Android 5 Security: Inter-app and Network Communication Security
This course will give you a better understanding of how you can ensure that your app’s interaction with other apps is secure and how to configure your app so that the network requests being made from it are not prone to attacks by malicious entities.
All Android apps need to interact with other apps on the device and make network requests to the backend servers. Having a good understanding of the security mechanisms provided by the Android platform to safeguard user data against attacks is a very important part of creating robust apps that users love and trust. In this course, Inter-app and Network communication security, you will gain an in-depth understanding of the tools provided by the Android platform so that you can guard user data in your app from other malicious apps and transmit it securely over network. First, you will learn about the various types of mechanisms used by apps to interact with one another and the precautions to take while using them to ensure that only trusted apps gain access to your app’s data and functionality. Next, you will discover how to make network requests such that intermediate or malicious entities are unable to access or modify the data while it’s in transit. Finally, you will explore some advanced techniques to protect your app’s network requests against more sophisticated network attacks. When you are done with this course, you will have a very well rounded understanding of Android’s security model and you will have a great tool box to come back to whenever dealing with security considerations for an app.
Author Name: Nitin Singh
Author Description:
Nitin is a full stack developer with over 10+ years of experience developing world class apps and SDKs that are used and loved by millions of users. He is currently working on creating the first Remote Job search engine at Remote Only Engineers: https://remoteonlyengineers.com
Table of Contents
- Course Overview
1min - Securing Interaction with Other Apps
12mins - Securing Network Communication Using Network Security Configurations
15mins - Securing Network Communication Using Certificate Authorities and Certificate Pinning
12mins
There are no reviews yet.