Free
Mobile Security Fundamentals
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
0
H
31
M
Time
beginner
difficulty
1
ceu/cpe
Course Content
Mobile Security Basic Architecture
Mobile Security Fundamentals
Mobile Security Defense
Mobile Security Fundamentals
Mobile Offensive (IOS) Part 1
Mobile Security Fundamentals
Mobile Offensive (Android) Part 2
Mobile Security Fundamentals
Course Description
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.