riversongs Posted January 7, 2024 Report Share Posted January 7, 2024 Free Download Mastering Android Privacy & SecurityPublished 1/2024MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.90 GB | Duration: 12h 46mBecome an expert for wide-ranging privacy and security topics!What you'll learnUnderstand how to design apps with privacy and security in mindBe able to discuss a wide variety of privacy and security-related topicsKnow about fundamental Android security conceptsUnderstand symmetric and asymmetric cryptography algorithms, and how to apply it on AndroidUnderstand hashing algorithms, and how to apply it on AndroidLearn how to protect data at rest and data in transitRequirementsSome prior experience in mobile app development (preferably Android) is expectedDescriptionGain insightful knowledge about a wide spectrum of privacy and security topics in this course. In general, many topics are relevant across platforms and technologies such as cryptography and authentication & authorization standards. Specifically for Android, there is a deep dive into all the individual topics. This includes fundamental concepts, best practices, detailed walkthroughs, and plenty of demos taught by a Tech Lead of a Google Developer Agency. Stefan started developing Android apps - almost from Android's birth - in 2011, and since then had to design and develop a handful of Android apps. The apps involved privacy and security aspects as well and therefore he wants to share his experience in this course.Privacy and security topics are often overlooked when designing and developing mobile apps because the concepts are often unclear. However, it is important to develop apps with privacy and security in mind to improve UX, data safety, and finally user satisfaction. Depending on the app to be developed, there may be special requirements when it comes to privacy and security, too. Furthermore, when you apply for a job at any of the big FAANG companies, system design questions are likely to involve privacy and security aspects. So, knowing in detail about these topics will help you to stand out against other applicants.More than 12 hours of on-demand video content will cover what you need to know to master privacy & security:Learn about privacy & security concepts on Android by gaining lots of overall knowledge, knowing best practices, following detailed walkthroughs and demosBe well prepared for system design interviews at any of the big FAANG companies when it comes to privacy & security-related topicsKnow how to improve privacy by minimizing permission requestsApproaches to ensure user data privacy: Package visibility, data storage & device IDsApply data access auditing and other techniques to ensure transparency & controlDeep dive into security concepts Android is built upon: From kernel security to app securityHow to use the Android Keystore system for secure storage of a device's Trusted Execution Environment or Secure ElementUnderstand symmetric & asymmetric cryptography, and hashing: Concepts, algorithms walkthrough, demos, implementation on AndroidGet insights into how to protect local data including EncryptedFile and EncryptedSharedPreferences, and secure SQL & NoSQL databasesDiscussion of network security concepts: Public Key Infrastructure & TLSChoosing the right approach to securely transmit network data on Android by using certificate pinning, certificate transparency, or the Android network security configOverview of authentication & authorization standards like OAuth 2.0 and OpenID Connect, and how they can be applied on AndroidOverviewSection 1: IntroductionLecture 1 IntroductionLecture 2 Course OverviewLecture 3 Download your slidesSection 2: Privacy: PermissionsLecture 4 PermissionsLecture 5 Permissions: OverviewLecture 6 Permissions: IntroLecture 7 Permissions: WorkflowLecture 8 Permissions: DemoLecture 9 Permissions: Special PermissionsLecture 10 Permissions: Best PracticesLecture 11 Permissions: Request MinimizationLecture 12 Permissions: Demo Request MinimizationLecture 13 Permissions: Prominent Disclosure & ConsentSection 3: Privacy: LocationLecture 14 LocationLecture 15 Location: OverviewLecture 16 Location: IntroLecture 17 Locations: BackgroundLecture 18 Location: Permission Best PracticesLecture 19 Location: Use MinimizationLecture 20 Location: DemoSection 4: Privacy: DataLecture 21 DataLecture 22 Data: OverviewLecture 23 Data: Package VisibilityLecture 24 Data: Package Visibility Use CasesLecture 25 Data: Scoped StorageLecture 26 Data: Unique IdentifiersLecture 27 Data: Unique Identifiers Use CasesSection 5: Transparency & ControlLecture 28 Transparency & ControlLecture 29 Transparency & Control: OverviewLecture 30 Transparency & Control: Data Access AuditingLecture 31 Transparency & Control: Data Access Auditing DemoLecture 32 Transparency & Control: Data SafetyLecture 33 Transparency & Control: Data Safety DemoLecture 34 Transparency & Control: Privacy UI ElementsLecture 35 Transparency & Control: Privacy UI Elements DemoSection 6: Privacy: App HibernationLecture 36 App HibernationSection 7: Privacy: Privacy SandboxLecture 37 Privacy SandboxLecture 38 Privacy Sandbox: OverviewLecture 39 Privacy Sandbox: SDK RuntimeLecture 40 Privacy Sandbox: Privacy-Preserving APIsSection 8: Security: Android Security ConceptsLecture 41 Android Security ConceptsLecture 42 Android Security Concepts: OverviewLecture 43 Android Security IntroLecture 44 Kernel Security: Linux KernelLecture 45 Kernel Security: App SandboxLecture 46 Kernel Security: SELinuxLecture 47 Kernel Security: Verified BootLecture 48 Kernel Security: RootingLecture 49 Kernel Security: User SecurityLecture 50 Kernel Security: Additional ConceptsLecture 51 App Security: PermissionsLecture 52 App Security: IPCLecture 53 App Security: SigningLecture 54 App Security: Additional ConceptsSection 9: Security: Secure StorageLecture 55 Secure StorageLecture 56 Secure Storage: OverviewLecture 57 Secure Storage: Trusty TEELecture 58 Secure Storage: Secure ElementLecture 59 Secure Storage: KeystoreLecture 60 Secure Storage: AuthenticationLecture 61 Secure Storage: ApplicationsSection 10: CryptographyLecture 62 CryptographyLecture 63 Cryptography: OverviewLecture 64 Cryptography: IntroLecture 65 Symmetric CryptographyLecture 66 Symmetric Cryptography: Modes of OperationLecture 67 Modes of Operation: ECBLecture 68 Modes of Operation: CBCLecture 69 Modes of Operation: CFBLecture 70 Modes of Operation: OFBLecture 71 Modes of Operation: CTRLecture 72 Symmetric Cryptography: Data Encryption StandardLecture 73 Data Encryption Standard: WalkthroughLecture 74 Data Encryption Standard: DemoLecture 75 Cracking Data Encryption StandardLecture 76 Symmetric Cryptography: Triple DESLecture 77 Triple DES: DemoLecture 78 Symmetric Cryptography: Advanced Encryption StandardLecture 79 Advanced Encryption Standard: WalkthroughLecture 80 Advanced Encryption Standard: DemoLecture 81 Cracking Advanced Encryption StandardLecture 82 Asymmetric Cryptography IntroLecture 83 Asymmetric Cryptography: Diffie-Hellman Key ExchangeLecture 84 Diffie-Hellman Key Exchange: ExampleLecture 85 Diffie-Hellman Key Exchange: DemoLecture 86 Cracking Diffie-Hellman Key ExchangeLecture 87 Asymmetric Cryptography: RSALecture 88 RSA: ExampleLecture 89 RSA: DemoLecture 90 Cracking RSALecture 91 Asymmetric Cryptography: Elliptic Curve CryptographyLecture 92 Elliptic Curve Cryptography: Diffie-Hellman AlgorithmLecture 93 Elliptic Curve Cryptography: Digital Signature AlgorithmLecture 94 Elliptic Curve Cryptography: DemoLecture 95 Asymmetric Cryptography: ECC vs. RSALecture 96 Cracking Elliptic Curve CryptographyLecture 97 Android KeyStore SystemLecture 98 Android KeyStore System: DemoLecture 99 