Master Android Security & Privacy: 2024 Pro Guide
Focused View
12:36:07
1 - Introduction.mp4
02:53
2 - Course Overview.mp4
03:41
3 - Download your slides.html
3 - Mastering-Android-Privacy-Security-Udemy-Course.pdf
3 - Mastering-Android-Privacy-Security-Udemy-Course-Useful-Links.pdf
4 - Permissions.mp4
00:31
5 - Permissions Overview.mp4
00:37
6 - Permissions Intro.mp4
03:04
7 - Permissions Workflow.mp4
00:55
8 - Permissions Demo.mp4
09:37
9 - Permissions Special Permissions.mp4
01:44
10 - Permissions Best Practices.mp4
10:33
11 - Permissions Request Minimization.mp4
04:27
12 - Permissions Demo Request Minimization.mp4
03:05
13 - Permissions Prominent Disclosure Consent.mp4
02:39
14 - Location.mp4
00:15
15 - Location Overview.mp4
00:17
16 - Location Intro.mp4
06:30
17 - Locations Background.mp4
01:14
18 - Location Permission Best Practices.mp4
03:46
19 - Location Use Minimization.mp4
03:31
20 - Location Demo.mp4
05:16
21 - Data.mp4
00:21
22 - Data Overview.mp4
00:28
23 - Data Package Visibility.mp4
04:31
24 - Data Package Visibility Use Cases.mp4
05:30
25 - Data Scoped Storage.mp4
01:23
26 - Data Unique Identifiers.mp4
10:21
27 - Data Unique Identifiers Use Cases.mp4
06:23
28 - Transparency Control.mp4
00:25
29 - Transparency Control Overview.mp4
00:27
30 - Transparency Control Data Access Auditing.mp4
02:40
31 - Transparency Control Data Access Auditing Demo.mp4
06:36
32 - Transparency Control Data Safety.mp4
08:49
33 - Transparency Control Data Safety Demo.mp4
04:42
34 - Transparency Control Privacy UI Elements.mp4
02:42
35 - Transparency Control Privacy UI Elements Demo.mp4
07:26
36 - App Hibernation.mp4
04:20
37 - Privacy Sandbox.mp4
01:29
38 - Privacy Sandbox Overview.mp4
00:29
39 - Privacy Sandbox SDK Runtime.mp4
08:55
40 - Privacy Sandbox PrivacyPreserving APIs.mp4
04:09
41 - Android Security Concepts.mp4
00:28
42 - Android Security Concepts Overview.mp4
01:34
43 - Android Security Intro.mp4
06:21
44 - Kernel Security Linux Kernel.mp4
01:00
45 - Kernel Security App Sandbox.mp4
04:36
46 - Kernel Security SELinux.mp4
04:34
47 - Kernel Security Verified Boot.mp4
06:29
48 - Kernel Security Rooting.mp4
02:12
49 - Kernel Security User Security.mp4
05:16
50 - Kernel Security Additional Concepts.mp4
01:16
51 - App Security Permissions.mp4
07:53
52 - App Security IPC.mp4
05:00
53 - App Security Signing.mp4
04:46
54 - App Security Additional Concepts.mp4
02:23
55 - Secure Storage.mp4
00:25
56 - Secure Storage Overview.mp4
00:54
57 - Secure Storage Trusty TEE.mp4
05:41
58 - Secure Storage Secure Element.mp4
02:43
59 - Secure Storage Keystore.mp4
09:03
60 - Secure Storage Authentication.mp4
11:09
61 - Secure Storage Applications.mp4
04:25
62 - Symmetric Cryptography.mp4
00:31
63 - Symmetric Cryptography Overview.mp4
00:25
64 - Cryptography Intro.mp4
06:09
65 - Symmetric Cryptography.mp4
05:01
66 - Symmetric Cryptography Modes of Operation.mp4
01:55
67 - Modes of Operation ECB.mp4
02:28
68 - Modes of Operation CBC.mp4
02:20
69 - Modes of Operation CFB.mp4
04:22
70 - Modes of Operation OFB.mp4
02:54
71 - Modes of Operation CTR.mp4
02:28
72 - Symmetric Cryptography Data Encryption Standard.mp4
05:11
73 - Data Encryption Standard Walkthrough.mp4
14:42
74 - Data Encryption Standard Demo.mp4
10:17
75 - Cracking Data Encryption Standard.mp4
03:32
76 - Symmetric Cryptography Triple DES.mp4
01:11
77 - Triple DES Demo.mp4
07:03
78 - Symmetric Cryptography Advanced Encryption Standard.mp4
04:18
79 - Advanced Encryption Standard Walkthrough.mp4
11:06
80 - Advanced Encryption Standard Demo.mp4
07:42
81 - Cracking Advanced Encryption Standard.mp4
02:44
82 - Asymmetric Crypography.mp4
00:25
83 - Asymmetric Crypography Overview.mp4
00:44
84 - Asymmetric Cryptography Intro.mp4
03:51
85 - Asymmetric Cryptography DiffieHellman Key Exchange.mp4
08:02
86 - DiffieHellman Key Exchange Example.mp4
08:43
87 - DiffieHellman Key Exchange Demo.mp4
04:44
88 - Cracking DiffieHellman Key Exchange.mp4
03:52
89 - Asymmetric Cryptography RSA.mp4
05:05
90 - RSA Example.mp4
05:46
91 - RSA Demo.mp4
04:37
92 - Cracking RSA.mp4
01:28
93 - Asymmetric Cryptography Elliptic Curve Cryptography.mp4
08:10
94 - Elliptic Curve Cryptography DiffieHellman Algorithm.mp4
