From the course: Writing Secure Code in iOS by Infosec
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Conclusion
From the course: Writing Secure Code in iOS by Infosec
Conclusion
- Well, I hope you've enjoyed this path as much as I have, there is so much to learn and explore and discover. As you work to develop your craft and hone your skills, always be thinking, "What can I do to keep the user, their data, and my app secure?" And with that mindset, you'll be way ahead of the vast majority of application developers out there. So with that, best of luck, and happy coding.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
The need for secure coding10m 52s
-
(Locked)
Activity: OWASP top 10 mobile vulnerabilities, part 110m 17s
-
(Locked)
Activity: OWASP top 10 mobile vulnerabilities, part 215m 26s
-
(Locked)
Activity: OWASP top 10 mobile vulnerabilities, part 314m 43s
-
(Locked)
iOS security overview, part 113m 36s
-
(Locked)
iOS security overview, part 27m 27s
-
(Locked)
Swift secure app development overview, part 114m
-
(Locked)
Swift secure app development overview, part 28m 9s
-
(Locked)
iOS general development best practices1m 55s
-
-
-
(Locked)
Understanding input risks14m 13s
-
(Locked)
Autocorrect and autofill10m 43s
-
(Locked)
Activity: Disabling autocorrection10m 53s
-
(Locked)
Special characters, part 114m 23s
-
Special characters, part 27m 28s
-
(Locked)
Format string attack, part 17m 58s
-
(Locked)
Format string attack, part 28m 38s
-
(Locked)
Format string attack, part 36m 49s
-
(Locked)
Activity: Playing with format strings9m 53s
-
(Locked)
Input sanitization12m 42s
-
(Locked)
Input sanitization techniques: Regular expressions, part 18m 18s
-
(Locked)
Input sanitization techniques: Regular expressions, part 26m 59s
-
(Locked)
Activity: Regular expressions, part 18m 17s
-
(Locked)
Activity: Regular expressions, part 26m 53s
-
(Locked)
Activity: Regular expressions, part 37m 31s
-
(Locked)
Activity: Sanitizing input, part 110m 44s
-
Activity: Sanitizing input, part 213m 45s
-
(Locked)
Property wrappers9m 27s
-
(Locked)
Activity: Trimming whitespace and newlines with a property wrapper6m 38s
-
(Locked)
Activity: Value clamping with a property wrapper6m 48s
-
(Locked)
Activity: Sanitizing input with a property wrapper7m 18s
-
(Locked)
Null bytes7m 27s
-
(Locked)
Cross-site attacks12m 8s
-
(Locked)
Activity: Exploring XSS attacks10m 10s
-
(Locked)
Code injection14m 51s
-
(Locked)
Activity: Filtering a malicious QR code, part 112m 11s
-
(Locked)
Activity: Filtering a malicious QR code, part 25m 31s
-
(Locked)
SQL injection, part 111m 4s
-
(Locked)
SQL injection, part 24m 13s
-
(Locked)
Object deserialization7m 20s
-
(Locked)
Activity: Installing Alamofire and SwiftyJSON pods3m 36s
-
(Locked)
Activity: Securely working with JSON, part 112m 49s
-
(Locked)
Activity: Securely working with JSON, part 29m 23s
-
WebView protection4m 48s
-
(Locked)
Activity: Protecting users against insecure UIWebView10m 44s
-
(Locked)
-
-
(Locked)
iOS storage overview8m 20s
-
(Locked)
Activity: Exploring the iOS file system8m 32s
-
(Locked)
Activity: Preparing for encryption4m 2s
-
Core Data11m 55s
-
(Locked)
Data persistence, part 113m 23s
-
(Locked)
Data persistence, part 214m 11s
-
(Locked)
Activity: Saving a username and password12m 34s
-
(Locked)
Activity: Verifying a username and password, part 112m 26s
-
(Locked)
Activity: Verifying a username and password, part 29m 7s
-
(Locked)
Encryption overview, part 114m 6s
-
(Locked)
Encryption overview, part 28m 49s
-
(Locked)
Keychain9m 7s
-
(Locked)
Activity: Preparing to use Keychain9m 7s
-
(Locked)
Activity: Save user secrets in Keychain8m 49s
-
(Locked)
Hashing11m 58s
-
(Locked)
Activity: Generating random values8m 49s
-
(Locked)
Activity: Hashing passwords8m 49s
-
Activity: Adding salt to a password hash8m 49s
-
(Locked)
-
-
(Locked)
Common data risks, part 114m 15s
-
(Locked)
Common data risks, part 27m 55s
-
(Locked)
Protecting files, part 17m 48s
-
(Locked)
Protecting files, part 27m 24s
-
(Locked)
Activity: Saving data in a Realm database13m 42s
-
(Locked)
Network security14m 52s
-
(Locked)
Activity: Making an HTTP exception10m 28s
-
App backgrounding4m 56s
-
(Locked)
Activity: Securely backgrounding an app10m 49s
-
(Locked)
API security11m 52s
-
(Locked)
Activity: Storing an API key in Keychain9m 11s
-
(Locked)
Interprocess communications (IPC), part 113m 59s
-
(Locked)
Interprocess communications (IPC), part 24m 28s
-
(Locked)
Activity: Preventing race conditions8m 9s
-
(Locked)
-
-
(Locked)
Apple ID4m 33s
-
(Locked)
Activity: Sign in with Apple ID11m 18s
-
(Locked)
Biometrics6m 36s
-
Activity: Logging in with biometrics10m 50s
-
(Locked)
Authorization11m 46s
-
(Locked)
Activity: Role-based access control10m 50s
-
(Locked)
One-time passwords7m 13s
-
(Locked)
Activity: Using a one-time password3m 14s
-
(Locked)
-
-
(Locked)
Understanding risks associated with external code7m 7s
-
(Locked)
Activity: Working with external code6m 45s
-
(Locked)
Error handling11m 8s
-
(Locked)
Activity: Handling errors14m 32s
-
(Locked)
Logging, part 16m 52s
-
(Locked)
Logging, part 26m 32s
-
Logging, part 38m 21s
-
(Locked)
Testing types14m 43s
-
(Locked)
Jailbreak detection12m 53s
-
(Locked)
Activity: Detecting a jailbroken device3m 57s
-
(Locked)
New vulnerability research7m 6s
-
(Locked)
Secure iOS coding roundup9m 27s
-
(Locked)