Companies Home Search Profile

Mastering Android Privacy & Security

Focused View

Stefan Jaindl

12:36:07

0 View
  • 1 - Introduction.mp4
    02:53
  • 2 - Course Overview.mp4
    03:41
  • 3 - Download your slides.html
  • 3 - Mastering-Android-Privacy-Security-Udemy-Course.pdf
  • 3 - Mastering-Android-Privacy-Security-Udemy-Course-Useful-Links.pdf
  • 4 - Permissions.mp4
    00:31
  • 5 - Permissions Overview.mp4
    00:37
  • 6 - Permissions Intro.mp4
    03:04
  • 7 - Permissions Workflow.mp4
    00:55
  • 8 - Permissions Demo.mp4
    09:37
  • 9 - Permissions Special Permissions.mp4
    01:44
  • 10 - Permissions Best Practices.mp4
    10:33
  • 11 - Permissions Request Minimization.mp4
    04:27
  • 12 - Permissions Demo Request Minimization.mp4
    03:05
  • 13 - Permissions Prominent Disclosure Consent.mp4
    02:39
  • 14 - Location.mp4
    00:15
  • 15 - Location Overview.mp4
    00:17
  • 16 - Location Intro.mp4
    06:30
  • 17 - Locations Background.mp4
    01:14
  • 18 - Location Permission Best Practices.mp4
    03:46
  • 19 - Location Use Minimization.mp4
    03:31
  • 20 - Location Demo.mp4
    05:16
  • 21 - Data.mp4
    00:21
  • 22 - Data Overview.mp4
    00:28
  • 23 - Data Package Visibility.mp4
    04:31
  • 24 - Data Package Visibility Use Cases.mp4
    05:30
  • 25 - Data Scoped Storage.mp4
    01:23
  • 26 - Data Unique Identifiers.mp4
    10:21
  • 27 - Data Unique Identifiers Use Cases.mp4
    06:23
  • 28 - Transparency Control.mp4
    00:25
  • 29 - Transparency Control Overview.mp4
    00:27
  • 30 - Transparency Control Data Access Auditing.mp4
    02:40
  • 31 - Transparency Control Data Access Auditing Demo.mp4
    06:36
  • 32 - Transparency Control Data Safety.mp4
    08:49
  • 33 - Transparency Control Data Safety Demo.mp4
    04:42
  • 34 - Transparency Control Privacy UI Elements.mp4
    02:42
  • 35 - Transparency Control Privacy UI Elements Demo.mp4
    07:26
  • 36 - App Hibernation.mp4
    04:20
  • 37 - Privacy Sandbox.mp4
    01:29
  • 38 - Privacy Sandbox Overview.mp4
    00:29
  • 39 - Privacy Sandbox SDK Runtime.mp4
    08:55
  • 40 - Privacy Sandbox PrivacyPreserving APIs.mp4
    04:09
  • 41 - Android Security Concepts.mp4
    00:28
  • 42 - Android Security Concepts Overview.mp4
    01:34
  • 43 - Android Security Intro.mp4
    06:21
  • 44 - Kernel Security Linux Kernel.mp4
    01:00
  • 45 - Kernel Security App Sandbox.mp4
    04:36
  • 46 - Kernel Security SELinux.mp4
    04:34
  • 47 - Kernel Security Verified Boot.mp4
    06:29
  • 48 - Kernel Security Rooting.mp4
    02:12
  • 49 - Kernel Security User Security.mp4
    05:16
  • 50 - Kernel Security Additional Concepts.mp4
    01:16
  • 51 - App Security Permissions.mp4
    07:53
  • 52 - App Security IPC.mp4
    05:00
  • 53 - App Security Signing.mp4
    04:46
  • 54 - App Security Additional Concepts.mp4
    02:23
  • 55 - Secure Storage.mp4
    00:25
  • 56 - Secure Storage Overview.mp4
    00:54
  • 57 - Secure Storage Trusty TEE.mp4
    05:41
  • 58 - Secure Storage Secure Element.mp4
    02:43
  • 59 - Secure Storage Keystore.mp4
    09:03
  • 60 - Secure Storage Authentication.mp4
    11:09
  • 61 - Secure Storage Applications.mp4
    04:25
  • 62 - Symmetric Cryptography.mp4
    00:31
  • 63 - Symmetric Cryptography Overview.mp4
    00:25
  • 64 - Cryptography Intro.mp4
    06:09
  • 65 - Symmetric Cryptography.mp4
    05:01
  • 66 - Symmetric Cryptography Modes of Operation.mp4
    01:55
  • 67 - Modes of Operation ECB.mp4
    02:28
  • 68 - Modes of Operation CBC.mp4
    02:20
  • 69 - Modes of Operation CFB.mp4
    04:22
  • 70 - Modes of Operation OFB.mp4
    02:54
  • 71 - Modes of Operation CTR.mp4
    02:28
  • 72 - Symmetric Cryptography Data Encryption Standard.mp4
    05:11
  • 73 - Data Encryption Standard Walkthrough.mp4
    14:42
  • 74 - Data Encryption Standard Demo.mp4
    10:17
  • 75 - Cracking Data Encryption Standard.mp4
    03:32
  • 76 - Symmetric Cryptography Triple DES.mp4
    01:11
  • 77 - Triple DES Demo.mp4
    07:03
  • 78 - Symmetric Cryptography Advanced Encryption Standard.mp4
    04:18
  • 79 - Advanced Encryption Standard Walkthrough.mp4
    11:06
  • 80 - Advanced Encryption Standard Demo.mp4
    07:42
  • 81 - Cracking Advanced Encryption Standard.mp4
    02:44
  • 82 - Asymmetric Crypography.mp4
    00:25
  • 83 - Asymmetric Crypography Overview.mp4
    00:44
  • 84 - Asymmetric Cryptography Intro.mp4
    03:51
  • 85 - Asymmetric Cryptography DiffieHellman Key Exchange.mp4
    08:02
  • 86 - DiffieHellman Key Exchange Example.mp4
    08:43
  • 87 - DiffieHellman Key Exchange Demo.mp4
    04:44
  • 88 - Cracking DiffieHellman Key Exchange.mp4
    03:52
  • 89 - Asymmetric Cryptography RSA.mp4
    05:05
  • 90 - RSA Example.mp4
    05:46
  • 91 - RSA Demo.mp4
    04:37
  • 92 - Cracking RSA.mp4
    01:28
  • 93 - Asymmetric Cryptography Elliptic Curve Cryptography.mp4
    08:10
  • 94 - Elliptic Curve Cryptography DiffieHellman Algorithm.mp4
    03:13
  • 95 - Elliptic Curve Cryptography Digital Signature Algorithm.mp4
    08:05
  • 96 - Elliptic Curve Cryptography Demo.mp4
    04:47
  • 97 - Asymmetric Cryptography ECC vs RSA.mp4
    03:05
  • 98 - Cracking Elliptic Curve Cryptography.mp4
    01:59
  • 99 - Android KeyStore System.mp4
    06:32
  • 100 - Android KeyStore System Demo.mp4
    06:09
  • 101 - Hashing.mp4
    00:28
  • 102 - Hashing Overview.mp4
    00:26
  • 103 - Hashing Intro.mp4
    06:13
  • 104 - Hashing MD5.mp4
    10:37
  • 105 - Hashing SHA1.mp4
    08:11
  • 106 - Hashing SHA1 vs SHA2 vs SHA3.mp4
    07:07
  • 107 - Hashing SHA2 Adoptions.mp4
    11:53
  • 108 - Hashing SHA3.mp4
    06:01
  • 109 - Hashing Demo.mp4
    02:20
  • 110 - HMAC.mp4
    04:09
  • 111 - HMAC Demo.mp4
    03:22
  • 112 - Local Data Protection.mp4
    00:25
  • 113 - Local Data Protection Overview.mp4
    01:27
  • 114 - Storage Types File System Storage.mp4
    04:54
  • 115 - Media Permissions Android 13 14.mp4
    04:47
  • 116 - Media Permissions Demo.mp4
    06:01
  • 117 - Storage Types SharedPreferences DataStore.mp4
    03:51
  • 118 - Storage Types SQL NoSQL Databases.mp4
    09:13
  • 119 - Jetpack Security Intro.mp4
    01:13
  • 120 - Jetpack Security MasterKey.mp4
    02:18
  • 121 - Modes of Operation Galois Counter Mode.mp4
    07:07
  • 122 - MasterKey Demo.mp4
    04:23
  • 123 - Jetpack Security EncryptedFile.mp4
    02:27
  • 124 - EncryptedFile Demo.mp4
    02:38
  • 125 - Jetpack Security EncryptedSharedPreferences.mp4
    01:01
  • 126 - AES256SIVCMAC.mp4
    04:20
  • 127 - EncryptedSharedPreferences Demo.mp4
    03:03
  • 128 - Securing DataStore.mp4
    02:46
  • 129 - SQL Databases Passcodebased Encryption.mp4
    07:30
  • 130 - NoSQL Databases Security Considerations.mp4
    02:46
  • 131 - Network Data Protection.mp4
    00:45
  • 132 - Network Data Protection Overview.mp4
    01:17
  • 133 - Public Key Infrastructure.mp4
    10:23
  • 134 - Transport Layer Security TLS.mp4
    08:26
  • 135 - Certificate Pinning.mp4
    06:33
  • 136 - Certificate Transparency.mp4
    09:38
  • 137 - Certificate Transparency Demo.mp4
    10:34
  • 138 - Certificate Revocation.mp4
    05:50
  • 139 - Network Security Config.mp4
    03:44
  • 140 - Network Security Config Demo.mp4
    05:45
  • 141 - Authentication Authorization.mp4
    00:36
  • 142 - Authentication Authorization Overview.mp4
    01:10
  • 143 - Authentication vs Authorization.mp4
    01:21
  • 144 - Biometric Authentication.mp4
    06:31
  • 145 - Biometric Authentication Demo.mp4
    16:42
  • 146 - User Authentication Authentication Methods.mp4
    03:25
  • 147 - Credential Manager.mp4
    05:30
  • 148 - WebAuthn.mp4
    04:37
  • 149 - Credential Manager Demo.mp4
    11:56
  • 150 - OAuth 20.mp4
    04:36
  • 151 - OAuth 20 Google OAuth 20 for Mobile.mp4
    06:24
  • 152 - OAuth 20 Demo.mp4
    03:24
  • 153 - Refresh Token.mp4
    03:37
  • 154 - OpenID Connect.mp4
    02:37
  • 155 - JSON Web Token JWT.mp4
    03:51
  • 156 - ID Token.mp4
    01:22
  • 157 - OpenID Connect Google Identity Services.mp4
    06:34
  • 158 - Single Signon SSO.mp4
    05:55
  • 159 - APIs Basic Authentication.mp4
    01:22
  • 160 - APIs API Keys.mp4
    01:52
  • 161 - APIs OAuth 20.mp4
    01:42
  • 162 - APIs JWT.mp4
    01:48
  • 163 - Google IO 2023 Privacy Security Updates.mp4
    04:57
  • 164 - Google IO 2024.mp4
    00:58
  • 165 - Google IO 2024 Additions Overview.mp4
    01:57
  • 166 - Google IO 2024 Privacy Sandbox.mp4
    06:55
  • 167 - Google IO 2024 Checks.mp4
    09:37
  • 168 - Google IO 2024 Whats new in Android Security.mp4
    11:39
  • 169 - Google IO 2024 Whats new in Credential Manager.mp4
    03:23
  • 170 - Recap.mp4
    03:32
  • Description


    Become an expert for wide-ranging privacy and security topics!

    What You'll Learn?


    • Understand how to design apps with privacy and security in mind
    • Be able to discuss a wide variety of privacy and security-related topics
    • Know about fundamental Android security concepts
    • Understand symmetric and asymmetric cryptography algorithms, and how to apply it on Android
    • Understand hashing algorithms, and how to apply it on Android
    • Learn how to protect data at rest and data in transit

    Who is this for?


  • Android developers wanting to deep dive into privacy and security
  • Software engineers preparing for system design interviews
  • What You Need to Know?


  • Some prior experience in mobile app development (preferably Android) is expected
  • More details


    Description

    Gain insightful knowledge about a wide spectrum of privacy and security topics in this course. In general, many topics are relevant across platforms and technologies such as cryptography and authentication & authorization standards. Specifically for Android, there is a deep dive into all the individual topics. This includes fundamental concepts, best practices, detailed walkthroughs, and plenty of demos taught by a Google Developer Agency Tech Lead. Stefan started developing Android apps - almost from Android's birth - in 2011, and since then had to design and develop a handful of Android apps. The apps involved lots of privacy and security aspects and therefore he wants to share his experience in this course.


    Privacy and security topics are often overlooked when designing and developing mobile apps because the concepts are often unclear. However, it is important to develop apps with privacy and security in mind to improve UX, data safety, and finally user satisfaction. Depending on the app to be developed, there may be special requirements when it comes to privacy and security, too. Furthermore, when you apply for a job at any of the big FAANG companies, system design questions are likely to involve privacy and security aspects. So, knowing in detail about these topics will help you to stand out against other applicants.


    More than 12 hours of on-demand video content will cover what you need to know to master privacy & security:

    • Learn about privacy & security concepts on Android by gaining lots of overall knowledge, knowing best practices, following detailed walkthroughs and demos

    • Be well prepared for system design interviews at any of the big FAANG companies when it comes to privacy & security-related topics

    • Know how to improve privacy by minimizing permission requests

    • Approaches to ensure user data privacy: Package visibility, data storage & device IDs

    • Apply data access auditing and other techniques to ensure transparency & control

    • Deep dive into security concepts Android is built upon: From kernel security to app security

    • How to use the Android Keystore system for secure storage of a device's Trusted Execution Environment or Secure Element

    • Understand symmetric & asymmetric cryptography, and hashing: Concepts, algorithms walkthrough, demos, implementation on Android

    • Get insights into how to protect local data including EncryptedFile and EncryptedSharedPreferences, and secure SQL & NoSQL databases

    • Discussion of network security concepts: Public Key Infrastructure & TLS

    • Choosing the right approach to securely transmit network data on Android by using certificate pinning, certificate transparency, or the Android network security config

    • Overview of authentication & authorization standards like OAuth 2.0 and OpenID Connect, and how they can be applied on Android

    Who this course is for:

    • Android developers wanting to deep dive into privacy and security
    • Software engineers preparing for system design interviews

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Stefan Jaindl
    Stefan Jaindl
    Instructor's Courses
    Stefan is an experienced Software Engineer passionate about agile and mobile software development on Android, iOS, and multiplatform.In his professional career, he has created several successful Android and iOS apps for the tourism industry and is currently Tech Lead at a Google Developer Agency.He started mobile development back in 2011 and he has contributed over 7 years to the educational Open Source project Catrobat at Graz University of Technology, which is a partner of Stanford University among others, and has apps listed in Google Play for Education.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 169
    • duration 12:36:07
    • Release Date 2024/12/21