Secure Mobile Apps

Learning objectives

Get to know the most important security risks (OWASP Mobile Top 10) of mobile apps with the aid of intentionally vulnerable mobile apps for iPhone and Android. After an introduction into the security architecture of Android and iOS, you will be guided through various application vulnerabilities and the corresponding countermeasures. After the course you will be in a position to apply what you have learned to your company's mobile application projects and will gain the competence for secure development and evaluation (self-assessment) of mobile apps

Demarcation: The seminar is differentiated from the subject of MDM (Mobile Device Management) and focuses on the (in-)secure development of apps.

Highlights

  • Introduction to the subject of  Secure Mobile Coding
    • OWASP Mobile Security Top 10
    • Introduction to the laboratory environment
  • Overview of security architecture
    • Android Security
    • iOS Security Framework
  • Secure transmission of app data
    • Network analysis, Man-in-the-Middle
    • SSL Trust with expanded validation
  • Secure storage of sensitive app data
    • Encryption of data
    • Pitfalls when saving data
    • Encryption management
  • Secure Programming
    • User input, indexing, field completion
    • Efficient data encryption
    • Backup & Restore
    • Logging & Auditing & Memory Management
  • Malware & Jailbreak, Rooting
    • Jailbreak & Jailbreak detection
    • Effective protection against malware
  • Advanced App Analysis
    • Reverse engineering
    • Static and dynamic analysis
    • Source code analysis
    • Code obfuscation

 

The exercises will be done on www.hacking-lab.com.

Target group

Developers of iPhone and Android applications and those who are responsible for security and want to learn the current mobile threats.

Prerequisite

  • Knowledge of programming not necessary
  • Good understanding of mobile devices advantageous
  • Ability to read and understand source code

CALENDAR

New: Compass-Training "Internal Network and System Security" in Bern

In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more

KMU Swiss Forum 2020

The association «KMU Swiss» promotes the interaction between companies and specialists. He organises the annual KMU Swiss Forum. The next years motto... Read more

secIT 2020 – das IT Frühlings-Highlight in Hannover

Heise Medien lädt zur nächsten Veranstaltung der IT Security Branche ein. Im März 2020 öffnen die Tore der secIT zum dritten Mal. Wir sind vor Ort mit... Read more

ALL DATES

NEWS

Daten als Wettbewerbsvorteil

Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

Vulnerability in totemodata

Fabio Poloni identified an XSS vulnerability in totemodata®. Read more

ARCHIVES

Compass Security Blog

Finding Active Directory attack paths using BloodHound

As a defender, you want to find and patch attack paths in your Active Directory environment. One cannot easily spot issues by looking at the Active Directory Users and Computers console, GPOs, etc.... mehr

Challenging Your Forensic Readiness with an Application-Level Ransomware Attack

Ransomware focuses on encrypting data on a filesystem-level, either locally on infected client systems or remotely on accessible file servers. However, what if ransomware would start encrypting data... mehr

ZUM BLOG