Android Security

This course is already delivered, please contact us for the next available session tel:+357 22 44 14 92
Course Outline in PDF


Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of when developing software for Android. Typical security pitfalls and vulnerabilities are described, along with recommendations and best practices to avoid and mitigate them.
The course explains the strengths and weaknesses of Android’s security architecture along with typical mistakes to avoid when developing software for the platform.

Who Should Attend:

Android application developers, architects and testers

At Course Completion:

•Understand basic concepts of security, IT security and secure coding
•Learn the security solutions on Android
•Learn to use various security features of the Android platform
•Get information about some recent vulnerabilities in Java on Android
•Get basic understanding on native code vulnerabilities on Android
•Learn about typical coding mistakes and how to avoid the
•Get practical knowledge in using security testing tools
•Get sources and further reading on secure coding practices


Module 1: IT security and secure coding

•Nature of security
•IT security related terms
•Definition of risk
•IT security vs. secure coding
•From vulnerabilities to botnets and cybercrime
•Classification of security flaws

Module 2: Android security overview

•Android fragmentation challenges
•The Android software stack
•OS security features and exploit mitigation techniques
•The Linux kernel
•Filesystem security
•Deploying applications

Module 3:Application security

•Writing secure Android applications
•Cryptography on Android

Module 4: Android and Java vulnerabilities

•Input validation
•SQL Injection
•Cross-Site Scripting (XSS)
•Buffer overflow possibilities in Android
•Protection techniques – ASLR, XN, RELRO,
•Improper use of security features
•Improper error and exception handling
•Code quality problems

Module 5:Testing Android code

•Testing Android code
•Android Lint
•Android Lint – Security features
•Lint exercise
•PMD exercise

Module 6: Knowledge sources

•Secure coding sources – a starter kit
•Vulnerability databases
sd sd sd sd sd sd sd sd sd sd sd sd