وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Mastering Android Privacy & Security

سرفصل های دوره

Become an expert for wide-ranging privacy and security topics!


1 - Introduction
  • 1 - Introduction
  • 2 - Course Overview
  • 3 - Download your slides.html
  • 3 - Mastering-Android-Privacy-Security-Udemy-Course.pdf
  • 3 - Mastering-Android-Privacy-Security-Udemy-Course-Useful-Links.pdf

  • 2 - Privacy Permissions
  • 4 - Permissions
  • 5 - Permissions Overview
  • 6 - Permissions Intro
  • 7 - Permissions Workflow
  • 8 - Permissions Demo
  • 9 - Permissions Special Permissions
  • 10 - Permissions Best Practices
  • 11 - Permissions Request Minimization
  • 12 - Permissions Demo Request Minimization
  • 13 - Permissions Prominent Disclosure Consent

  • 3 - Privacy Location
  • 14 - Location
  • 15 - Location Overview
  • 16 - Location Intro
  • 17 - Locations Background
  • 18 - Location Permission Best Practices
  • 19 - Location Use Minimization
  • 20 - Location Demo

  • 4 - Privacy Data
  • 21 - Data
  • 22 - Data Overview
  • 23 - Data Package Visibility
  • 24 - Data Package Visibility Use Cases
  • 25 - Data Scoped Storage
  • 26 - Data Unique Identifiers
  • 27 - Data Unique Identifiers Use Cases

  • 5 - Transparency Control
  • 28 - Transparency Control
  • 29 - Transparency Control Overview
  • 30 - Transparency Control Data Access Auditing
  • 31 - Transparency Control Data Access Auditing Demo
  • 32 - Transparency Control Data Safety
  • 33 - Transparency Control Data Safety Demo
  • 34 - Transparency Control Privacy UI Elements
  • 35 - Transparency Control Privacy UI Elements Demo

  • 6 - Privacy App Hibernation
  • 36 - App Hibernation

  • 7 - Privacy Privacy Sandbox
  • 37 - Privacy Sandbox
  • 38 - Privacy Sandbox Overview
  • 39 - Privacy Sandbox SDK Runtime
  • 40 - Privacy Sandbox PrivacyPreserving APIs

  • 8 - Security Android Security Concepts
  • 41 - Android Security Concepts
  • 42 - Android Security Concepts Overview
  • 43 - Android Security Intro
  • 44 - Kernel Security Linux Kernel
  • 45 - Kernel Security App Sandbox
  • 46 - Kernel Security SELinux
  • 47 - Kernel Security Verified Boot
  • 48 - Kernel Security Rooting
  • 49 - Kernel Security User Security
  • 50 - Kernel Security Additional Concepts
  • 51 - App Security Permissions
  • 52 - App Security IPC
  • 53 - App Security Signing
  • 54 - App Security Additional Concepts

  • 9 - Security Secure Storage
  • 55 - Secure Storage
  • 56 - Secure Storage Overview
  • 57 - Secure Storage Trusty TEE
  • 58 - Secure Storage Secure Element
  • 59 - Secure Storage Keystore
  • 60 - Secure Storage Authentication
  • 61 - Secure Storage Applications

  • 10 - Symmetric Cryptography
  • 62 - Symmetric Cryptography
  • 63 - Symmetric Cryptography Overview
  • 64 - Cryptography Intro
  • 65 - Symmetric Cryptography
  • 66 - Symmetric Cryptography Modes of Operation
  • 67 - Modes of Operation ECB
  • 68 - Modes of Operation CBC
  • 69 - Modes of Operation CFB
  • 70 - Modes of Operation OFB
  • 71 - Modes of Operation CTR
  • 72 - Symmetric Cryptography Data Encryption Standard
  • 73 - Data Encryption Standard Walkthrough
  • 74 - Data Encryption Standard Demo
  • 75 - Cracking Data Encryption Standard
  • 76 - Symmetric Cryptography Triple DES
  • 77 - Triple DES Demo
  • 78 - Symmetric Cryptography Advanced Encryption Standard
  • 79 - Advanced Encryption Standard Walkthrough
  • 80 - Advanced Encryption Standard Demo
  • 81 - Cracking Advanced Encryption Standard

