Ethical Hacking: Hacking Mobile Platforms

Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. Some Apple based, some Android based, some Windows based, and guess who gets to make sure everything stays secure?! This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Course info
Rating
(62)
Level
Beginner
Updated
February 2, 2016
Duration
4h 41m
Table of contents
Hacking iOS
50m 14s
Mobile Malware
37m 50s
Description
Course info
Rating
(62)
Level
Beginner
Updated
February 2, 2016
Duration
4h 41m
Description

Okay, who here DOESN'T have a mobile device? Hands anyone? Didn't think so. Mobile devices have, at an alarming rate, become extremely popular with users and businesses. So next question, what are you doing about it's security? Anyone? Most folks have approached mobile devices with the attitude of "if it works, syncs, and plays games, I'm good". Overlooking this side of technology will lead you into one day appearing on an online video with the words "FAIL" plastered across your company's logo (or your face!). This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith