YoVDO

Ethical Hacking: Hacking Mobile Platforms

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses Mobile Device Security Courses Android Security Courses iOS Security Courses

Course Description

Overview

Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

It’s official, mobile devices have bypassed usage over traditional workstations. The tricky thing is that aside from security vulnerabilities specific to mobile devices, mobile devices are also vulnerable to many other dangers that apply to desktop and laptop computers, web applications, networks, and other similar technologies. In this course, Ethical Hacking: Hacking Mobile Platforms, you’ll learn to look at the risks mobile devices present as well as learning what you can do to protect them from hackers. First, you’ll explore the various attack vectors the mobile platform presents. Next, you’ll discover the tools and techniques hackers use to compromise Android and iOS devices. Finally, you’ll learn how to protect your organization using various tools and guidelines. When you’re finished with this course, you’ll have the skills and knowledge of security professional needed for the CEH 312-50 exam.

Syllabus

  • Course Overview 2mins
  • Discovering Mobile Platform Attack Vectors 32mins
  • Investigating Android Devices 42mins
  • Explaining iOS Devices Weaknesses 15mins
  • Outlining Mobile Device Management (MDM) 19mins
  • Pointing Out Security Guidelines 29mins
  • Domain Summary 1min

Taught by

Dale Meredith

Related Courses

Check Point Jump Start: Harmony Mobile
Checkpoint via Coursera
Check Point Jump Start: Harmony Mobile
Checkpoint via edX
Mobile Security Fundamentals
Cybrary
CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent
Learning Mobile Device Security
LinkedIn Learning