In this chapter, you learned about network communications in your Android application. Now you understand how the most common protocols to secure connections work. You also learned how to use the APIs that Android offers to secure your application's communications. Finally, you learned about certificate generation.
In the next chapter, you will learn about authentication methods. You will see how two-key and three-key authentication methods work. You will also learn about using biometric authentication in your application.