Android Security: Effective Permission Handling

Permissions play a key role in guarding user privacy and data for Android apps. This course will give you a deep understanding of how permissions work, how to request permissions, and how to avoid accidental data leaks when using permissions.
Course info
Level
Intermediate
Updated
Oct 18, 2018
Duration
60m
Table of contents
Description
Course info
Level
Intermediate
Updated
Oct 18, 2018
Duration
60m
Description

All Android apps need access to user data and device features that are protected by permissions. Having a good understanding of Android's permission model can be the difference between creating an app that users can trust and one which they consider malicious and uninstall. In this course, Android Security: Effective Permission Handling, you will gain an in-depth understanding of Android's permission model, allowing you to create permission experiences that ensure your app gets access to all the data and device features it needs. First, you will learn the internal workings of Android's permission model and some of the key attributes of a permission. Next, you will explore how to create great user experiences while requesting the system for a permission, ensuring the user can make an informed decision. Finally, you will discover how to guard your app's data and features when exposing them to other apps so as to prevent accidental data leaks. When you are finished with this course, you will have a well-rounded understanding of how permissions work on Android.

About the author
About the author

Nitin is an Android/iOS developer with 6+ years of experience developing products ranging from e-commerce apps to VR. He is currently changing the future of digital payments in India at Razorpay.

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Nitin, and welcome to my course, Android Security: Effective Permission Handling. I'm an Android tech lead at Razorpay. Permission model is the primary mechanism which guards user data and key device sensors from apps on Android devices. Needless to say, virtually all apps need to interact with it. In this course, we are going to learn how permissions work, how to request for permissions, and how to avoid accidental data leaks when using permissions. Some of the major topics that we will cover include how to specify a permission and the key attributes of a permission, creating great user experiences while requesting the system for a permission, how to create custom permissions, and guarding your app's data and features exposed to other apps using permissions. By the end of this course, you will have a very well-rounded understanding of how permissions work and the techniques you can use to significantly boost user trust in your app, thus increasing your app's chances of getting a permission from the user. I hope you will join me on this journey to learn Android security with the Android Security: Effective Permission Handling course, at Pluralsight.