Ethical Hacking: Hacking Mobile Platforms

Pluralsight is not an official partner or accredited training center of EC-Council. Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. You'll learn how to make sure everything stays secure.
Course info
Rating
(75)
Level
Beginner
Updated
February 2, 2016
Duration
4h 41m
Table of contents
Hacking iOS
50m 14s
Mobile Malware
37m 50s
Description
Course info
Rating
(75)
Level
Beginner
Updated
February 2, 2016
Duration
4h 41m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Okay, who here DOESN'T have a mobile device? Hands anyone? Didn't think so. Mobile devices have, at an alarming rate, become extremely popular with users and businesses. So next question, what are you doing about it's security? Anyone? Most folks have approached mobile devices with the attitude of "if it works, syncs, and plays games, I'm good". Overlooking this side of technology will lead you into one day appearing on an online video with the words "FAIL" plastered across your company's logo (or your face!). This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith