Corporate Espionage via Mobile Compromise - A Technical Deep Dive
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Dive into a technical exploration of corporate espionage through mobile device compromise in this conference talk from TROOPERS13. Examine the reality of corporate espionage, understand the kill chain process, and witness live demonstrations of exploits targeting PowerShell and the Linux Kernel. Gain insights into the methods used by attackers and learn how to protect against these sophisticated threats. Engage with the speaker during the Q&A session to deepen your understanding of mobile security vulnerabilities and defense strategies.
Syllabus
Intro
What is corporate espionage
Is it real
Kill Chain
Demo
Exploits
Demos
PowerShell T
Linux Kernel
Questions
Taught by
WEareTROOPERS
Related Courses
Enterprise and Infrastructure SecurityNew York University (NYU) via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Hacking Laboratuvarınızı Oluşturun
Udemy CISM Cert Prep: 3 Information Security Program Development and Management
LinkedIn Learning Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning