YoVDO

Leveraging Mobile Devices on Pentests - OISF 2013

Offered By: YouTube

Tags

Penetration Testing Courses Network Security Courses Information Gathering Courses Mobile Device Security Courses Vulnerability Assessment Courses Security Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to leverage mobile devices during penetration testing in this conference talk from OISF 2013. Explore techniques and strategies for incorporating smartphones and tablets into security assessments, gaining insights into potential vulnerabilities and attack vectors unique to mobile platforms. Discover methods for exploiting mobile devices to gather information, bypass security controls, and gain unauthorized access to target systems. Gain practical knowledge on integrating mobile device exploitation into your penetration testing toolkit, enhancing your ability to identify and address security weaknesses in modern network environments.

Syllabus

OISF 2013 Georgia Weidman Leveraging Mobile Devices on Pentests (Fixed Audio)


Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity