Description
Duration: 3 hour(s) to complete
Audience: Software Engineers, Software Architects and Software Testers
Overview: This course focuses on the most common security vulnerabilities and attack vectors facing mobile application developers today, as referenced by the OWASP Top Ten Mobile Project. Participants will explore the OWASP Mobile Top Ten by analyzing real-world examples, rich visualizations of attacks, and discussions of mitigation strategies with supporting code examples. After completing this course, participants will be able to more readily identify, mitigate, and prevent common security vulnerabilities within their mobile applications. The course will explore the following topics:
•Improper Platform Usage
•Insecure Data Storage
•Insecure Communication
•Insecure Authentication
•Insufficient Cryptography
•Insecure Authorization
•Client Code Quality
•Code Tampering
•Reverse Engineering
•Extraneous Functionality