YoVDO

Corporate Espionage via Mobile Compromise - A Technical Deep Dive

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses PowerShell Courses Mobile Security Courses

Course Description

Overview

Dive into a technical exploration of corporate espionage through mobile device compromise in this conference talk from TROOPERS13. Examine the reality of corporate espionage, understand the kill chain process, and witness live demonstrations of exploits targeting PowerShell and the Linux Kernel. Gain insights into the methods used by attackers and learn how to protect against these sophisticated threats. Engage with the speaker during the Q&A session to deepen your understanding of mobile security vulnerabilities and defense strategies.

Syllabus

Intro
What is corporate espionage
Is it real
Kill Chain
Demo
Exploits
Demos
PowerShell T
Linux Kernel
Questions


Taught by

WEareTROOPERS

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network