Course Content

Module 1: Mobile Security Fundamentals

1.1 Mobile Security Basic Architecture
1.2 Mobile Security Defense
1.3 Mobile Offensive (IOS) Part 1
1.4 Mobile Offensive (Android) Part 2

Course Description

In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Mobile Security Fundamentals Certificate of Completion