MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Ethical Hacking: Hacking Mobile Platforms

Course Summary

Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. Some Apple based, some Android based, some Windows based, and guess who gets to make sure everything stays secure?! This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking


  • +

    Course Syllabus

    Mobile Device Attack Vectors
    - 46m 36s

    —Hacking Mobile Platforms 4m 50s
    —How Bad Is It? 7m 28s
    —Terms You Should Know 8m 7s
    —More Terms (Half-eaten Fruit) 2m 53s
    —A Plethora of Vectors 8m 53s
    —DEMO: NFC Tags 11m 40s
    —Summary 2m 42s
    Hacking Android
    - 1h 19m

    —Hacking Android 2m 13s
    —Understanding the Architecture 9m 13s
    —Understanding the Device 10m 4s
    —Rooting 7m 18s
    —Rooting: Some New Jargon 7m 21s
    —DEMO:Rooting 5m 58s
    —DEMO:Rooting Resources 7m 7s
    —DEMO:Using Odin 4m 42s
    —Attacks 9m 13s
    —Malware 8m 20s
    —Locking It Down 5m 53s
    —Summary 1m 50s
    Hacking iOS
    - 50m 14s
    Hacking Other Mobile Platforms
    - 19m 14s
    MDM: Mobile Device Management, Guidelines, and Tools
    - 33m 21s
    Mobile Malware
    - 37m 50s
    Mobile Payments
    - 15m 4s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top