Leveraging Mobile Devices on Pentests - OISF 2013
Offered By: YouTube
Course Description
Overview
Learn how to leverage mobile devices during penetration testing in this conference talk from OISF 2013. Explore techniques and strategies for incorporating smartphones and tablets into security assessments, gaining insights into potential vulnerabilities and attack vectors unique to mobile platforms. Discover methods for exploiting mobile devices to gather information, bypass security controls, and gain unauthorized access to target systems. Gain practical knowledge on integrating mobile device exploitation into your penetration testing toolkit, enhancing your ability to identify and address security weaknesses in modern network environments.
Syllabus
OISF 2013 Georgia Weidman Leveraging Mobile Devices on Pentests (Fixed Audio)
Related Courses
Cyber Security in ManufacturingUniversity at Buffalo via Coursera Security Awareness Training
(ISC)² via Coursera Masterclass - Hacking de dispositivos moviles
Udemy Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Protecting Devices and Applications in Microsoft 365
Pluralsight