Memory, Encryption, and Protecting Data in Android

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Memory, Encryption, and Protecting Data in Android

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
This course is designed for intermediate-level learners who want to enhance their security skills in Android development. Participants will analyze the structure of Android memory and evaluate its defenses against exploitation, including understanding pointers and their role in buffer overflow exploits. The course covers various types of overflows, mitigation techniques, and specific vulnerabilities such as the Stagefright buffer overflow. In addition to exploitation techniques, learners will explore secure data storage practices within the Android file system, implement cryptography concepts, and securely manage credentials using the Android Keystore. The course also addresses password security through hashing and salting techniques, common data risks, and secure storage practices to protect data at rest. Finally, participants will gain insights into network security, data protection in transit, and securing inter-process communications and webviews in Android applications.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Don't underestimate small vulnerabilities, as they can lead to bigger problems and significant payouts
Medium · Data Science
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Don't underestimate small vulnerabilities, as they can lead to bigger problems and significant payouts
Medium · Programming
How to secure your macOS games
Secure your macOS games with these steps to protect your device from potential threats
Dev.to · GuardingPearSoftware
The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →