-
Common data risks
-
In this lesson, we learn about data states, common risks to data and common mistakes developers make when handling data in their code. We also learn how to mitigate those risks.
-
-
Android file recovery
-
In this lesson, we learn how to recover deleted user files. We also learn how to recover deleted project files in Android Studio.
-
-
Data in transit
-
In this lesson, we learn about different ways our data can be transmitted over a network. We also learn how to secure transmitted data.
-
-
Activity: Sniffing cleartext transmissions
-
In this activity, we sniff (capture) cleartext data sent over a vulnerable network connection.
-
-
Activity: Sniffing cleartext transmissions, Part 2
-
We continue with capturing cleartext data from the network.
-
-
Network security
-
In this lesson, we learn about common network security risks, including man-in-the-middle attacks. We also learn about the primary tasks required to secure Android network connections.
-
-
Activity: Configuring network security
-
In this activity, we practice securing network connectivity in our Android app.
-
-
Activity: Configuring network security, Part 2
-
We continue to practice securing network connectivity in our Android app.
-
-
Certificate pinning
-
In this lesson, we learn what certificate pinning is and how to implement it to secure connections to websites.
-
-
Activity: Implementing certificate pinning
-
In this activity, we implement certificate pinning in our app.
-
-
Data leakage
-
In this lesson, we learn about common ways in which data can leak from our app and how to protect against those risks.
-
-
Data leakage, Part 2
-
We continue learning about how to protect against data leaks.
-
-
Activity: Preventing data leakage
-
In this activity, we implement data leak protection in our app.
-
-
Databases
-
In this lesson, we learn about SQLite and Room databases.
-
-
Activity: Working with Room database
-
In this activity, we implement a Room database in our app.
-
-
Activity: Working with Room database, Part 2
-
We continue implementing a Room database in our app.
-
-
Activity: Securing database data
-
In this activity, we learn how to hash data before saving it in a Room database.
-
-
Android IPC
-
In this lesson, we get an overview of Android inter-process communications.
-
-
Android IPC, Part 2: Activity
-
In this lesson, we examine Android activities, their vulnerabilities and how to protect them in our app.
-
-
Android IPC, Part 3: Service
-
In this lesson, we examine Android services, their vulnerabilities and how to protect them in our app.
-
-
Android IPC, Part 4: Broadcast receiver
-
In this lesson, we examine Android broadcast receivers, their vulnerabilities and how to protect them in our app.
-
-
Android IPC, Part 4: Broadcast receiver (cont’d)
-
We continue our lesson on Android broadcast receivers.
-
-
Android IPC, Part 5: Content provider
-
In this lesson, we examine Android content providers, their vulnerabilities and how to protect them in our app.
-
-
Android IPC, Part 5: Content provider (cont’d)
-
We continue our lesson on Android content providers.
-
-
Android IPC, Part 6: Intent
-
In this lesson, we examine Android intents, their vulnerabilities and how to protect them in our app.
-
-
Android IPC, Part 6: Intent (cont’d)
-
We continue our lesson on Android intents.
-
-
Android IPC, Part 7: Binder
-
In this lesson, we examine Android Binder, its vulnerabilities and what to do to patch any vulnerabilities.
-
-
Android IPC, Part 8: Threads
-
In this lesson, we learn about threads and Kotlin coroutines.
-
-
Android IPC, Part 9: Race condition
-
In this lesson, we learn what a race condition is and how to protect against it.
-
-
Activity: Exploring threads and concurrency
-
In this activity, we experiment with threads, coroutines and concurrency.
-
Syllabus
Syllabus
Course description
In addition to encryption, there are a number of other mechanisms you can employ to protect data. In this course, you will learn about common risks to data. You will also learn about how to protect files, how ensure that data is transmitted over a network securely and how to protect data shared and transmitted between processes within an Android app. You will learn about the risks of data leakage and how to mitigate those risks. Finally, you will learn how to protect data that is viewed online by a user.


Meet the author
Chrys Thorsen is a technology and education consultant with 25 years of experience. Her work has taken her around the U.S. and overseas, including as a contractor for the CDC using technology to help fight HIV/AIDS in Africa.
During her career, she has acquired 40 IT certifications, authored over 25 textbooks on a wide range of IT subjects, including secure iOS and Android coding, and created an equal number of IT-related video courses. When not working, Chrys enjoys reading scientific articles and experimenting with Internet-of-Things devices. She currently lives in Virginia with her sister, her cat and her dog which, as she describes it, “have the worst sibling rivalry imaginable.”
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client
Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Award-winning training that you can trust




