Security Vulnerabilities & Enterprise Considerations

Android Studio 1.2.0
  • 10 Videos | 53m 13s
  • Includes Assessment
  • Earns a Badge
Likes 3 Likes 3
There are a variety of tools and methods for testing Android applications in hopes of exposing potential vulnerabilities prior to deployment. Learn about various vulnerabilities as they pertain specifically to Android applications.

WHAT YOU WILL LEARN

  • identify common mobile device security issues
    describe the methodology used for identifying malware on Android
    describe the general methodology used to reverse engineer an Android application so as to reveal malicious threats
    describe Android mobile browser vulnerabilities
    describe Android security concerns that ought to be addressed in the enterprise environment
  • describe compliance and audit considerations that must be taken into account when developing Android apps for enterprise
    describe considerations for using user-owned, untrusted devices as well as untrusted applications and networks
    describe considerations for dealing with untrusted systems and content on an enterprise network
    describe recommended security practices for mobiles in the enterprise environment
    identify device administration policies and describe how they are implemented on an Android device

IN THIS COURSE

  • Playable
    1. 
    Identifying Common Mobile Security Issues
    4m 46s
    UP NEXT
  • Playable
    2. 
    Identifying Android Malware
    4m 24s
  • Locked
    3. 
    Using Reverse Engineering to Reveal Threats
    4m 25s
  • Locked
    4. 
    Exploring Mobile Browser Vulnerabilities
    5m 44s
  • Locked
    5. 
    Overview on Android Security Concerns in Enterprise
    5m 44s
  • Locked
    6. 
    Understanding Compliance and Audit Considerations
    3m 13s
  • Locked
    7. 
    Using Untrusted Devices, Applications, and Networks
    3m 57s
  • Locked
    8. 
    Working with Untrusted Systems and Content
    3m 15s
  • Locked
    9. 
    Using Recommended Security Practices for Mobiles
    4m 21s
  • Locked
    10. 
    Working with Device Administration Policies
    8m 25s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 3 Likes 3  
Likes 36 Likes 36  
Likes 8 Likes 8  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 18 Likes 18  
Likes 8 Likes 8  
Likes 13 Likes 13