This course is designed for intermediate-level learners who want to enhance their security skills in Android development. Participants will analyze the structure of Android memory and evaluate its defenses against exploitation, including understanding pointers and their role in buffer overflow exploits. The course covers various types of overflows, mitigation techniques, and specific vulnerabilities such as the Stagefright buffer overflow.

Memory, Encryption, and Protecting Data in Android

Memory, Encryption, and Protecting Data in Android
This course is part of Writing Secure Code for Android Specialization

Instructor: Chrystine D Thorsen
Access provided by Cambia Health Solutions
Details to know

Add to your LinkedIn profile
3 assignments
February 2026
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
In this module, you'll dive into the intricacies of Android memory management. We'll explore how memory is structured and used in Android apps, and you'll learn to identify and mitigate common vulnerabilities like overflows. By the end, you'll have hands-on experience with the notorious Stagefright buffer overflow vulnerability, equipping you with practical skills to protect your apps.
What's included
4 videos1 assignment
This module will guide you through the essentials of encryption in Android development. You'll learn how to protect user data at every stage—whether it's at rest, in transit, or in use. We'll cover common pitfalls in handling user credentials and how to avoid them, ensuring your app's data remains secure. By the end, you'll be adept at using Android Keystore for secure credential storage.
What's included
15 videos1 assignment
In this module, you'll explore various strategies to protect data beyond encryption. We'll discuss common data risks and how to secure data during transmission and storage. You'll also learn to mitigate data leakage risks and secure inter-process communications within Android apps. By the end, you'll have a comprehensive understanding of how to protect data viewed online by users.
What's included
30 videos1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