Hashing: IntroLecture 100 Hashing: MD5Lecture 101 Hashing: SHA-1Lecture 102 Hashing: SHA-1 vs. SHA-2 vs. SHA-3Lecture 103 Hashing: SHA-2 AdoptionsLecture 104 Hashing: SHA-3Lecture 105 Hashing: DemoLecture 106 HMACLecture 107 HMAC: DemoSection 11: Local Data ProtectionLecture 108 Local Data ProtectionLecture 109 Local Data Protection: OverviewLecture 110 Storage Types: File System StorageLecture 111 Media Permissions: Android 13 & 14Lecture 112 Media Permissions: DemoLecture 113 Storage Types: SharedPreferences & DataStoreLecture 114 Storage Types: SQL & NoSQL DatabasesLecture 115 Jetpack Security: IntroLecture 116 Jetpack Security: MasterKeyLecture 117 Modes of Operation: Galois Counter ModeLecture 118 MasterKey: DemoLecture 119 Jetpack Security: EncryptedFileLecture 120 EncryptedFile: DemoLecture 121 Jetpack Security: EncryptedSharedPreferencesLecture 122 AES256-SIV-CMACLecture 123 EncryptedSharedPreferences: DemoLecture 124 Securing DataStoreLecture 125 SQL Databases: Passcode-based EncryptionLecture 126 NoSQL Databases: Security ConsiderationsSection 12: Network Data ProtectionLecture 127 Network Data ProtectionLecture 128 Network Data Protection: OverviewLecture 129 Public Key InfrastructureLecture 130 Transport Layer Security (TLS)Lecture 131 Certificate PinningLecture 132 Certificate TransparencyLecture 133 Certificate Transparency: DemoLecture 134 Certificate RevocationLecture 135 Network Security ConfigLecture 136 Network Security Config: DemoSection 13: Authentication & AuthorizationLecture 137 Authentication & AuthorizationLecture 138 Authentication & Authorization: OverviewLecture 139 Authentication vs. AuthorizationLecture 140 Biometric AuthenticationLecture 141 Biometric Authentication: DemoLecture 142 User Authentication: Authentication MethodsLecture 143 Credential ManagerLecture 144 WebAuthnLecture 145 Credential Manager: DemoLecture 146 OAuth 2.0Lecture 147 OAuth 2.0: Google OAuth 2.0 for MobileLecture 148 OAuth 2.0: DemoLecture 149 Refresh TokenLecture 150 OpenID ConnectLecture 151 JSON Web Token (JWT)Lecture 152 ID TokenLecture 153 OpenID Connect: Google Identity ServicesLecture 154 Single Sign-on (SSO)Lecture 155 APIs: Basic AuthenticationLecture 156 APIs: API KeysLecture 157 APIs: OAuth 2.0Lecture 158 APIs: JWTSection 14: Additional TopicsLecture 159 Google I/O 2023: Privacy & Security UpdatesSection 15: OutroLecture 160 RecapAndroid developers wanting to deep dive into privacy and security,Software engineers preparing for system design interviewsHomepagehttps://www.udemy.com/course/mastering-android-privacy-security/Download ( Rapidgator )https://rg.to/file/2f81a23c9f77a2965111cc7608c0adcc/cdfro.Mastering.Android.Privacy..Security.part1.rar.htmlhttps://rg.to/file/0a0396bc1ef2cac927e02d63adbda4df/cdfro.Mastering.Android.Privacy..Security.part2.rar.htmlhttps://rg.to/file/714b7e1e13ec8f77c96e341ed3e7ee77/cdfro.Mastering.Android.Privacy..Security.part3.rar.htmlUploadgighttps://uploadgig.com/file/download/d7E0f58c61af7108/cdfro.Mastering.Android.Privacy..Security.part1.rarhttps://uploadgig.com/file/download/87cFc8dD275F7780/cdfro.Mastering.Android.Privacy..Security.part2.rarhttps://uploadgig.com/file/download/ebCf3D87e74b6857/cdfro.Mastering.Android.Privacy..Security.part3.rarDownload ( NitroFlare )https://nitroflare.com/view/361A3D8D868DD4D/cdfro.Mastering.Android.Privacy..Security.part1.rarhttps://nitroflare.com/view/1360A8E894B2953/cdfro.Mastering.Android.Privacy..Security.part2.rarhttps://nitroflare.com/view/C2CCD5E93665FE9/cdfro.Mastering.Android.Privacy..Security.part3.rarFikperhttps://fikper.com/GKzCxjvYiu/cdfro.Mastering.Android.Privacy..Security.part1.rar.htmlhttps://fikper.com/UwPwxNvT9A/cdfro.Mastering.Android.Privacy..Security.part2.rar.htmlhttps://fikper.com/RlJhS2QlzK/cdfro.Mastering.Android.Privacy..Security.part3.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now