Mobile security has become increasingly important with the deployment of mobile devices and applications in the enterprise—from small businesses to Fortune 100 companies. Mobile devices have greatly advanced from a mere device for communication to an extent that they have become replacements for cameras, music players, game consoles, and even computers. With the advancement in mobile technology is a growing concern on the sensitive information being collected and processed on these devices that must be secured in order to protect the privacy of the users and the intellectual property of the company.
This course provides in-depth knowledge of Mobile Device and Application Security—highlighting and analysing the latest mobile threats and mitigations. It explains the differences between the security models used by iOS, Android, Windows Phone, and Blackberry, and how to evaluate the security of mobile devices and applications by means of reverse engineering, network activity analysis, and penetration testing.
Day 1
Day 2
Day 3
Day 4
Day 5
Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy