YoVDO

Stick a Pin in Certificate Pinning - How to Inspect Mobile Traffic and Stop Data Exfiltration

Offered By: YouTube

Tags

Conference Talks Courses Network Security Courses Encryption Courses Data Protection Courses Mobile Security Courses Data Exfiltration Courses

Course Description

Overview

Learn about certificate pinning, its complexities, and implementation in mobile security. Explore the broken certificate trust model, government surveillance concerns, and user bypasses of security controls. Discover virtual mobile infrastructure (VMI) and mobile app virtualization architecture for protecting data outside managed networks. Examine techniques for capturing encrypted data, implementing trusted SSL proxies, and leveraging hardware-protected clients with TrustZone. Gain insights into mobile business applications, security monitoring, and strategies to prevent data exfiltration in this comprehensive conference talk from BSides San Francisco 2015.

Syllabus

Stick a Pin in Certificate Pinning
The Certificate Trust Model Is Broken
Worries over Government Snooping
Lock icon on browser is deceiving
Users Can Bypass Security Controls
Linux Foundation "Let's Encrypt" Free CA for everyone • Revoking service - Domain Validation
How Certificate Pinning Works
Complexities of Certificate Pinning
Avoid IT Desperation
How to Implement Cert Pinning
Mobile Business Applications
Virtual Mobile Infrastructure (VMI)
Mobile App Virtualization Architecture
Remote Mobile App Virtualization
Capturing Encrypted Data
VMI with Trusted SSL Proxy
Security and User Monitoring
Protecting data outside managed network
TrustZone: Hardware-Protected Clients


Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX