CEH v12: Mobile Hacking OS Security and Device Management

placeholder

Mobile devices are one of the core components of today network environments so it vital to know how and where they are possibly vulnerable.

In this course you;ll explore the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP in terms of both attacking and defending these critical pieces of infrastructure. Next you;ll examine common vulnerabilities and attack tools for both Android and iOS as well as defensive measures you can take to secure them. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them. To complete this course you;ll learn about the need for mobile device management software how to deploy it and how it helps secure things in a BYOD world.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.