Africa & Middle East

10.00 A.M - 10.00 P.M

Call us

CompTIA Mobile App Security Plus Certification (Android Edition)

Course Objectives

  • Explain why an organization should devote time and resources to app security, including a specific rationale for Android app development.
  • Identify where and how the Android system architecture is vulnerable to security threats.
  • Employ strategies to promote the security of mobile apps, including specific strategies for Android.
  • Enable an Android app to communicate securely with hardware and software on the device.
  • Enable an Android app to secure data through encryption.
  • Enable an Android app to store data securely.
  • Enable an Android app to communicate securely over networks and with web services.
  • Use the WebView component securely.
  • Protect credentials in storage and in transit.
  • Harden an Android app against attack to levels appropriate for the risk mode

Course Outline

  1. Lesson 1: The Rationale for Android App Security
    1. Identify the Need for Security
    2. Identify Security Requirements and Expectations
    3. Include Security in Your Development Processes
    4. Identify Your Approach to Risk Management
  2. Lesson 2: The Android Security Architecture
    1. Strengths and Weaknesses of the Android Security Architecture
    2. The Android Permissions Model
    3. Android Vulnerabilities
  3. Lesson 3: Employing Secure Mobile App Development Strategies
    1. Follow App Security Best Practices
    2. Design for Security
    3. Write Secure Java Code
  4. Lesson 4: Accessing Local Processes and Devices Securely
    1. Select Countermeasures for Local Threats
    2. Implement Secure Access of Local Processes and Hardware
  5. Lesson 5: Securing Data Through Encryption
    1. Select Countermeasures for Threats to Cleartext Data
    2. Implement Encryption
  6. Lesson 6: Accessing Local Storage Securely
    1. Identify Countermeasures for Local Storage Threats
    2. Implement Secure Access of Local Storage
  7. Lesson 7: Communicating with Networks and Web Services Securely
    1. Identify Countermeasures for Networking Threats
    2. Implement Secure Network Communication
  8. Lesson 8: Using the WebView Component Securely
    1. Identify Countermeasures for WebView Component Threats
    2. Implement WebView Security
  9. Lesson 9: Protecting Credentials in Storage and Transit
    1. Identify Countermeasures for Threats to Credentials
    2. Implement Secure User Authentication
  10. Lesson 10: Hardening Apps Against Attack
    1. Identify Countermeasures for Reverse Engineering Threats
    2. Harden an App


Sum the simple Operation :
13 + 15 =