We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Ethical Hacking

Hacking Mobile Platforms

Dale Meredith

Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

Read more

Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

It’s official, mobile devices have bypassed usage over traditional workstations. The tricky thing is that aside from security vulnerabilities specific to mobile devices, mobile devices are also vulnerable to many other dangers that apply to desktop and laptop computers, web applications, networks, and other similar technologies. In this course, Ethical Hacking: Hacking Mobile Platforms, you’ll learn to look at the risks mobile devices present as well as learning what you can do to protect them from hackers. First, you’ll explore the various attack vectors the mobile platform presents. Next, you’ll discover the tools and techniques hackers use to compromise Android and iOS devices. Finally, you’ll learn how to protect your organization using various tools and guidelines. When you’re finished with this course, you’ll have the skills and knowledge of security professional needed for the CEH 312-50 exam.

Enroll now

What's inside

Syllabus

Course Overview
Discovering Mobile Platform Attack Vectors
Investigating Android Devices
Explaining iOS Devices Weaknesses
Read more
Outlining Mobile Device Management (MDM)
Pointing Out Security Guidelines
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills and knowledge for CEH 312-50 certification exam
Develops skills needed for security professionals
Instructor Dale Meredith is a seasoned expert in the field of security
Examines both unique mobile platform attack vectors and those similar to desktops and laptops
Provides a comprehensive view of mobile device security from attack vectors to protection measures

Save this course

Save Ethical Hacking: Hacking Mobile Platforms to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Ethical Hacking: Hacking Mobile Platforms. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Ethical Hacking: Hacking Mobile Platforms will develop knowledge and skills that may be useful to these careers:
Penetration Tester
A Penetration Tester is responsible for testing the security of computer networks and systems. They identify and exploit vulnerabilities in systems, and provide recommendations for improving security. The CEH 312-50 Exam is a globally recognized certification for Penetration Testers. This Ethical Hacking course aligns with the exam's objectives and can help you build a foundation for a career as a Penetration Tester.
Mobile Device Security Specialist
A Mobile Device Security Specialist is responsible for securing mobile devices and data. They develop and implement security policies and procedures, and investigate and respond to security incidents. The Ethical Hacking course can help you build a foundation for a career as a Mobile Device Security Specialist by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Cybersecurity Architect
A Cybersecurity Architect designs and implements security solutions for organizations. They also oversee the organization's security program and provide guidance on security best practices. This Ethical Hacking course may be useful in preparing you for a career as a Cybersecurity Architect by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Information Security Manager
An Information Security Manager is responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and oversee the organization's security program. This Ethical Hacking course may be useful in preparing you for a career as an Information Security Manager by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Chief Information Security Officer (CISO)
The CISO is responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and oversee the organization's security program. This Ethical Hacking course may be useful in preparing you for a career as a CISO by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Security Consultant
A Security Consultant provides security advice and guidance to organizations. They help organizations identify and mitigate security risks, and develop and implement security plans. The Ethical Hacking course may be useful in preparing you for a career as a Security Consultant by providing you with the skills and knowledge needed to assess and mitigate security risks to mobile platforms.
Cybersecurity Risk Analyst
A Cybersecurity Risk Analyst assesses and mitigates risks to an organization's cybersecurity. They identify and prioritize security risks, and develop and implement risk management strategies. This Ethical Hacking course may be useful in preparing you for a career as a Cybersecurity Risk Analyst by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Security Engineer
A Security Engineer designs, implements, and maintains security systems. They also monitor and analyze security systems for vulnerabilities and threats, and respond to security incidents. This Ethical Hacking course may be useful in preparing you for a career as a Security Engineer by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for monitoring and analyzing security systems for vulnerabilities and threats. They also respond to security incidents and provide guidance on security best practices. This Ethical Hacking course may be useful in preparing you for a career as a Cybersecurity Analyst by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Computer Network Architect
A Computer Network Architect designs, implements, and maintains computer networks. They also troubleshoot and resolve network problems. The Ethical Hacking course may be useful in preparing you for a career as a Computer Network Architect by providing you with the skills and knowledge needed to secure mobile devices and networks.
Security Operations Manager
A Security Operations Manager is responsible for the day-to-day operations of an organization's security program. They manage security staff and resources, and oversee the organization's security operations. This Ethical Hacking course may be useful in preparing you for a career as a Security Operations Manager by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Information Security Analyst
An Information Security Analyst designs and implements security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems for vulnerabilities and threats, and respond to security incidents. This Ethical Hacking course may be useful in preparing you for a career as an Information Security Analyst by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Systems Administrator
A Systems Administrator is responsible for the day-to-day operation and maintenance of computer systems and networks. They also troubleshoot and resolve system problems. This Ethical Hacking course may be useful in preparing you for a career as a Systems Administrator by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Security Researcher
A Security Researcher identifies and exploits vulnerabilities in computer systems and networks. They also develop and implement security solutions. This Ethical Hacking course may be useful in preparing you for a career as a Security Researcher by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Network Administrator
A Network Administrator is responsible for the day-to-day operation and maintenance of computer networks. They also troubleshoot and resolve network problems. This Ethical Hacking course may be useful in preparing you for a career as a Network Administrator by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Hacking Mobile Platforms.
Provides a deep dive into the security architecture of Android devices, covering topics such as the Linux kernel, the Android framework, and application security. It valuable resource for anyone looking to develop secure Android applications or to perform security assessments of Android devices.
Provides a comprehensive overview of memory forensics, covering topics such as memory acquisition, analysis, and reporting. It valuable resource for anyone looking to perform memory forensics investigations.
Provides a comprehensive overview of security engineering, covering topics such as security principles, threat modeling, and risk management. It valuable resource for anyone looking to learn about security engineering.
Provides a comprehensive overview of cryptography engineering, covering topics such as cryptography primitives, protocol design, and implementation. It valuable resource for anyone looking to learn about cryptography engineering.
Provides a comprehensive overview of network security, covering topics such as network security threats, security protocols, and security management. It valuable resource for anyone looking to learn about network security.
Provides a comprehensive overview of incident response, covering topics such as incident handling, evidence collection, and reporting. It valuable resource for anyone looking to learn about incident response.
Provides a comprehensive overview of computer forensics and incident response, covering topics such as digital evidence collection, analysis, and reporting. It valuable resource for anyone looking to learn about computer forensics and incident response.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Hacking Mobile Platforms.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser