CEH v11: Mobile Hacking OS Security & Device Management
Mobile devices are one of the core components of todays network environments so vital to know how and where they are possibly vulnerable. In this course youll explore the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP in terms of both attacking and defending these critical pieces of infrastructure. Next youll examine common vulnerabilities and attack tools for both Android and iOS as well as defensive measures you can take to secure them. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them. To complete this course youll learn about the need for mobile device management software how to deploy it and how it helps secure things in a BYOD world. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.