When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

pluralsight logo

Ethical Hacking: Hacking Mobile Platforms

Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

     
  • 5
  •  |
  • Reviews ( 44 )
Free
Ethical Hacking: Hacking Mobile Platforms

This Course Includes

  • iconpluralsight
  • icon5 (44 reviews )
  • icon2 hour 22 minutes
  • iconenglish
  • iconOnline - Self Paced
  • iconcore courses
  • iconpluralsight

About Ethical Hacking: Hacking Mobile Platforms

It’s official, mobile devices have bypassed usage over traditional workstations. The tricky thing is that aside from security vulnerabilities specific to mobile devices, mobile devices are also vulnerable to many other dangers that apply to desktop and laptop computers, web applications, networks, and other similar technologies. In this course, Ethical Hacking: Hacking Mobile Platforms, you’ll learn to look at the risks mobile devices present as well as learning what you can do to protect them from hackers. First, you’ll explore the various attack vectors the mobile platform presents. Next, you’ll discover the tools and techniques hackers use to compromise Android and iOS devices. Finally, you’ll learn how to protect your organization using various tools and guidelines. When you’re finished with this course, you’ll have the skills and knowledge of security professional needed for the CEH 312-50 exam.

What You Will Learn?

  • Course Overview : 2mins.
  • Discovering Mobile Platform Attack Vectors : 32mins.
  • Investigating Android Devices : 42mins.
  • Explaining iOS Devices Weaknesses : 15mins.
  • Outlining Mobile Device Management (MDM) : 19mins.
  • Pointing Out Security Guidelines : 29mins.
  • Domain Summary : 1min.