Leveraging Mobile Devices on Pentests - OISF 2013
Offered By: YouTube
Course Description
Overview
Learn how to leverage mobile devices during penetration testing in this conference talk from OISF 2013. Explore techniques and strategies for incorporating smartphones and tablets into security assessments, gaining insights into potential vulnerabilities and attack vectors unique to mobile platforms. Discover methods for exploiting mobile devices to gather information, bypass security controls, and gain unauthorized access to target systems. Gain practical knowledge on integrating mobile device exploitation into your penetration testing toolkit, enhancing your ability to identify and address security weaknesses in modern network environments.
Syllabus
OISF 2013 Georgia Weidman Leveraging Mobile Devices on Pentests (Fixed Audio)
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity