This course discusses techniques for creating secure iOS applications. It covers several common vulnerabilities, such as exposure of authentication credentials, sensitive data, and other secrets; custom URL scheme-abuse; and XML eXternal Entity (XXE) Injection. It also describes techniques for mitigating these vulnerabilities. After you have completed this course, you will be able to protect data at rest with the data protection and common crypto APIs, mitigate sensitive data exposure in background snapshots, prevent custom URL scheme abuse, and mitigate XXE Injection.
On successful completion of this course, learners should have the knowledge and skills to:
- Protect data at rest with the Data Protection and Common Crypto APIs
- Mitigate sensitive data exposure in background snapshots
- Prevent custom URL scheme abuse
- Mitigate XXE Injection
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.