Course Details

Previous Page


Certified Ethical Hacker (CEH): Hacking Mobile Platforms


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization's data. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Target Audience
Network and information security professionals

Prerequisites
None

Expected Duration (hours)
1.5

Lesson Objectives

Certified Ethical Hacker (CEH): Hacking Mobile Platforms

  • identify mobile attack vectors
  • match Android hacking tools to their descriptions
  • identify best practices for keeping an Android device secure
  • identify best practices for making your iOS device more secure
  • identify the countermeasures for attacks on Windows OS devices
  • identify countermeasures used to protect against attacks on BlackBerry devices
  • identify the best practices used to protect all mobile devices from attack
  • identify methods of mobile device attacks and how to counter them
  • Course Number:
    sp_ceth_a14_it_enus