Protecting data Course
5 hours, 13 minutes
Course description
In addition to encryption, there are a number of other mechanisms you can employ to protect data. In this course, you will learn about common risks to data. You will also learn about how to protect files, how ensure that data is transmitted over a network securely and how to protect data shared and transmitted between processes within an Android app. You will learn about the risks of data leakage and how to mitigate those risks. Finally, you will learn how to protect data that is viewed online by a user.Syllabus
Activity: Exploring threads and concurrency
Video - 00:14:00
In this activity, we experiment with threads, coroutines and concurrency.
Android IPC, Part 9: Race condition
Video - 00:13:00
In this lesson, we learn what a race condition is and how to protect against it.
Android IPC, Part 8: Threads
Video - 00:10:00
In this lesson, we learn about threads and Kotlin coroutines.
Android IPC, Part 7: Binder
Video - 00:05:00
In this lesson, we examine Android Binder, its vulnerabilities and what to do to patch any vulnerabilities.
Android IPC, Part 6: Intent (cont'd)
Video - 00:10:00
We continue our lesson on Android intents.
Android IPC, Part 6: Intent
Video - 00:12:00
In this lesson, we examine Android intents, their vulnerabilities and how to protect them in our app.
Android IPC, Part 5: Content provider (cont'd)
Video - 00:09:00
We continue our lesson on Android content providers.
Android IPC, Part 5: Content provider
Video - 00:21:00
In this lesson, we examine Android content providers, their vulnerabilities and how to protect them in our app.
Android IPC, Part 4: Broadcast receiver (cont'd)
Video - 00:12:00
We continue our lesson on Android broadcast receivers.
Android IPC, Part 4: Broadcast receiver
Video - 00:11:00
In this lesson, we examine Android broadcast receivers, their vulnerabilities and how to protect them in our app.
Android IPC, Part 3: Service
Video - 00:15:00
In this lesson, we examine Android services, their vulnerabilities and how to protect them in our app.
Android IPC, Part 2: Activity
Video - 00:10:00
In this lesson, we examine Android activities, their vulnerabilities and how to protect them in our app.
Android IPC
Video - 00:05:00
In this lesson, we get an overview of Android inter-process communications.
Activity: Securing database data
Video - 00:07:00
In this activity, we learn how to hash data before saving it in a Room database.
Activity: Working with Room database, Part 2
Video - 00:06:00
We continue implementing a Room database in our app.
Activity: Working with Room database
Video - 00:13:00
In this activity, we implement a Room database in our app.
Databases
Video - 00:15:00
In this lesson, we learn about SQLite and Room databases.
Activity: Preventing data leakage
Video - 00:03:00
In this activity, we implement data leak protection in our app.
Data leakage, Part 2
Video - 00:09:00
We continue learning about how to protect against data leaks.
Data leakage
Video - 00:09:00
In this lesson, we learn about common ways in which data can leak from our app and how to protect against those risks.
Activity: Implementing certificate pinning
Video - 00:10:00
In this activity, we implement certificate pinning in our app.
Certificate pinning
Video - 00:10:00
In this lesson, we learn what certificate pinning is and how to implement it to secure connections to websites.
Activity: Configuring network security, Part 2
Video - 00:14:00
We continue to practice securing network connectivity in our Android app.
Activity: Configuring network security
Video - 00:15:00
In this activity, we practice securing network connectivity in our Android app.
Network security
Video - 00:06:00
In this lesson, we learn about common network security risks, including man-in-the-middle attacks. We also learn about the primary tasks required to secure Android network connections.
Activity: Sniffing cleartext transmissions, Part 2
Video - 00:10:00
We continue with capturing cleartext data from the network.
Activity: Sniffing cleartext transmissions
Video - 00:10:00
In this activity, we sniff (capture) cleartext data sent over a vulnerable network connection.
Data in transit
Video - 00:12:00
In this lesson, we learn about different ways our data can be transmitted over a network. We also learn how to secure transmitted data.
Android file recovery
Video - 00:08:00
In this lesson, we learn how to recover deleted user files. We also learn how to recover deleted project files in Android Studio.
Common data risks
Video - 00:11:00
In this lesson, we learn about data states, common risks to data and common mistakes developers make when handling data in their code. We also learn how to mitigate those risks.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps