TrueschoTruescho
All Courses
Access Control, Software Protection, System Integrity
Coursera
Course
Unknown

Access Control, Software Protection, System Integrity

Infosec

Focuses on essential security practices in Android development, covering authentication, authorization, risk management, and application integrity.

Unknown3 weeksEnglish

About this Course

This course focuses on the essential security practices in Android app development. Learners will implement and evaluate various authentication mechanisms, including two-factor authentication and biometrics, to enhance user security. The course also explores different authorization types, such as OAuth, and teaches how to identify and manage risks associated with IDOR and uncontrolled sessions. In addition to authentication and authorization, participants will learn to ensure application and device integrity through effective security practices. The course covers skills for handling and logging errors effectively in Android apps, as well as understanding and mitigating risks associated with third-party code, tamper protection, root detection, and social engineering. By the end of the course, learners will be equipped with the knowledge to develop secure Android applications

What You'll Learn

  • Ensure application and device integrity through security practices
  • Explore different authorization methods such as OAuth
  • Identify and manage risks associated with IDOR and uncontrolled sessions
  • Implement advanced authentication and protect against tampering and social engineering

Prerequisites

  • Basic computer and internet skills are helpful
  • Ability to understand English instructions and complete short practice activities

Instructors

C

Chrystine D Thorsen

Topics

Mobile and Web Development
Computer Science
Computer Security and Networks
Authorization (Computing)
Data Integrity
Risk Management
OAuth
Human Factors (Security)
Encryption
Threat Management

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

تطوير التطبيقات المحمولة والويب
علوم الحاسوب
أمن الحاسوب والشبكات
التفويض
سلامة البيانات
إدارة المخاطر
OAuth
العوامل البشرية في الأمن
Encryption
Threat Management

Start Learning Now