Loading Course Schedule...
PT8067
Summary
This class looks at the unique security problems faced by application developers writing code for today's mobile platforms. In this edition of the smart phone series, we take a close look at Google's Android Platform used by a wide variety of manufactures for mobile, tablet and other devices. The class presents a clear and practical view of the problems, how they can be attacked, as well as remediation steps against the various attacks. It is heavily hands-on driven to not just describe but demonstrate both the problems and the solutions available.This class starts with a description of the security problems faced by today's software developer, as well as a detailed description of relevant the Open Web Application Security Project's (OWASP) Top 10 of 2010 security defects. These defects are studied in instructor-lead sessions as well as in hands-on lab exercises in which each student learns how to actually exploit the defects to "break into" a real web application. (The labs are performed in safe test environments.)Next, the class covers the security principles that apply to smart phones, as well as illustrations of these issues through case studies and further hands-on exercises. The Android platform architecture and application architecture are then covered in detail, with descriptions of security services at the network/platform layer as well as security services available within the applications themselves.The class then looks at common security mechanisms found within applications, and discusses how to securely implement them in applications. To bring this all together, the class then covers development activities that can be performed throughout the design, implementation, and testing of an application.
Prerequisites
Students should have experience with Objective C, COCOA, and Xcode or at least be familiar with object oriented programming of some sort.
Duration
2 Days/Lecture & Lab
Audience
This course is designed for iOS app developers.
Topics
Preparation phase Understanding the problem::Security principles for smart phones::Platform architecture::Application architecture::Common security mechanisms::Design review using Threat Modeling::Code review::Security testing