CEH v11: Mobile Hacking, OS Security & Device Management

Ethical Hacker v11    |    Intermediate
  • 4 videos | 1h 26m 48s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Mobile devices are one of the core components of today's network environments, so it's vital to know how and where they are possibly vulnerable. In this course, you'll explore the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP, in terms of both attacking and defending these critical pieces of infrastructure. Next, you'll examine common vulnerabilities and attack tools for both Android and iOS, as well as defensive measures you can take to secure them. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them. To complete this course, you'll learn about the need for mobile device management software, how to deploy it, and how it helps secure things in a BYOD world. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the mobile risks as defined by owasp
    describe owasp top 10 mobile risks
    recognize the attack surface related to mobile devices
    identify the owasp defined top 10 mobile risks to mobile devices
    Identify security and risk associated with rooting an android device
    describe debugging and access tools available for android devices
    recognize common android vulnerability and attack tools
    identify sources of information for the android environment
  • Recognize attack vectors associated with ios devices
    identify defenses associated with ios devices
    recognize tools that could be used as attack vectors with ios devices
    identify jailbreaking types associated with ios devices
    Recognize the tools and software available to do mobile device management
    identify the need and capabilities of mobile device management
    identify security issues around byod and mobile device management
    identify how mobile device management should be deployed along with security policies

IN THIS COURSE

  • Locked
    1.  Mobile Hacking Concepts
    21m 33s
    After completing this video, you will be able to recognize the attack surface related to mobile devices. FREE ACCESS
  • Locked
    2.  Android Security
    21m 19s
    Upon completion of this video, you will be able to recognize common android vulnerabilities and attack tools. FREE ACCESS
  • Locked
    3.  iOS Security
    22m 20s
    After completing this video, you will be able to recognize tools that could be used as attack vectors on iOS devices. FREE ACCESS
  • Locked
    4.  Mobile Device Management and Security
    21m 37s
    In this video, you will learn how to deploy mobile device management along with security policies. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.6 of 35 users Rating 4.6 of 35 users (35)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.4 of 19 users Rating 4.4 of 19 users (19)
Rating 4.7 of 38 users Rating 4.7 of 38 users (38)