When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Ethical Hacking: Hacking Mobile Platforms
Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.
This Course Includes
pluralsight
5 (44 reviews )
2 hour 22 minutes
english
Online - Self Paced
core courses
pluralsight
About Ethical Hacking: Hacking Mobile Platforms
It’s official, mobile devices have bypassed usage over traditional workstations. The tricky thing is that aside from security vulnerabilities specific to mobile devices, mobile devices are also vulnerable to many other dangers that apply to desktop and laptop computers, web applications, networks, and other similar technologies. In this course, Ethical Hacking: Hacking Mobile Platforms, you’ll learn to look at the risks mobile devices present as well as learning what you can do to protect them from hackers. First, you’ll explore the various attack vectors the mobile platform presents. Next, you’ll discover the tools and techniques hackers use to compromise Android and iOS devices. Finally, you’ll learn how to protect your organization using various tools and guidelines. When you’re finished with this course, you’ll have the skills and knowledge of security professional needed for the CEH 312-50 exam.
What You Will Learn?
- Course Overview : 2mins.
- Discovering Mobile Platform Attack Vectors : 32mins.
- Investigating Android Devices : 42mins.
- Explaining iOS Devices Weaknesses : 15mins.
- Outlining Mobile Device Management (MDM) : 19mins.
- Pointing Out Security Guidelines : 29mins.
- Domain Summary : 1min.
