Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Android Security Architecture

( Duration: 2 Days )

This Android Security training course focuses specifically on the various security concerns of the Android platform. This course explores Android architecture and its security model, permission system and enforcement, customizing security options, known exploits, memory protections, data protection, device management, SE-Android, as well as more exotic vectors of attack like malware and tap-jacking.

The objective of Android Security workshop is to provide a solid understanding of inter-workings of the Android operating system, its security model, and ways to tighten potential security holes. By the end of this class, you will be able to identify the issues, and understand how to go about securing the system and applications running on them.

  • Attend a training on Android Application Development or equivalent practical knowledge
  • It is highly recommended that you be familiar with basics of Java, C/C++, and Linux administration to fully take advantage of this course

The Android Security class is designed for security-conscious application developers and system integrators looking to tighten the security of both their devices as well as the applications running on them.

COURSE AGENDA

1

Overview

  • Overview of Android Building Blocks
  • Overview of Android OS
2

Android Stack from the Security Perspective

  • Android Linux Kernel Layer
    • Overview
    • Binder
    • Ashmem
    • Pmem
    • Wakelock
    • Early Suspend
    • Alarm
    • Low Memory Killer
    • Logger
    • Alarm
    • Paranoid Network Security
    • Other Kernel Changes
  • Android User-Space Native Layer
    • Bionic (libc)
    • User-space Hardware Abstraction Layer (HAL)
    • Native Daemons: ueventd, servicemanager, vold, netd, rild, mediaserver, keystore, racoon, zygote, system_server, adbd, surfaceflinger, etc.
    • Function libraries: libwebcore (Web Kit), V8, SQLite, libssl (OpenSSL), etc.
    • Android Runtime / Dalvik Virtual Machine
  • Android Application Framework Layer
    • Managers and Services
      • Activity Manager Service
      • Package Manager Service
      • Power and Alarm Manager Services
      • Notification Manager Service
      • Keyguard Manager Service
      • Location Manager Service
      • Sensor Manager Service
      • Search Manager Service
      • Vibrator Manager Service
      • Connectivity, Telephony, and Wifi Manager Services
      • Input Method and UI Mode Manager Services
      • Download and Storage Manager Services
      • Audio Manager Service
      • Window Manager Service
      • Additional Manager Services
  • Android Applications Layer
    • Android Built-in Applications
    • Android Built-in Content Providers
    • Android Built-in Input Methods
    • Android Built-in Wallpapers
3

Android Startup from the Security Perspective

  • Bootloading the Kernel
  • Android’s init Startup
  • Startup of daemons
  • Zygote Startup
  • System Server Startup
  • Startup of system services
  • Startup of applications
4

Android Security

  • Android Security Architecture
  • Application Signing
  • User IDs
  • File Access
  • Using Permissions
  • Not-using permissions: using Intents instead
  • Permission Enforcement
  • Declaring Custom Permissions
  • ContentProvider URI Permissions
  • Public vs. Private Components
  • Intent Broadcast Permissions
  • Pending Intents (Optional)
  • Data protection and Encryption
    • SSL and HTTPS
    • JCE with BouncyCastle
    • Whole Disk Encryption
    • Dangers
  • Rooting
    • How to get root: exploits
    • Keeping root
    • Dangers
  • Security of Memory
    • ASLR
    • NX
    • ProPolice
    • Valgrind
    • Other protections
  • Tap-Jacking on Android
  • Android Device Administration
    • Overview
    • Policies
    • Device Administration by Example
  • Malware
    • The state of malware on Android
    • Prevention
    • Detection
    • Removal
  • SE Android / SE-Linux on Android
    • Discretionary Access Control (DAC) vs. Mandatory Access Control (MAC)
    • Goals of SE Android
    • What SE Android can/cannot do
    • Challenges
  • Other Security Concerns

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X