CEH v12: Mobile Hacking, OS Security, and Device Management
CEH v12
| Intermediate
- 4 videos | 1h 30m 28s
- Includes Assessment
- Earns a Badge
Mobile devices are one of the core components of today's network environments, so it's vital to know how and where they are possibly vulnerable. In this course, you'll explore the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP, in terms of both attacking and defending these critical pieces of infrastructure. Next, you'll examine common vulnerabilities and attack tools for both Android and iOS, as well as defensive measures you can take to secure them. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them. To complete this course, you'll learn about the need for mobile device management software, how to deploy it, and how it helps secure things in a BYOD world. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the attack surface related to mobile devicesdescribe owasp top 10 mobile risksrecognize the mobile risks as defined by owaspidentify the owasp defined top 10 mobile risks to mobile devicesIdentify sources of information for the android environmentidentify security and risk associated with rooting an android devicedescribe debugging and access tools available for android devicesrecognize common android vulnerability and attack tools
-
Identify defenses associated with ios devicesrecognize tools that could be used as attack vectors with ios devicesidentify jailbreaking types associated with ios devicesrecognize attack vectors associated with ios devicesRecognize the tools and software available to do mobile device managementidentify how mobile device management should be deployed along with security policiesidentify security issues around byod and mobile device managementidentify the need and capabilities of mobile device management
IN THIS COURSE
-
22m 48sAfter completing this video, you will be able to outline the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP. FREE ACCESS
-
24m 55sUpon completion of this video, you will be able to recognize common Android vulnerabilities and attack tools, as well as defensive measures you can take to secure Android devices. FREE ACCESS
-
21m 58sAfter completing this video, you will be able to recognize attack vectors and defenses associated with iOS-enabled devices. FREE ACCESS
-
20m 47sUpon completion of this video, you will be able to recognize the need for mobile device management software, how to deploy it, and how it helps add security to a BYOD world. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.