Course

Protecting Data

Now that you have a good understanding of encryption, you can build on that foundation by learning additional ways to protect user data.

    Syllabus

  • Activity: Preventing race conditions Video — 00:08:09
    • In this activity, we learn how to use good design to mitigate the risk of a race condition.

  • Inter-process communications, part 2 Video — 00:04:28
    • In this segment, we learn how to use locks and GCD queues to manage concurrency and mitigate the risk of deadlocks.

  • App backgrounding Video — 00:04:56
    • In this segment, we learn about the risk of exposure of sensitive data when an app goes into the background, and how to mitigate that risk.

  • Activity: Securely backgrounding an app Video — 00:11:52
    • In this activity, we implement in Swift a simple but powerful countermeasure to leaking data through app backgrounding.

  • Activity: Saving data in a realm database Video — 00:13:42
    • In this activity, we implement a Realm database in Swift.

  • Protecting files, part 2 Video — 00:07:24
    • In this segment, we explore the popular Realm database and how to implement it in Swift.

  • Common data risks, part 2 Video — 00:07:55
    • In this segment, we continue to look at risks to data, including common reasons for unexpected data leakage and how to mitigate those risks.

  • Inter-process communications Video — 00:13:59
    • In this segment, we learn what inter-process communications are and how Grand Central Dispatch manages concurrent operations. We study the two most common IPC risks to your data and how to mitigate those risks.

  • Activity: Storing an API key in Keychain Video — 00:09:11
    • In this activity, we learn how to securely store an API key in iOS Keychain.

  • API security Video — 00:11:52
    • In this segment, we learn what API security is and examine the various strategies for implementing that security.

  • Network security Video — 00:14:52
    • In this segment, we focus on how to protect data from unauthorized interception on the network and man-in-the-middle attacks.

  • Activity: Making an HTTP exception Video — 00:10:28
    • In this activity, we practice making an HTTP exception to the Apple’s App Transport Security.

  • Protecting files Video — 00:07:48
    • In this segment, we continue our discussion of protecting data. We focus on strategies for protecting user files in Swift and iOS.

  • Common data risks Video — 00:14:15
    • In this segment, we take a deeper look at risks to data, including common mistakes developers make and how to avoid those mistakes.

Syllabus

Course description

In addition to encryption, there are a number of other mechanisms you can employ to protect data. In this course you will learn about common risks to data, how to protect files, how ensure that data is transmitted over a network securely, and how to protect data from inadvertent leakage. You will also learn how to authenticate your app to an online data source, and how to use good design, code, and iOS features to ensure that processes do not interfere with each other, causing unexpected results.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library