We may earn an affiliate commission when you visit our partners.
Course image
droidcon NYC
In this talk, Jon Markoff describes strategies for data encryption on Android and dives into the Jetpack Security library. You'll learn how to properly leverage the AndroidKeyStore and encrypt data properly.
Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Educates learners on implementing Android's encryption modes securely in their projects for data protection
Introduces the concepts of encryption and key management in the context of Android development
Offers practical guidance on using Jetpack Security library for data encryption in Android apps
Appropriate for Android developers of all levels seeking to enhance their skills in data encryption

Save this course

Save droidcon NYC '19: Data Encryption on Android to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for droidcon NYC '19: Data Encryption on Android. These are activities you can do either before, during, or after a course.

Career center

Learners who complete droidcon NYC '19: Data Encryption on Android will develop knowledge and skills that may be useful to these careers:
Cryptographer
Cryptographers design and develop encryption and decryption algorithms. This course may provide useful knowledge about data encryption techniques that can be used to protect data from unauthorized access.
Mobile Security Engineer
Mobile Security Engineers specialize in protecting mobile devices and applications from security threats. This course can provide valuable knowledge about data encryption techniques that can be used to enhance the security of mobile applications.
Security Architect
Security Architects design and implement security solutions for organizations. This course can help build a foundation in data encryption, which is a crucial aspect of information security.
Security Consultant
Security Consultants provide security advice and guidance to organizations. This course may provide useful knowledge about data encryption techniques that can be used to protect sensitive data from unauthorized access.
Android Developer
Android Developers design and build applications for the Android operating system. This course can help build a foundation in data encryption for Android, which is an important security consideration for any Android application.
Cloud Security Engineer
Cloud Security Engineers design and implement security solutions for cloud computing environments. This course may provide useful knowledge about data encryption techniques that can be used to protect data stored in the cloud.
Information Security Analyst
Information Security Analysts protect information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may provide useful knowledge about data encryption techniques that can be used to protect sensitive information.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from cyberattacks. This course may provide useful knowledge about data encryption techniques that can be used to protect data from unauthorized access.
Forensic Analyst
Forensic Analysts investigate computer crimes and cyberattacks. This course may provide useful knowledge about data encryption techniques that can be used to recover encrypted data from compromised devices.
Privacy Engineer
Privacy Engineers design and implement solutions to protect user privacy. This course may provide useful knowledge about data encryption techniques that can be used to protect user data from unauthorized access.
Security Manager
Security Managers manage security programs and teams for organizations. This course may provide useful knowledge about data encryption techniques that can be used to protect an organization's sensitive data.
Security Researcher
Security Researchers identify and exploit vulnerabilities in software and systems. This course may provide useful knowledge about data encryption techniques that can be used to bypass encryption and access sensitive data.
Network Security Engineer
Network Security Engineers design and implement security solutions for computer networks. This course may provide useful knowledge about data encryption techniques that can be used to protect network traffic from eavesdropping.
DevSecOps Engineer
DevSecOps Engineers integrate security into the software development process. This course may provide useful knowledge about data encryption techniques that can be used to enhance the security of software applications.
Data Scientist
Data Scientists analyze data to extract insights and make predictions. This course may provide useful knowledge about data encryption techniques that can be used to protect sensitive data from unauthorized access.

Reading list

We haven't picked any books for this reading list yet.
Classic in the field of cryptography. It provides a comprehensive overview of the subject, covering topics such as symmetric-key encryption, public-key encryption, hash functions, digital signatures, and network security. It is suitable for both undergraduate and graduate students.
Provides a modern and comprehensive treatment of cryptography. It covers topics such as symmetric-key encryption, public-key encryption, hash functions, digital signatures, and network security. It is suitable for both undergraduate and graduate students.
Comprehensive reference for cryptography. It covers a wide range of topics, including symmetric-key encryption, public-key encryption, hash functions, digital signatures, and network security. It is suitable for both researchers and practitioners.
Provides a clear and concise introduction to modern cryptography. It covers topics such as symmetric-key encryption, public-key encryption, hash functions, digital signatures, and network security. It is suitable for both undergraduate and graduate students.
Provides a comprehensive overview of cryptography and network security. It covers topics such as symmetric-key encryption, public-key encryption, hash functions, digital signatures, and network security. It is suitable for both undergraduate and graduate students.
Provides a comprehensive overview of security in computing. It covers topics such as security models, security mechanisms, and security management. It is suitable for both undergraduate and graduate students.
Provides a comprehensive overview of computer security. It covers topics such as security models, security mechanisms, and security management. It is suitable for both undergraduate and graduate students.
本书为一本密码学教材,内容涵盖了密码学的基础知识、对称和非对称密码算法、哈希函数、数字签名、网络安全协议等内容,适合本科生和研究生学习使用。
Provides a comprehensive overview of Android security, including a chapter on AndroidKeyStore and its role in protecting sensitive data on Android devices. It is written by Nikolay Elenkov, a leading expert in Android security.
Provides a comprehensive overview of memory forensics, including a chapter on using AndroidKeyStore to protect sensitive data in memory. It is written by Michael Hale Ligh and Andrew Case, two leading experts in memory forensics.
Provides a deep dive into the internals of the Android OS, including a chapter on AndroidKeyStore. It is written by Jonathan Levin and Chuck Rossi, two leading experts in Android development.
Provides a guide to hacking Android devices, including a chapter on using AndroidKeyStore to protect sensitive data. It is written by Joshua J. Drake, a leading expert in Android hacking.
Provides a comprehensive guide to Android security engineering, including a chapter on AndroidKeyStore. It is written by Marcus Pinto, a leading expert in Android security engineering.
Provides a hands-on approach to Android application security, including a chapter on AndroidKeyStore. It is written by Anmol Misra and Manish H. Dhawan, two leading experts in Android application security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser