Course

Protecting data

Now that you have a good understanding of encryption, you can build on that foundation by learning additional ways to protect user data.

    Syllabus

  • Data in transit Video — 00:11:38
    • In this lesson, we learn about different ways our data can be transmitted over a network. We also learn how to secure transmitted data.

  • Android IPC, Part 9: Race condition Video — 00:12:39
    • In this lesson, we learn what a race condition is and how to protect against it.

  • Android IPC Video — 00:05:16
    • In this lesson, we get an overview of Android inter-process communications.

  • Common data risks Video — 00:11:18
    • In this lesson, we learn about data states, common risks to data and common mistakes developers make when handling data in their code. We also learn how to mitigate those risks.

  • Android IPC, Part 7: Binder Video — 00:04:52
    • In this lesson, we examine Android Binder, its vulnerabilities and what to do to patch any vulnerabilities.

  • Activity: Working with Room database, Part 2 Video — 00:05:53
    • We continue implementing a Room database in our app.

  • Android IPC, Part 6: Intent Video — 00:12:26
    • In this lesson, we examine Android intents, their vulnerabilities and how to protect them in our app.

  • Databases Video — 00:14:36
    • In this lesson, we learn about SQLite and Room databases.

  • Android IPC, Part 5: Content provider Video — 00:21:00
    • In this lesson, we examine Android content providers, their vulnerabilities and how to protect them in our app.

  • Data leakage, Part 2 Video — 00:09:13
    • We continue learning about how to protect against data leaks.

  • Activity: Implementing certificate pinning Video — 00:10:03
    • In this activity, we implement certificate pinning in our app.

  • Activity: Configuring network security, Part 2 Video — 00:13:44
    • We continue to practice securing network connectivity in our Android app.

  • Network security Video — 00:05:51
    • In this lesson, we learn about common network security risks, including man-in-the-middle attacks. We also learn about the primary tasks required to secure Android network connections.

  • Android IPC, Part 4: Broadcast receiver Video — 00:10:47
    • In this lesson, we examine Android broadcast receivers, their vulnerabilities and how to protect them in our app.

  • Activity: Sniffing cleartext transmissions Video — 00:10:01
    • In this activity, we sniff (capture) cleartext data sent over a vulnerable network connection.

  • Activity: Exploring threads and concurrency Video — 00:14:09
    • In this activity, we experiment with threads, coroutines and concurrency.

  • Android IPC, Part 2: Activity Video — 00:10:13
    • In this lesson, we examine Android activities, their vulnerabilities and how to protect them in our app.

  • Android file recovery Video — 00:07:59
    • In this lesson, we learn how to recover deleted user files. We also learn how to recover deleted project files in Android Studio.

  • Android IPC, Part 8: Threads Video — 00:09:42
    • In this lesson, we learn about threads and Kotlin coroutines.

  • Activity: Securing database data Video — 00:06:31
    • In this activity, we learn how to hash data before saving it in a Room database.

  • Android IPC, Part 6: Intent (cont’d) Video — 00:09:45
    • We continue our lesson on Android intents.

  • Activity: Working with Room database Video — 00:12:36
    • In this activity, we implement a Room database in our app.

  • Android IPC, Part 5: Content provider (cont’d) Video — 00:09:16
    • We continue our lesson on Android content providers.

  • Activity: Preventing data leakage Video — 00:03:13
    • In this activity, we implement data leak protection in our app.

  • Android IPC, Part 4: Broadcast receiver (cont’d) Video — 00:12:09
    • We continue our lesson on Android broadcast receivers.

  • Data leakage Video — 00:08:47
    • In this lesson, we learn about common ways in which data can leak from our app and how to protect against those risks.

  • Certificate pinning Video — 00:09:54
    • In this lesson, we learn what certificate pinning is and how to implement it to secure connections to websites.

  • Activity: Configuring network security Video — 00:14:52
    • In this activity, we practice securing network connectivity in our Android app.

  • Activity: Sniffing cleartext transmissions, Part 2 Video — 00:09:46
    • We continue with capturing cleartext data from the network.

  • Android IPC, Part 3: Service Video — 00:14:49
    • In this lesson, we examine Android services, their vulnerabilities and how to protect them in our app.

Syllabus

Course description

In addition to encryption, there are a number of other mechanisms you can employ to protect data. In this course, you will learn about common risks to data. You will also learn about how to protect files, how ensure that data is transmitted over a network securely and how to protect data shared and transmitted between processes within an Android app. You will learn about the risks of data leakage and how to mitigate those risks. Finally, you will learn how to protect data that is viewed online by a user.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library