We may earn an affiliate commission when you visit our partners.
Dale Meredith

Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

Read more

Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

It’s official, mobile devices have bypassed usage over traditional workstations. The tricky thing is that aside from security vulnerabilities specific to mobile devices, mobile devices are also vulnerable to many other dangers that apply to desktop and laptop computers, web applications, networks, and other similar technologies. In this course, Ethical Hacking: Hacking Mobile Platforms, you’ll learn to look at the risks mobile devices present as well as learning what you can do to protect them from hackers. First, you’ll explore the various attack vectors the mobile platform presents. Next, you’ll discover the tools and techniques hackers use to compromise Android and iOS devices. Finally, you’ll learn how to protect your organization using various tools and guidelines. When you’re finished with this course, you’ll have the skills and knowledge of security professional needed for the CEH 312-50 exam.

Enroll now

What's inside

Syllabus

Course Overview
Discovering Mobile Platform Attack Vectors
Investigating Android Devices
Explaining iOS Devices Weaknesses
Read more
Outlining Mobile Device Management (MDM)
Pointing Out Security Guidelines
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills and knowledge for CEH 312-50 certification exam
Develops skills needed for security professionals
Instructor Dale Meredith is a seasoned expert in the field of security
Examines both unique mobile platform attack vectors and those similar to desktops and laptops
Provides a comprehensive view of mobile device security from attack vectors to protection measures

Save this course

Save Ethical Hacking: Hacking Mobile Platforms to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Ethical Hacking: Hacking Mobile Platforms with these activities:
Review course syllabus and learning objectives
Identify topics covered in the course, establishing a roadmap for learning
Show steps
  • Read through the course syllabus carefully
  • Identify key concepts and topics
  • Set realistic learning goals
Review Unix Command Line Basics
Refresh your knowledge to prepare for tasks you will be doing in this course.
Show steps
  • Brush up on file and directory manipulation commands
  • Review basic text processing commands
  • Experiment with commands that allow you to interact with the system
Follow Online Tutorials for Network Reconnaissance
Online tutorials provide a structured approach to learning about network reconnaissance.
Browse courses on Network Reconnaissance
Show steps
  • Identify reputable online platforms and resources for network reconnaissance tutorials
  • Select tutorials that cover essential concepts, tools, and techniques
  • Follow the tutorials, practice the techniques, and document your learnings
One other activity
Expand to see all activities and additional details
Show all four activities
Explore online tutorials on mobile security
Gain a deeper understanding of mobile security principles and techniques
Browse courses on Android Security
Show steps
  • Identify reputable sources for mobile security tutorials
  • Select tutorials that align with course topics
  • Follow the tutorials diligently

Career center

Learners who complete Ethical Hacking: Hacking Mobile Platforms will develop knowledge and skills that may be useful to these careers:
Penetration Tester
A Penetration Tester is responsible for testing the security of computer networks and systems. They identify and exploit vulnerabilities in systems, and provide recommendations for improving security. The CEH 312-50 Exam is a globally recognized certification for Penetration Testers. This Ethical Hacking course aligns with the exam's objectives and can help you build a foundation for a career as a Penetration Tester.
Mobile Device Security Specialist
A Mobile Device Security Specialist is responsible for securing mobile devices and data. They develop and implement security policies and procedures, and investigate and respond to security incidents. The Ethical Hacking course can help you build a foundation for a career as a Mobile Device Security Specialist by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Cybersecurity Architect
A Cybersecurity Architect designs and implements security solutions for organizations. They also oversee the organization's security program and provide guidance on security best practices. This Ethical Hacking course may be useful in preparing you for a career as a Cybersecurity Architect by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Information Security Manager
An Information Security Manager is responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and oversee the organization's security program. This Ethical Hacking course may be useful in preparing you for a career as an Information Security Manager by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Chief Information Security Officer (CISO)
The CISO is responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and oversee the organization's security program. This Ethical Hacking course may be useful in preparing you for a career as a CISO by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Security Consultant
A Security Consultant provides security advice and guidance to organizations. They help organizations identify and mitigate security risks, and develop and implement security plans. The Ethical Hacking course may be useful in preparing you for a career as a Security Consultant by providing you with the skills and knowledge needed to assess and mitigate security risks to mobile platforms.
Cybersecurity Risk Analyst
A Cybersecurity Risk Analyst assesses and mitigates risks to an organization's cybersecurity. They identify and prioritize security risks, and develop and implement risk management strategies. This Ethical Hacking course may be useful in preparing you for a career as a Cybersecurity Risk Analyst by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Security Engineer
A Security Engineer designs, implements, and maintains security systems. They also monitor and analyze security systems for vulnerabilities and threats, and respond to security incidents. This Ethical Hacking course may be useful in preparing you for a career as a Security Engineer by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for monitoring and analyzing security systems for vulnerabilities and threats. They also respond to security incidents and provide guidance on security best practices. This Ethical Hacking course may be useful in preparing you for a career as a Cybersecurity Analyst by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Computer Network Architect
A Computer Network Architect designs, implements, and maintains computer networks. They also troubleshoot and resolve network problems. The Ethical Hacking course may be useful in preparing you for a career as a Computer Network Architect by providing you with the skills and knowledge needed to secure mobile devices and networks.
Security Operations Manager
A Security Operations Manager is responsible for the day-to-day operations of an organization's security program. They manage security staff and resources, and oversee the organization's security operations. This Ethical Hacking course may be useful in preparing you for a career as a Security Operations Manager by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Information Security Analyst
An Information Security Analyst designs and implements security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems for vulnerabilities and threats, and respond to security incidents. This Ethical Hacking course may be useful in preparing you for a career as an Information Security Analyst by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Systems Administrator
A Systems Administrator is responsible for the day-to-day operation and maintenance of computer systems and networks. They also troubleshoot and resolve system problems. This Ethical Hacking course may be useful in preparing you for a career as a Systems Administrator by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Security Researcher
A Security Researcher identifies and exploits vulnerabilities in computer systems and networks. They also develop and implement security solutions. This Ethical Hacking course may be useful in preparing you for a career as a Security Researcher by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.
Network Administrator
A Network Administrator is responsible for the day-to-day operation and maintenance of computer networks. They also troubleshoot and resolve network problems. This Ethical Hacking course may be useful in preparing you for a career as a Network Administrator by providing you with the skills and knowledge needed to identify and mitigate security risks to mobile platforms.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Hacking Mobile Platforms.
Provides a deep dive into the security architecture of Android devices, covering topics such as the Linux kernel, the Android framework, and application security. It valuable resource for anyone looking to develop secure Android applications or to perform security assessments of Android devices.
Provides a comprehensive overview of memory forensics, covering topics such as memory acquisition, analysis, and reporting. It valuable resource for anyone looking to perform memory forensics investigations.
Provides a comprehensive overview of security engineering, covering topics such as security principles, threat modeling, and risk management. It valuable resource for anyone looking to learn about security engineering.
Provides a comprehensive overview of cryptography engineering, covering topics such as cryptography primitives, protocol design, and implementation. It valuable resource for anyone looking to learn about cryptography engineering.
Provides a comprehensive overview of network security, covering topics such as network security threats, security protocols, and security management. It valuable resource for anyone looking to learn about network security.
Provides a comprehensive overview of incident response, covering topics such as incident handling, evidence collection, and reporting. It valuable resource for anyone looking to learn about incident response.
Provides a comprehensive overview of computer forensics and incident response, covering topics such as digital evidence collection, analysis, and reporting. It valuable resource for anyone looking to learn about computer forensics and incident response.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Hacking Mobile Platforms.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser