oaxino Posted October 3, 2024 Report Share Posted October 3, 2024 Mastering Android Privacy & SecurityLast updated 7/2024MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.88 GB | Duration: 12h 36mBecome an expert for wide-ranging privacy and security topics!What you'll learnUnderstand how to design apps with privacy and security in mindBe able to discuss a wide variety of privacy and security-related topicsKnow about fundamental Android security conceptsUnderstand symmetric and asymmetric cryptography algorithms, and how to apply it on AndroidUnderstand hashing algorithms, and how to apply it on AndroidLearn how to protect data at rest and data in transitRequirementsSome prior experience in mobile app development (preferably Android) is expectedDescriptionGain insightful knowledge about a wide spectrum of privacy and security topics in this course. In general, many topics are relevant across platforms and technologies such as cryptography and authentication & authorization standards. Specifically for Android, there is a deep dive into all the individual topics. This includes fundamental concepts, best practices, detailed walkthroughs, and plenty of demos taught by a Tech Lead of a Google Developer Agency. Stefan started developing Android apps - almost from Android's birth - in 2011, and since then had to design and develop a handful of Android apps. The apps involved privacy and security aspects as well and therefore he wants to share his experience in this course.Privacy and security topics are often overlooked when designing and developing mobile apps because the concepts are often unclear. However, it is important to develop apps with privacy and security in mind to improve UX, data safety, and finally user satisfaction. Depending on the app to be developed, there may be special requirements when it comes to privacy and security, too. Furthermore, when you apply for a job at any of the big FAANG companies, system design questions are likely to involve privacy and security aspects. So, knowing in detail about these topics will help you to stand out against other applicants.More than 12 hours of on-demand video content will cover what you need to know to master privacy & security:Learn about privacy & security concepts on Android by gaining lots of overall knowledge, knowing best practices, following detailed walkthroughs and demosBe well prepared for system design interviews at any of the big FAANG companies when it comes to privacy & security-related topicsKnow how to improve privacy by minimizing permission requestsApproaches to ensure user data privacy: Package visibility, data storage & device IDsApply data access auditing and other techniques to ensure transparency & controlDeep dive into security concepts Android is built upon: From kernel security to app securityHow to use the Android Keystore system for secure storage of a device's Trusted Execution Environment or Secure ElementUnderstand symmetric & asymmetric cryptography, and hashing: Concepts, algorithms walkthrough, demos, implementation on AndroidGet insights into how to protect local data including EncryptedFile and EncryptedSharedPreferences, and secure SQL & NoSQL databasesDiscussion of network security concepts: Public Key Infrastructure & TLSChoosing the right approach to securely transmit network data on Android by using certificate pinning, certificate transparency, or the Android network security configOverview of authentication & authorization standards like OAuth 2.0 and OpenID Connect, and how they can be applied on AndroidOverviewSection 1: IntroductionLecture 1 IntroductionLecture 2 Course OverviewLecture 3 Download your slidesSection 2: Privacy: PermissionsLecture 4 PermissionsLecture 5 Permissions: OverviewLecture 6 Permissions: IntroLecture 7 Permissions: