• Online, Self-Paced
Course Description

In this course you will learn how to identify and mitigate the most common Android application security vulnerabilities and attack vectors, including: weak server side controls, threats to data, SQL injection, cross-site scripting (XSS), session hijacking, threats to user privacy and confidentiality, native code attacks, and missing data encryption. Mitigation and best-practices include the Android software stack, the Android security model, access control methods, sandboxing, interprocess communications and implementing the security features of open-source developer tools.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to apply secure coding techniques to create Android applications with Java.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.