25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

CEH v12: Mobile Hacking, OS Security, and Device Management

Christopher Govender

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Mobile devices are one of the core components of today's network environments, so it's vital to know how and where they are possibly vulnerable. In this course, you'll explore the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP, in terms of both attacking and defending these critical pieces of infrastructure. Next, you'll examine common vulnerabilities and attack tools for both Android and iOS, as well as defensive measures you can take to secure them. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them. To complete this course, you'll learn about the need for mobile device management software, how to deploy it, and how it helps secure things in a BYOD world. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

Issued on

November 12, 2024

Expires on

Does not expire