WorkflowLecture 8 Permissions: DemoLecture 9 Permissions: Special PermissionsLecture 10 Permissions: Best PracticesLecture 11 Permissions: Request MinimizationLecture 12 Permissions: Demo Request MinimizationLecture 13 Permissions: Prominent Disclosure & ConsentSection 3: Privacy: LocationLecture 14 LocationLecture 15 Location: OverviewLecture 16 Location: IntroLecture 17 Locations: BackgroundLecture 18 Location: Permission Best PracticesLecture 19 Location: Use MinimizationLecture 20 Location: DemoSection 4: Privacy: DataLecture 21 DataLecture 22 Data: OverviewLecture 23 Data: Package VisibilityLecture 24 Data: Package Visibility Use CasesLecture 25 Data: Scoped StorageLecture 26 Data: Unique IdentifiersLecture 27 Data: Unique Identifiers Use CasesSection 5: Transparency & ControlLecture 28 Transparency & ControlLecture 29 Transparency & Control: OverviewLecture 30 Transparency & Control: Data Access AuditingLecture 31 Transparency & Control: Data Access Auditing DemoLecture 32 Transparency & Control: Data SafetyLecture 33 Transparency & Control: Data Safety DemoLecture 34 Transparency & Control: Privacy UI ElementsLecture 35 Transparency & Control: Privacy UI Elements DemoSection 6: Privacy: App HibernationLecture 36 App HibernationSection 7: Privacy: Privacy SandboxLecture 37 Privacy SandboxLecture 38 Privacy Sandbox: OverviewLecture 39 Privacy Sandbox: SDK RuntimeLecture 40 Privacy Sandbox: Privacy-Preserving APIsSection 8: Security: Android Security ConceptsLecture 41 Android Security ConceptsLecture 42 Android Security Concepts: OverviewLecture 43 Android Security IntroLecture 44 Kernel Security: Linux KernelLecture 45 Kernel Security: App SandboxLecture 46 Kernel Security: SELinuxLecture 47 Kernel Security: Verified BootLecture 48 Kernel Security: RootingLecture 49 Kernel Security: User SecurityLecture 50 Kernel Security: Additional ConceptsLecture 51 App Security: PermissionsLecture 52 App Security: IPCLecture 53 App Security: SigningLecture 54 App Security: Additional ConceptsSection 9: Security: Secure StorageLecture 55 Secure StorageLecture 56 Secure Storage: OverviewLecture 57 Secure Storage: Trusty TEELecture 58 Secure Storage: Secure ElementLecture 59 Secure Storage: KeystoreLecture 60 Secure Storage: AuthenticationLecture 61 Secure Storage: ApplicationsSection 10: Symmetric CryptographyLecture 62 Symmetric CryptographyLecture 63 Symmetric Cryptography: OverviewLecture 64 Cryptography: IntroLecture 65 Symmetric CryptographyLecture 66 Symmetric Cryptography: Modes of OperationLecture 67 Modes of Operation: ECBLecture 68 Modes of Operation: CBCLecture 69 Modes of Operation: CFBLecture 70 Modes of Operation: OFBLecture 71 Modes of Operation: CTRLecture 72 Symmetric Cryptography: Data Encryption StandardLecture 73 Data Encryption Standard: WalkthroughLecture 74 Data Encryption Standard: DemoLecture 75 Cracking Data Encryption StandardLecture 76 Symmetric Cryptography: Triple DESLecture 77 Triple DES: DemoLecture 78 Symmetric Cryptography: Advanced Encryption StandardLecture 79 Advanced Encryption Standard: WalkthroughLecture 80 Advanced Encryption Standard: DemoLecture 81 Cracking Advanced Encryption StandardSection 11: Asymmetric CryptographyLecture 82 Asymmetric CrypographyLecture 83 Asymmetric Crypography: OverviewLecture 84 Asymmetric Cryptography IntroLecture 85 Asymmetric Cryptography: Diffie-Hellman Key ExchangeLecture 86 Diffie-Hellman Key Exchange: ExampleLecture 87 Diffie-Hellman Key Exchange: DemoLecture 88 Cracking Diffie-Hellman Key ExchangeLecture 89 Asymmetric Cryptography: RSALecture 90 RSA: ExampleLecture 91 RSA: DemoLecture 92 Cracking RSALecture 93 Asymmetric Cryptography: Elliptic Curve CryptographyLecture 94 Elliptic Curve Cryptography: Diffie-Hellman AlgorithmLecture 95 Elliptic Curve Cryptography: Digital Signature AlgorithmLecture 96 Elliptic Curve Cryptography: DemoLecture 97 Asymmetric Cryptography: ECC vs. RSALecture 98 Cracking Elliptic Curve CryptographyLecture 99 Android KeyStore SystemLecture 100 Android KeyStore System: DemoSection 12: HashingLecture 101 HashingLecture 102 Hashing: OverviewLecture 103 Hashing: IntroLecture 104 Hashing: MD5Lecture 105 Hashing: SHA-1Lecture 106 Hashing: SHA-1 vs. SHA-2 vs. SHA-3Lecture 107 Hashing: SHA-2 AdoptionsLecture 108 Hashing: SHA-3Lecture 109 Hashing: DemoLecture 110 HMACLecture 111 HMAC: DemoSection 13: Local Data ProtectionLecture 112 Local Data ProtectionLecture 113 Local Data Protection: OverviewLecture 114 Storage Types: File System StorageLecture 115 Media Permissions: Android 13 & 14Lecture 116 Media Permissions: DemoLecture 117 Storage Types: SharedPreferences & DataStoreLecture 118 Storage Types: SQL & NoSQL DatabasesLecture 119 Jetpack Security: IntroLecture 120 Jetpack Security: MasterKeyLecture 121 Modes of Operation: Galois Counter ModeLecture 122 MasterKey: DemoLecture 123 Jetpack Security: EncryptedFileLecture 124 EncryptedFile: DemoLecture 125 Jetpack Security: EncryptedSharedPreferencesLecture 126 AES256-SIV-CMACLecture 127 EncryptedSharedPreferences: DemoLecture 128 Securing DataStoreLecture 129 SQL Databases: Passcode-based EncryptionLecture 130 NoSQL Databases: Security ConsiderationsSection 14: Network Data ProtectionLecture 131 Network Data ProtectionLecture 132 Network Data Protection: OverviewLecture 133 Public Key InfrastructureLecture 134 Transport Layer Security (TLS)Lecture 135 Certificate PinningLecture 136 Certificate TransparencyLecture 137 Certificate Transparency: DemoLecture 138 Certificate RevocationLecture 139 Network Security ConfigLecture 140 Network Security Config: DemoSection 15: Authentication & AuthorizationLecture 141 Authentication & AuthorizationLecture 142 Authentication & Authorization: OverviewLecture 143 Authentication vs. AuthorizationLecture 144 Biometric AuthenticationLecture 145 Biometric Authentication: DemoLecture 146 User Authentication: Authentication MethodsLecture 147 Credential ManagerLecture 148 WebAuthnLecture 149 Credential Manager: DemoLecture 150 OAuth 2.0Lecture 151 OAuth 2.0: Google OAuth 2.0 for MobileLecture 152 OAuth 2.0: DemoLecture 153 Refresh TokenLecture 154 OpenID ConnectLecture 155 JSON Web Token (JWT)Lecture 156 ID TokenLecture 157 OpenID Connect: Google Identity ServicesLecture 158 Single Sign-on (SSO)Lecture 159 APIs: Basic AuthenticationLecture 160 APIs: API KeysLecture 161 APIs: OAuth 2.0Lecture 162 APIs: JWTSection 16: Additional TopicsLecture 163 Google I/O 2023: Privacy & Security UpdatesSection 17: Google I/O 2024 AdditionsLecture 164 Google I/O 2024Lecture 165 Google I/O 2024 Additions: OverviewLecture 166 Google I/O 2024: Privacy SandboxLecture 167 Google I/O 2024: ChecksLecture 168 Google I/O 2024: What's new in Android Security?Lecture 169 Google I/O 2024: What's new in Credential Manager?Section 18: OutroLecture 170 RecapAndroid developers wanting to deep dive into privacy and security,Software engineers preparing for system design interviewsScreenshotsrapidgator.net:https://rapidgator.net/file/74de12d0bd413d75c0d7f12645c1f22d/rlefc.Mastering.Android.Privacy..Security.part1.rar.htmlhttps://rapidgator.net/file/bfe5aa971802089d7bfa39b87dd846ad/rlefc.Mastering.Android.Privacy..Security.part2.rar.htmlhttps://rapidgator.net/file/dbaeb0c5a8a3e94d1b61c5f339807d00/rlefc.Mastering.Android.Privacy..Security.part3.rar.htmlddownload.com:https://ddownload.com/d92qn7j9un8a/rlefc.Mastering.Android.Privacy..Security.part1.rarhttps://ddownload.com/8ddguh33lmks/rlefc.Mastering.Android.Privacy..Security.part2.rarhttps://ddownload.com/9qd56jvgfhjv/rlefc.Mastering.Android.Privacy..Security.part3.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now