We may earn an affiliate commission when you visit our partners.
Course image
droidcon NYC
In this session, Brian Reed brings forth a decade of experience in mobile forensics, pen testing, OSS tools, and automated security testing software. The session will begin with big data analysis of hundreds of thousands of apps in the Google Play Store across multiple slices of security, privacy, compliance, and the OWASP mobile top 10. After revealing the most commonly found Android issues across the dataset, Brian will drill into best practices for secure mobile app dev and pen testing with key areas to focus across development and security.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Brian Reed, who has a decade of experience in mobile forensics, pen testing, OSS tools, and automated security testing software
Delves into the Google Play Store big data analysis of hundreds of thousands of apps across various security, privacy, compliance, and OWASP mobile top 10 domains
Provides guidance on secure mobile app development and penetration testing techniques, focusing on critical areas for development and security professionals

Save this course

Save droidcon NYC '19: Best Practices for Mobile App Security Testing to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for droidcon NYC '19: Best Practices for Mobile App Security Testing. These are activities you can do either before, during, or after a course.

Career center

Learners who complete droidcon NYC '19: Best Practices for Mobile App Security Testing will develop knowledge and skills that may be useful to these careers:
Mobile Application Security Engineer
The Mobile Application Security Engineer is tasked with making mobile apps more secure. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning and applying the lessons of this course, Mobile Application Security Engineers will be able to identify and fix security vulnerabilities in mobile apps.
Penetration Tester
Penetration Testers actively attempt to bypass and exploit security controls in order to find and fix vulnerabilities. This course dives into best practices for secure mobile app dev and pen testing with key areas to focus on across development and security. By learning these best practices, Penetration Testers will be able to more effectively find and exploit security vulnerabilities in mobile apps.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Security Consultants will be able to provide more effective advice and guidance to their clients on how to secure their mobile apps.
Information Security Analyst
Information Security Analysts help organizations protect their data and systems by identifying and mitigating security risks. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Information Security Analysts will be able to more effectively identify and mitigate security risks to mobile apps.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Security Engineers will be able to more effectively design, implement, and maintain security measures for mobile apps.
Cybersecurity Analyst
Cybersecurity Analysts monitor, detect, and respond to security threats. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Cybersecurity Analysts will be able to more effectively monitor, detect, and respond to security threats to mobile apps.
Network Security Analyst
Network Security Analysts help organizations protect their networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Network Security Analysts will be able to more effectively protect their organization's networks from mobile app-based threats.
Incident Responder
Incident Responders help organizations to recover from security incidents. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Incident Responders will be able to more effectively help organizations to recover from security incidents involving mobile apps.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its purpose, behavior, and potential impact. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Malware Analysts will be able to more effectively investigate and analyze malware that targets mobile apps.
Ethical Hacker
Ethical Hackers are hired to legally and intentionally attack computer systems to identify and fix security vulnerabilities. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Ethical Hackers will be able to more effectively identify and fix security vulnerabilities in mobile apps.
Forensic Analyst
Forensic Analysts investigate and analyze computer systems to identify evidence of criminal activity. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Forensic Analysts will be able to more effectively investigate and analyze mobile devices for evidence of criminal activity.
Vulnerability Researcher
Vulnerability Researchers identify and report security vulnerabilities in software and systems. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Vulnerability Researchers will be able to more effectively identify and report security vulnerabilities in mobile apps.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts research and analyze cyber threats to identify patterns and trends. This course teaches best practices for secure mobile app development and pen testing with key areas to focus on across development and security. By learning these best practices, Cyber Threat Intelligence Analysts will be able to more effectively research and analyze cyber threats to mobile apps.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in droidcon NYC '19: Best Practices for Mobile App Security Testing.
This guide provides a comprehensive overview of mobile security testing, including topics such as threat modeling, vulnerability assessment, and penetration testing.
Provides a deep dive into the security architecture of Android, covering topics such as app permissions, sandboxing, and kernel security. It valuable resource for developers and security researchers who want to understand how Android protects against threats.
Provides a practical guide to threat modeling for mobile applications, including topics such as threat identification, risk assessment, and mitigation.
Provides a detailed overview of Android security, including topics such as rooting, malware analysis, and exploit development.
Provides a practical guide to secure mobile development, including topics such as secure coding, threat modeling, and testing.
Provides a comprehensive set of secure coding standards that can be used to develop secure software for a variety of platforms, including mobile devices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser