YoVDO

Leveraging Mobile Devices on Pentests - OISF 2013

Offered By: YouTube

Tags

Penetration Testing Courses Network Security Courses Information Gathering Courses Mobile Device Security Courses Vulnerability Assessment Courses Security Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to leverage mobile devices during penetration testing in this conference talk from OISF 2013. Explore techniques and strategies for incorporating smartphones and tablets into security assessments, gaining insights into potential vulnerabilities and attack vectors unique to mobile platforms. Discover methods for exploiting mobile devices to gather information, bypass security controls, and gain unauthorized access to target systems. Gain practical knowledge on integrating mobile device exploitation into your penetration testing toolkit, enhancing your ability to identify and address security weaknesses in modern network environments.

Syllabus

OISF 2013 Georgia Weidman Leveraging Mobile Devices on Pentests (Fixed Audio)


Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Security Awareness Training
(ISC)² via Coursera
Masterclass - Hacking de dispositivos moviles
Udemy
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Protecting Devices and Applications in Microsoft 365
Pluralsight