Protecting data Course

Now that you have a good understanding of encryption, you can build on that foundation by learning additional ways to protect user data.

5 hours, 13 minutes

Course description

In addition to encryption, there are a number of other mechanisms you can employ to protect data. In this course, you will learn about common risks to data. You will also learn about how to protect files, how ensure that data is transmitted over a network securely and how to protect data shared and transmitted between processes within an Android app. You will learn about the risks of data leakage and how to mitigate those risks. Finally, you will learn how to protect data that is viewed online by a user.

Syllabus

Activity: Exploring threads and concurrency

Video - 00:14:00

In this activity, we experiment with threads, coroutines and concurrency.
Android IPC, Part 9: Race condition

Video - 00:13:00

In this lesson, we learn what a race condition is and how to protect against it.
Android IPC, Part 8: Threads

Video - 00:10:00

In this lesson, we learn about threads and Kotlin coroutines.
Android IPC, Part 7: Binder

Video - 00:05:00

In this lesson, we examine Android Binder, its vulnerabilities and what to do to patch any vulnerabilities.
Android IPC, Part 6: Intent (cont'd)

Video - 00:10:00

We continue our lesson on Android intents.
Android IPC, Part 6: Intent

Video - 00:12:00

In this lesson, we examine Android intents, their vulnerabilities and how to protect them in our app.
Android IPC, Part 5: Content provider (cont'd)

Video - 00:09:00

We continue our lesson on Android content providers.
Android IPC, Part 5: Content provider

Video - 00:21:00

In this lesson, we examine Android content providers, their vulnerabilities and how to protect them in our app.
Android IPC, Part 4: Broadcast receiver (cont'd)

Video - 00:12:00

We continue our lesson on Android broadcast receivers.
Android IPC, Part 4: Broadcast receiver

Video - 00:11:00

In this lesson, we examine Android broadcast receivers, their vulnerabilities and how to protect them in our app.
Android IPC, Part 3: Service

Video - 00:15:00

In this lesson, we examine Android services, their vulnerabilities and how to protect them in our app.
Android IPC, Part 2: Activity

Video - 00:10:00

In this lesson, we examine Android activities, their vulnerabilities and how to protect them in our app.
Android IPC

Video - 00:05:00

In this lesson, we get an overview of Android inter-process communications.
Activity: Securing database data

Video - 00:07:00

In this activity, we learn how to hash data before saving it in a Room database.
Activity: Working with Room database, Part 2

Video - 00:06:00

We continue implementing a Room database in our app.
Activity: Working with Room database

Video - 00:13:00

In this activity, we implement a Room database in our app.
Databases

Video - 00:15:00

In this lesson, we learn about SQLite and Room databases.
Activity: Preventing data leakage

Video - 00:03:00

In this activity, we implement data leak protection in our app.
Data leakage, Part 2

Video - 00:09:00

We continue learning about how to protect against data leaks.
Data leakage

Video - 00:09:00

In this lesson, we learn about common ways in which data can leak from our app and how to protect against those risks.
Activity: Implementing certificate pinning

Video - 00:10:00

In this activity, we implement certificate pinning in our app.
Certificate pinning

Video - 00:10:00

In this lesson, we learn what certificate pinning is and how to implement it to secure connections to websites.
Activity: Configuring network security, Part 2

Video - 00:14:00

We continue to practice securing network connectivity in our Android app.
Activity: Configuring network security

Video - 00:15:00

In this activity, we practice securing network connectivity in our Android app.
Network security

Video - 00:06:00

In this lesson, we learn about common network security risks, including man-in-the-middle attacks. We also learn about the primary tasks required to secure Android network connections.
Activity: Sniffing cleartext transmissions, Part 2

Video - 00:10:00

We continue with capturing cleartext data from the network.
Activity: Sniffing cleartext transmissions

Video - 00:10:00

In this activity, we sniff (capture) cleartext data sent over a vulnerable network connection.
Data in transit

Video - 00:12:00

In this lesson, we learn about different ways our data can be transmitted over a network. We also learn how to secure transmitted data.
Android file recovery

Video - 00:08:00

In this lesson, we learn how to recover deleted user files. We also learn how to recover deleted project files in Android Studio.
Common data risks

Video - 00:11:00

In this lesson, we learn about data states, common risks to data and common mistakes developers make when handling data in their code. We also learn how to mitigate those risks.

Meet the author

Chrys Thorsen

Chrys Thorsen is a technology and education consultant with 25 years of experience. Her work has taken her around the U.S. and overseas, including as a contractor for the CDC using technology to help fight HIV/AIDS in Africa.

During her career, she has acquired 40 IT certifications, authored over 25 textbooks on a wide range of IT subjects, including secure iOS and Android coding, and created an equal number of IT-related video courses. When not working, Chrys enjoys reading scientific articles and experimenting with Internet-of-Things devices. She currently lives in Virginia with her sister, her cat and her dog which, as she describes it, "have the worst sibling rivalry imaginable."

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust