This Course is part of a Career Path: Information Security Fundamentals
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
Certificate of Completion
Complete this entire course to earn a Mobile Security Fundamentals Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.