Mobile Security Threats
Intermediate
- 20 Videos | 1h 21m 7s
- Includes Assessment
- Earns a Badge
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.
WHAT YOU WILL LEARN
-
describe current mobile devices and form factorsdescribe the current state of mobile device securitydescribe mobile security considerationsdescribe the process to determine risk in a mobile environmentdescribe sensitive mobile assetsdescribe sensitive usage scenarios for mobile devicesdescribe how mobile data is stored and transportedlist the OWASP top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systemsdescribe how insecure data storage affects mobile device front-end and back-end systemsdescribe how insufficient transport layer protection affects mobile device front-end and back-end systems
-
describe how unintended data leakage affects mobile device front-end and back-end systemsdescribe how poor authorization and authentication affects mobile device front-end and back-end systemsdescribe how broken cryptography affects mobile device front-end and back-end systemsdescribe how client-side injection affects mobile device front-end systemsdescribe how security decisions via untrusted inputs affect mobile device back-end systemsdescribe how improper session handling affects mobile device front-end systemsdescribe how lack of binary protections affects mobile device front-end systemsdescribe the potential technical impacts of mobile exploitsdescribe the potential business impacts of mobile exploitsassess threats from OWASP top 10 and their impact on mobile systems
IN THIS COURSE
-
1.Mobile Device Overview4m 7sUP NEXT
-
2.The Mobile Security Landscape5m 16s
-
3.Overview of Security5m 2s
-
4.Identifying Risks2m 57s
-
5.Sensitive Mobile Assets3m 21s
-
6.Sensitive Usage of Mobile Devices2m 49s
-
7.Sensitive Data Storage and Transport3m 52s
-
8.Weak Server-side Controls3m 7s
-
9.Insecure Data Storage2m 51s
-
10.Insufficient Transport Layer Protection4m 59s
-
11.Unintended Data Leakage2m 56s
-
12.Poor Authorization and Authentication5m 18s
-
13.Broken Cryptography6m 9s
-
14.Client-side Injection4m 56s
-
15.Security Decisions via Untrusted Inputs4m 17s
-
16.Improper Session Handling4m 23s
-
17.Lack of Binary Protections3m 17s
-
18.Technical Impacts of Exploits3m 8s
-
19.Business Impacts of Exploits3m 9s
-
20.Exercise: Assessing Mobile Threats5m 13s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.