Ethical Hacking: Hacking Mobile Platforms

Pluralsight
Course Summary
Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. Some Apple based, some Android based, some Windows based, and guess who gets to make sure everything stays secure?! This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
Okay, who here DOESN'T have a mobile device? Hands anyone? Didn't think so. Mobile devices have, at an alarming rate, become extremely popular with users and businesses. So next question, what are you doing about it's security? Anyone? Most folks have approached mobile devices with the attitude of "if it works, syncs, and plays games, I'm good". Overlooking this side of technology will lead you into one day appearing on an online video with the words "FAIL" plastered across your company's logo (or your face!). This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Mobile Device Attack Vectors- 46m 36s
—Hacking Mobile Platforms 4m 50s
—How Bad Is It? 7m 28s
—Terms You Should Know 8m 7s
—More Terms (Half-eaten Fruit) 2m 53s
—A Plethora of Vectors 8m 53s
—DEMO: NFC Tags 11m 40s
—Summary 2m 42sHacking Android- 1h 19m
—Hacking Android 2m 13s
—Understanding the Architecture 9m 13s
—Understanding the Device 10m 4s
—Rooting 7m 18s
—Rooting: Some New Jargon 7m 21s
—DEMO:Rooting 5m 58s
—DEMO:Rooting Resources 7m 7s
—DEMO:Using Odin 4m 42s
—Attacks 9m 13s
—Malware 8m 20s
—Locking It Down 5m 53s
—Summary 1m 50sHacking iOS- 50m 14sHacking Other Mobile Platforms- 19m 14sMDM: Mobile Device Management, Guidelines, and Tools- 33m 21sMobile Malware- 37m 50sMobile Payments- 15m 4s