DRM)
    • iOS-specific vulnerabilities and bugs
    • Reverse engineering and debugging
  • Buffer Overflow Protection on iOS
    • ARM architecture
    • Buffer overflow
    • Protection techniques and their circumvention
    • Input validation
    • Improper use of security features
    • Insecure randomness
    • Improper error and exception handling
    • Time and state problems
    • Code quality problems
    • Testing iOS code
  • Knowledge Sources
    • Vulnerability databases
    • Secure coding sources – a starter kit

Book your course

    What Our Students Are Saying

    Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
    JH

    John Hollan GE

    Advanced Ethical Hacking Training Boot Camp

    Career Tracks

    • IT Audit Track

      The IT Audit track goes through all aspects of IT Auditing. Our goals with this set of courses is to create the most complete Security Auditor an organization could wish for.
    Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
    View instant course pricing