Android Security: Effective Permission Handling
Offered By: Pluralsight
Course Description
Overview
Permissions play a key role in guarding user privacy and data for Android apps. This course will give you a deep understanding of how permissions work, how to request permissions, and how to avoid accidental data leaks when using permissions.
All Android apps need access to user data and device features that are protected by permissions. Having a good understanding of Android's permission model can be the difference between creating an app that users can trust and one which they consider malicious and uninstall. In this course, Android Security: Effective Permission Handling, you will gain an in-depth understanding of Android's permission model, allowing you to create permission experiences that ensure your app gets access to all the data and device features it needs. First, you will learn the internal workings of Android's permission model and some of the key attributes of a permission. Next, you will explore how to create great user experiences while requesting the system for a permission, ensuring the user can make an informed decision. Finally, you will discover how to guard your app's data and features when exposing them to other apps so as to prevent accidental data leaks. When you are finished with this course, you will have a well-rounded understanding of how permissions work on Android.
All Android apps need access to user data and device features that are protected by permissions. Having a good understanding of Android's permission model can be the difference between creating an app that users can trust and one which they consider malicious and uninstall. In this course, Android Security: Effective Permission Handling, you will gain an in-depth understanding of Android's permission model, allowing you to create permission experiences that ensure your app gets access to all the data and device features it needs. First, you will learn the internal workings of Android's permission model and some of the key attributes of a permission. Next, you will explore how to create great user experiences while requesting the system for a permission, ensuring the user can make an informed decision. Finally, you will discover how to guard your app's data and features when exposing them to other apps so as to prevent accidental data leaks. When you are finished with this course, you will have a well-rounded understanding of how permissions work on Android.
Syllabus
- Course Overview 1min
- Understanding Android’s Permission Model 24mins
- Building Great Experiences When Asking for User Permissions 17mins
- Robust Permission Enforcement When Interacting with Other Apps 16mins
Taught by
Nitin Singh
Related Courses
Check Point Jump Start: Harmony MobileCheckpoint via Coursera Check Point Jump Start: Harmony Mobile
Checkpoint via edX Mobile Security Fundamentals
Cybrary CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent Learning Mobile Device Security
LinkedIn Learning