03:13
95 - Elliptic Curve Cryptography Digital Signature Algorithm.mp4
08:05
96 - Elliptic Curve Cryptography Demo.mp4
04:47
97 - Asymmetric Cryptography ECC vs RSA.mp4
03:05
98 - Cracking Elliptic Curve Cryptography.mp4
01:59
99 - Android KeyStore System.mp4
06:32
100 - Android KeyStore System Demo.mp4
06:09
101 - Hashing.mp4
00:28
102 - Hashing Overview.mp4
00:26
103 - Hashing Intro.mp4
06:13
104 - Hashing MD5.mp4
10:37
105 - Hashing SHA1.mp4
08:11
106 - Hashing SHA1 vs SHA2 vs SHA3.mp4
07:07
107 - Hashing SHA2 Adoptions.mp4
11:53
108 - Hashing SHA3.mp4
06:01
109 - Hashing Demo.mp4
02:20
110 - HMAC.mp4
04:09
111 - HMAC Demo.mp4
03:22
112 - Local Data Protection.mp4
00:25
113 - Local Data Protection Overview.mp4
01:27
114 - Storage Types File System Storage.mp4
04:54
115 - Media Permissions Android 13 14.mp4
04:47
116 - Media Permissions Demo.mp4
06:01
117 - Storage Types SharedPreferences DataStore.mp4
03:51
118 - Storage Types SQL NoSQL Databases.mp4
09:13
119 - Jetpack Security Intro.mp4
01:13
120 - Jetpack Security MasterKey.mp4
02:18
121 - Modes of Operation Galois Counter Mode.mp4
07:07
122 - MasterKey Demo.mp4
04:23
123 - Jetpack Security EncryptedFile.mp4
02:27
124 - EncryptedFile Demo.mp4
02:38
125 - Jetpack Security EncryptedSharedPreferences.mp4
01:01
126 - AES256SIVCMAC.mp4
04:20
127 - EncryptedSharedPreferences Demo.mp4
03:03
128 - Securing DataStore.mp4
02:46
129 - SQL Databases Passcodebased Encryption.mp4
07:30
130 - NoSQL Databases Security Considerations.mp4
02:46
131 - Network Data Protection.mp4
00:45
132 - Network Data Protection Overview.mp4
01:17
133 - Public Key Infrastructure.mp4
10:23
134 - Transport Layer Security TLS.mp4
08:26
135 - Certificate Pinning.mp4
06:33
136 - Certificate Transparency.mp4
09:38
137 - Certificate Transparency Demo.mp4
10:34
138 - Certificate Revocation.mp4
05:50
139 - Network Security Config.mp4
03:44
140 - Network Security Config Demo.mp4
05:45
141 - Authentication Authorization.mp4
00:36
142 - Authentication Authorization Overview.mp4
01:10
143 - Authentication vs Authorization.mp4
01:21
144 - Biometric Authentication.mp4
06:31
145 - Biometric Authentication Demo.mp4
16:42
146 - User Authentication Authentication Methods.mp4
03:25
147 - Credential Manager.mp4
05:30
148 - WebAuthn.mp4
04:37
149 - Credential Manager Demo.mp4
11:56
150 - OAuth 20.mp4
04:36
151 - OAuth 20 Google OAuth 20 for Mobile.mp4
06:24
152 - OAuth 20 Demo.mp4
03:24
153 - Refresh Token.mp4
03:37
154 - OpenID Connect.mp4
02:37
155 - JSON Web Token JWT.mp4
03:51
156 - ID Token.mp4
01:22
157 - OpenID Connect Google Identity Services.mp4
06:34
158 - Single Signon SSO.mp4
05:55
159 - APIs Basic Authentication.mp4
01:22
160 - APIs API Keys.mp4
01:52
161 - APIs OAuth 20.mp4
01:42
162 - APIs JWT.mp4
01:48
163 - Google IO 2023 Privacy Security Updates.mp4
04:57
164 - Google IO 2024.mp4
00:58
165 - Google IO 2024 Additions Overview.mp4
01:57
166 - Google IO 2024 Privacy Sandbox.mp4
06:55
167 - Google IO 2024 Checks.mp4
09:37
168 - Google IO 2024 Whats new in Android Security.mp4
11:39
169 - Google IO 2024 Whats new in Credential Manager.mp4
03:23
170 - Recap.mp4
03:32
More details
Course Overview
Become an expert in Android privacy and security with this comprehensive guide. Learn to design secure apps, implement cryptography, and protect user data with industry best practices.
What You'll Learn
- Design apps with privacy and security in mind
- Implement symmetric/asymmetric cryptography on Android
- Protect data at rest and in transit using modern techniques
Who This Is For
- Android developers diving into security
- Software engineers preparing for system design interviews
- Mobile developers wanting to secure their applications
Key Benefits
- Master Android's security architecture and permissions system
- Learn cryptographic implementations with hands-on demos
- Stay updated with Google's latest privacy features (2024)
Curriculum Highlights
- Android Privacy Fundamentals (Permissions, Location, Data)
- Security Concepts & Secure Storage
- Cryptography & Data Protection Techniques
Focused display
- language english
- Training sessions 169
- duration 12:36:07
- Release Date 2025/06/02