• Post category:StudyBullet-16
  • Reading time:16 mins read


Become an expert for wide-ranging privacy and security topics!

What you will learn

Understand how to design apps with privacy and security in mind

Be able to discuss a wide variety of privacy and security-related topics

Know about fundamental Android security concepts

Understand symmetric and asymmetric cryptography algorithms, and how to apply it on Android

Understand hashing algorithms, and how to apply it on Android

Learn how to protect data at rest and data in transit

Description

Gain insightful knowledge about a wide spectrum of privacy and security topics in this course. In general, many topics are relevant across platforms and technologies such as cryptography and authentication & authorization standards. Specifically for Android, there is a deep dive into all the individual topics. This includes fundamental concepts, best practices, detailed walkthroughs, and plenty of demos taught by a Tech Lead of a Google Developer Agency. Stefan started developing Android apps – almost from Android’s birth – in 2011, and since then had to design and develop a handful of Android apps. The apps involved privacy and security aspects as well and therefore he wants to share his experience in this course.

Privacy and security topics are often overlooked when designing and developing mobile apps because the concepts are often unclear. However, it is important to develop apps with privacy and security in mind to improve UX, data safety, and finally user satisfaction. Depending on the app to be developed, there may be special requirements when it comes to privacy and security, too. Furthermore, when you apply for a job at any of the big FAANG companies, system design questions are likely to involve privacy and security aspects. So, knowing in detail about these topics will help you to stand out against other applicants.


Get Instant Notification of New Courses on our Telegram channel.


More than 12 hours of on-demand video content will cover what you need to know to master privacy & security:

  • Learn about privacy & security concepts on Android by gaining lots of overall knowledge, knowing best practices, following detailed walkthroughs and demos
  • Be well prepared for system design interviews at any of the big FAANG companies when it comes to privacy & security-related topics
  • Know how to improve privacy by minimizing permission requests
  • Approaches to ensure user data privacy: Package visibility, data storage & device IDs
  • Apply data access auditing and other techniques to ensure transparency & control
  • Deep dive into security concepts Android is built upon: From kernel security to app security
  • How to use the Android Keystore system for secure storage of a device’s Trusted Execution Environment or Secure Element
  • Understand symmetric & asymmetric cryptography, and hashing: Concepts, algorithms walkthrough, demos, implementation on Android
  • Get insights into how to protect local data including EncryptedFile and EncryptedSharedPreferences, and secure SQL & NoSQL databases
  • Discussion of network security concepts: Public Key Infrastructure & TLS
  • Choosing the right approach to securely transmit network data on Android by using certificate pinning, certificate transparency, or the Android network security config
  • Overview of authentication & authorization standards like OAuth 2.0 and OpenID Connect, and how they can be applied on Android
English
language

Content

Introduction

Introduction
Course Overview
Download your slides

Privacy: Permissions

Permissions
Permissions: Overview
Permissions: Intro
Permissions: Workflow
Permissions: Demo
Permissions: Special Permissions
Permissions: Best Practices
Permissions: Request Minimization
Permissions: Demo Request Minimization
Permissions: Prominent Disclosure & Consent
Permissions: Quiz

Privacy: Location

Location
Location: Overview
Location: Intro
Locations: Background
Location: Permission Best Practices
Location: Use Minimization
Location: Demo
Location: Quiz

Privacy: Data

Data
Data: Overview
Data: Package Visibility
Data: Package Visibility Use Cases
Data: Scoped Storage
Data: Unique Identifiers
Data: Unique Identifiers Use Cases
Data: Quiz

Transparency & Control

Transparency & Control
Transparency & Control: Overview
Transparency & Control: Data Access Auditing
Transparency & Control: Data Access Auditing Demo
Transparency & Control: Data Safety
Transparency & Control: Data Safety Demo
Transparency & Control: Privacy UI Elements
Transparency & Control: Privacy UI Elements Demo
Transparency & Control: Quiz

Privacy: App Hibernation

App Hibernation
App Hibernation: Quiz

Privacy: Privacy Sandbox

Privacy Sandbox
Privacy Sandbox: Overview
Privacy Sandbox: SDK Runtime
Privacy Sandbox: Privacy-Preserving APIs
Privacy Sandbox: Quiz

Security: Android Security Concepts

Android Security Concepts
Android Security Concepts: Overview
Android Security Intro
Android Security: Quiz
Kernel Security: Linux Kernel
Kernel Security: App Sandbox
Kernel Security: SELinux
Kernel Security: Verified Boot
Kernel Security: Rooting
Kernel Security: User Security
Kernel Security: Additional Concepts
Kernel Security: Quiz
App Security: Permissions
App Security: IPC
App Security: Signing
App Security: Additional Concepts
App Security: Quiz

Security: Secure Storage

Secure Storage
Secure Storage: Overview
Secure Storage: Trusty TEE
Secure Storage: Secure Element
Secure Storage: Keystore
Secure Storage: Authentication
Secure Storage: Applications
Secure Storage: Quiz

Cryptography

Cryptography
Cryptography: Overview
Cryptography: Intro
Symmetric Cryptography
Symmetric Cryptography: Quiz
Symmetric Cryptography: Modes of Operation
Modes of Operation: ECB
Modes of Operation: CBC
Modes of Operation: CFB
Modes of Operation: OFB
Modes of Operation: CTR
Modes of Operation: Quiz
Symmetric Cryptography: Data Encryption Standard
Data Encryption Standard: Walkthrough
Data Encryption Standard: Demo
Cracking Data Encryption Standard
Data Encryption Standard: Quiz
Symmetric Cryptography: Triple DES
Triple DES: Demo
Triple DES: Quiz
Symmetric Cryptography: Advanced Encryption Standard
Advanced Encryption Standard: Walkthrough
Advanced Encryption Standard: Demo
Cracking Advanced Encryption Standard
Advanced Encryption Standard: Quiz
Asymmetric Cryptography Intro
Asymmetric Cryptography: Quiz
Asymmetric Cryptography: Diffie-Hellman Key Exchange
Diffie-Hellman Key Exchange: Example
Diffie-Hellman Key Exchange: Demo
Cracking Diffie-Hellman Key Exchange
Diffie-Hellman Key Exchange: Quiz
Asymmetric Cryptography: RSA
RSA: Example
RSA: Demo
Cracking RSA
RSA: Quiz
Asymmetric Cryptography: Elliptic Curve Cryptography
Elliptic Curve Cryptography: Diffie-Hellman Algorithm
Elliptic Curve Cryptography: Digital Signature Algorithm
Elliptic Curve Cryptography: Demo
Asymmetric Cryptography: ECC vs. RSA
Cracking Elliptic Curve Cryptography
Elliptic Key Cryptography: Quiz
Android KeyStore System
Android KeyStore System: Demo
Quiz: Android KeyStore
Hashing: Intro
Hashing: MD5
Hashing: SHA-1
Hashing: SHA-1 vs. SHA-2 vs. SHA-3
Hashing: SHA-2 Adoptions
Hashing: SHA-3
Hashing: Demo
Hashing: Quiz
HMAC
HMAC: Demo
HMAC: Quiz

Local Data Protection

Local Data Protection
Local Data Protection: Overview
Storage Types: File System Storage
Media Permissions: Android 13 & 14
Media Permissions: Demo
Storage Types: SharedPreferences & DataStore
Storage Types: SQL & NoSQL Databases
Storage Types: Quiz
Jetpack Security: Intro
Jetpack Security: MasterKey
Modes of Operation: Galois Counter Mode
MasterKey: Demo
Jetpack Security: EncryptedFile
EncryptedFile: Demo
Jetpack Security: EncryptedSharedPreferences
AES256-SIV-CMAC
EncryptedSharedPreferences: Demo
Quiz: Jetpack Security
Securing DataStore
SQL Databases: Passcode-based Encryption
NoSQL Databases: Security Considerations
Quiz: Securing Databases

Network Data Protection

Network Data Protection
Network Data Protection: Overview
Public Key Infrastructure
Public Key Infrastructure: Quiz
Transport Layer Security (TLS)
Transport Layer Security: Quiz
Certificate Pinning
Certificate Transparency
Certificate Transparency: Demo
Certificate Revocation
Certificates: Quiz
Network Security Config
Network Security Config: Demo
Network Security Config: Quiz

Authentication & Authorization

Authentication & Authorization
Authentication & Authorization: Overview
Authentication vs. Authorization
Authentication vs. Authorization: Quiz
Biometric Authentication
Biometric Authentication: Demo
User Authentication: Authentication Methods
Credential Manager
WebAuthn
Credential Manager: Demo
User Authentication: Quiz
OAuth 2.0
OAuth 2.0: Google OAuth 2.0 for Mobile
OAuth 2.0: Demo
Refresh Token
OpenID Connect
JSON Web Token (JWT)
ID Token
OpenID Connect: Google Identity Services
Single Sign-on (SSO)
Authentication & Authorization Protocols: Quiz
APIs: Basic Authentication
APIs: API Keys
APIs: OAuth 2.0
APIs: JWT
API Authentication & Authorization: Quiz

Additional Topics

Google I/O 2023: Privacy & Security Updates

Outro

Recap