Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

iOS Development: Security

via LinkedIn Learning

This course may be unavailable.

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about building secure iOS apps. Discover how to safeguard your apps from current and future threats using the keychain, biometrics, asymmetric cryptography, and more.

Syllabus

Introduction
  • Keeping your apps secure
  • What you should know
1. iOS Security Fundamentals
  • Security in iOS
  • The Secure Boot
  • Encryption and data protection
  • Touch ID and Face ID
  • Code signing
  • Sandboxing
  • Secure networking
  • User privacy
2. User Data Protection
  • Purpose strings
  • Request authorization for system features
  • Adding the missing purpose string
  • Exposing sensitive data through copying and pasting
  • The pasteboard spy app
  • Prevent pasteboard leakage without coding
  • Prevent pasteboard leakage with coding
  • Using an app-specific pasteboard
  • Data leakage through app screenshots
  • Clearing data before moving to the background
  • Obscuring the snapshot before moving to the background
  • Hacking the UserDefaults
3. The Keychain
  • Keychain overview
  • Implementing a Keychain wrapper
  • Adding a value to the Keychain
  • Using the Keychain wrapper
  • Removing items from the Keychain
  • Retrieve items from the Keychain
  • Restore values from the Keychain
4. File Data Protection
  • File data protection overview
  • Overriding the file protection level programmatically
  • Using the new file protection level
5. Securing Apps Using Biometrics
  • Implementing Touch ID
  • Implementing the authentication logic
  • Implementing Face ID
  • Implementing Face ID continued
6. Cryptographic APIs/Interfaces
  • Asymmetric cryptography overview
  • Creating the private key
  • Retrieving the private key from the Keychain
  • Defining the asymmetric key accessors
  • Performing asymmetric encryption
  • Performing asymmetric encryption continued
  • Performing asymmetric decryption
  • Asymmetric encryption and decryption demo
Conclusion
  • Next steps

Taught by

Karoly Nyisztor

Reviews

4.8 rating at LinkedIn Learning based on 85 ratings

Start your review of iOS Development: Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.