Certified Ethical Hacker (CEH): Hacking Mobile Platforms

Network and information security professionals


Expected Duration
90 minutes

Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization’s data. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.


Hacking Mobile Platforms

  • identify mobile attack vectors
  • match Android hacking tools to their descriptions
  • identify best practices for keeping an Android device secure
  • identify best practices for making your iOS device more secure
  • identify the countermeasures for attacks on Windows OS devices
  • identify countermeasures used to protect against attacks on BlackBerry devices
  • identify the best practices used to protect all mobile devices from attack
  • identify methods of mobile device attacks and how to counter them





Multi-license discounts available for Annual and Monthly subscriptions.