Certified Ethical Hacker (CEH) v8: Hacking Mobile Platforms
This course is included in the Everything IT Self-Paced training package.
Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization’s data. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.
In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization.
This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Network and information security professionals
Mobile Platform Attacks and Management
Hacking Android OS
Protecting Android Devices
Securing Windows OS Devices
Securing BlackBerry Devices
Mobile Platform Security
Protecting Mobile Devices