Mobile Security Threats

  • 20 Videos | 1h 30m 37s
  • Includes Assessment
  • Earns a Badge
Likes 30 Likes 30
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.

WHAT YOU WILL LEARN

  • describe current mobile devices and form factors
    describe the current state of mobile device security
    describe mobile security considerations
    describe the process to determine risk in a mobile environment
    describe sensitive mobile assets
    describe sensitive usage scenarios for mobile devices
    describe how mobile data is stored and transported
    list the OWASP top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systems
    describe how insecure data storage affects mobile device front-end and back-end systems
    describe how insufficient transport layer protection affects mobile device front-end and back-end systems
  • describe how unintended data leakage affects mobile device front-end and back-end systems
    describe how poor authorization and authentication affects mobile device front-end and back-end systems
    describe how broken cryptography affects mobile device front-end and back-end systems
    describe how client-side injection affects mobile device front-end systems
    describe how security decisions via untrusted inputs affect mobile device back-end systems
    describe how improper session handling affects mobile device front-end systems
    describe how lack of binary protections affects mobile device front-end systems
    describe the potential technical impacts of mobile exploits
    describe the potential business impacts of mobile exploits
    assess threats from OWASP top 10 and their impact on mobile systems

IN THIS COURSE

  • Playable
    1. 
    Mobile Device Overview
    4m 7s
    UP NEXT
  • Playable
    2. 
    The Mobile Security Landscape
    5m 16s
  • Locked
    3. 
    Overview of Security
    5m 2s
  • Locked
    4. 
    Identifying Risks
    2m 57s
  • Locked
    5. 
    Sensitive Mobile Assets
    3m 21s
  • Locked
    6. 
    Sensitive Usage of Mobile Devices
    2m 49s
  • Locked
    7. 
    Sensitive Data Storage and Transport
    3m 52s
  • Locked
    8. 
    Weak Server-side Controls
    3m 7s
  • Locked
    9. 
    Insecure Data Storage
    2m 51s
  • Locked
    10. 
    Insufficient Transport Layer Protection
    4m 59s
  • Locked
    11. 
    Unintended Data Leakage
    2m 56s
  • Locked
    12. 
    Poor Authorization and Authentication
    5m 18s
  • Locked
    13. 
    Broken Cryptography
    6m 9s
  • Locked
    14. 
    Client-side Injection
    4m 56s
  • Locked
    15. 
    Security Decisions via Untrusted Inputs
    4m 17s
  • Locked
    16. 
    Improper Session Handling
    4m 23s
  • Locked
    17. 
    Lack of Binary Protections
    3m 17s
  • Locked
    18. 
    Technical Impacts of Exploits
    3m 8s
  • Locked
    19. 
    Business Impacts of Exploits
    3m 9s
  • Locked
    20. 
    Exercise: Assessing Mobile Threats
    5m 13s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 12 Likes 12  
Likes 64 Likes 64  
CHANNEL CompTIA CySA+
Likes 209 Likes 209  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE