Mobile Security Threats

Intermediate
  • 20 videos | 1h 21m 7s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 137 users Rating 4.5 of 137 users (137)
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.

WHAT YOU WILL LEARN

  • Describe current mobile devices and form factors
    Describe the current state of mobile device security
    Describe mobile security considerations
    Describe the process to determine risk in a mobile environment
    Describe sensitive mobile assets
    Describe sensitive usage scenarios for mobile devices
    Describe how mobile data is stored and transported
    List the owasp top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systems
    Describe how insecure data storage affects mobile device front-end and back-end systems
    Describe how insufficient transport layer protection affects mobile device front-end and back-end systems
  • Describe how unintended data leakage affects mobile device front-end and back-end systems
    Describe how poor authorization and authentication affects mobile device front-end and back-end systems
    Describe how broken cryptography affects mobile device front-end and back-end systems
    Describe how client-side injection affects mobile device front-end systems
    Describe how security decisions via untrusted inputs affect mobile device back-end systems
    Describe how improper session handling affects mobile device front-end systems
    Describe how lack of binary protections affects mobile device front-end systems
    Describe the potential technical impacts of mobile exploits
    Describe the potential business impacts of mobile exploits
    Assess threats from owasp top 10 and their impact on mobile systems

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Channel Cybersecurity
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 2720 users Rating 4.4 of 2720 users (2720)
Rating 4.5 of 4775 users Rating 4.5 of 4775 users (4775)
Rating 4.4 of 524 users Rating 4.4 of 524 users (524)