Free

Mobile Security Fundamentals

In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
0
31
M
Time
beginner
difficulty
1
ceu/cpe

Course Content

Mobile Offensive (Android) Part 2

4m

Mobile Security Fundamentals
Mobile Offensive (IOS) Part 1

11m

Mobile Security Fundamentals
Mobile Security Defense

7m

Mobile Security Fundamentals
Mobile Security Basic Architecture

8m

Mobile Security Fundamentals
Course Description

In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Ken Underhill

I'm a cybersecurity professional who has worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Mobile Security Fundamentals Certificate of Completion