Mobile Security Threats
Intermediate
- 20 videos | 1h 21m 7s
- Includes Assessment
- Earns a Badge
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.
WHAT YOU WILL LEARN
-
Describe current mobile devices and form factorsDescribe the current state of mobile device securityDescribe mobile security considerationsDescribe the process to determine risk in a mobile environmentDescribe sensitive mobile assetsDescribe sensitive usage scenarios for mobile devicesDescribe how mobile data is stored and transportedList the owasp top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systemsDescribe how insecure data storage affects mobile device front-end and back-end systemsDescribe how insufficient transport layer protection affects mobile device front-end and back-end systems
-
Describe how unintended data leakage affects mobile device front-end and back-end systemsDescribe how poor authorization and authentication affects mobile device front-end and back-end systemsDescribe how broken cryptography affects mobile device front-end and back-end systemsDescribe how client-side injection affects mobile device front-end systemsDescribe how security decisions via untrusted inputs affect mobile device back-end systemsDescribe how improper session handling affects mobile device front-end systemsDescribe how lack of binary protections affects mobile device front-end systemsDescribe the potential technical impacts of mobile exploitsDescribe the potential business impacts of mobile exploitsAssess threats from owasp top 10 and their impact on mobile systems
IN THIS COURSE
-
4m 7s
-
5m 16s
-
5m 2s
-
2m 57s
-
3m 21s
-
2m 49s
-
3m 52s
-
3m 7s
-
2m 51s
-
4m 59s
-
2m 56s
-
5m 18s
-
6m 9s
-
4m 56s
-
4m 17s
-
4m 23s
-
3m 17s
-
3m 8s
-
3m 9s
-
5m 13s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.