  • 11 - Asymmetric Cryptography
  • 82 - Asymmetric Crypography
  • 83 - Asymmetric Crypography Overview
  • 84 - Asymmetric Cryptography Intro
  • 85 - Asymmetric Cryptography DiffieHellman Key Exchange
  • 86 - DiffieHellman Key Exchange Example
  • 87 - DiffieHellman Key Exchange Demo
  • 88 - Cracking DiffieHellman Key Exchange
  • 89 - Asymmetric Cryptography RSA
  • 90 - RSA Example
  • 91 - RSA Demo
  • 92 - Cracking RSA
  • 93 - Asymmetric Cryptography Elliptic Curve Cryptography
  • 94 - Elliptic Curve Cryptography DiffieHellman Algorithm
  • 95 - Elliptic Curve Cryptography Digital Signature Algorithm
  • 96 - Elliptic Curve Cryptography Demo
  • 97 - Asymmetric Cryptography ECC vs RSA
  • 98 - Cracking Elliptic Curve Cryptography
  • 99 - Android KeyStore System
  • 100 - Android KeyStore System Demo

  • 12 - Hashing
  • 101 - Hashing
  • 102 - Hashing Overview
  • 103 - Hashing Intro
  • 104 - Hashing MD5
  • 105 - Hashing SHA1
  • 106 - Hashing SHA1 vs SHA2 vs SHA3
  • 107 - Hashing SHA2 Adoptions
  • 108 - Hashing SHA3
  • 109 - Hashing Demo
  • 110 - HMAC
  • 111 - HMAC Demo

  • 13 - Local Data Protection
  • 112 - Local Data Protection
  • 113 - Local Data Protection Overview
  • 114 - Storage Types File System Storage
  • 115 - Media Permissions Android 13 14
  • 116 - Media Permissions Demo
  • 117 - Storage Types SharedPreferences DataStore
  • 118 - Storage Types SQL NoSQL Databases
  • 119 - Jetpack Security Intro
  • 120 - Jetpack Security MasterKey
  • 121 - Modes of Operation Galois Counter Mode
  • 122 - MasterKey Demo
  • 123 - Jetpack Security EncryptedFile
  • 124 - EncryptedFile Demo
  • 125 - Jetpack Security EncryptedSharedPreferences
  • 126 - AES256SIVCMAC
  • 127 - EncryptedSharedPreferences Demo
  • 128 - Securing DataStore
  • 129 - SQL Databases Passcodebased Encryption
  • 130 - NoSQL Databases Security Considerations

  • 14 - Network Data Protection
  • 131 - Network Data Protection
  • 132 - Network Data Protection Overview
  • 133 - Public Key Infrastructure
  • 134 - Transport Layer Security TLS
  • 135 - Certificate Pinning
  • 136 - Certificate Transparency
  • 137 - Certificate Transparency Demo
  • 138 - Certificate Revocation
  • 139 - Network Security Config
  • 140 - Network Security Config Demo

  • 15 - Authentication Authorization
  • 141 - Authentication Authorization
  • 142 - Authentication Authorization Overview
  • 143 - Authentication vs Authorization
  • 144 - Biometric Authentication
  • 145 - Biometric Authentication Demo
  • 146 - User Authentication Authentication Methods
  • 147 - Credential Manager
  • 148 - WebAuthn
  • 149 - Credential Manager Demo
  • 150 - OAuth 20
  • 151 - OAuth 20 Google OAuth 20 for Mobile
  • 152 - OAuth 20 Demo
  • 153 - Refresh Token
  • 154 - OpenID Connect
  • 155 - JSON Web Token JWT
  • 156 - ID Token
  • 157 - OpenID Connect Google Identity Services
  • 158 - Single Signon SSO
  • 159 - APIs Basic Authentication
  • 160 - APIs API Keys
  • 161 - APIs OAuth 20
  • 162 - APIs JWT

  • 16 - Additional Topics
  • 163 - Google IO 2023 Privacy Security Updates

  • 17 - Google IO 2024 Additions
  • 164 - Google IO 2024
  • 165 - Google IO 2024 Additions Overview
  • 166 - Google IO 2024 Privacy Sandbox
  • 167 - Google IO 2024 Checks
  • 168 - Google IO 2024 Whats new in Android Security
  • 169 - Google IO 2024 Whats new in Credential Manager

  • 18 - Outro
  • 170 - Recap
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 42331
    حجم: 2952 مگابایت
    مدت زمان: 757 دقیقه
    تاریخ انتشار: ۹ دی ۱۴۰۳
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید