Mobile Security Fundamentals
FREE
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
Time
30 minutes
Difficulty
Beginner
CEU/CPE
1
3.7
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Course Content
Module 1: Mobile Security Fundamentals
Course Description
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
Instructed By

Ken Underhill
Senior Instructor
Provider

Certificate of Completion

Complete this entire course to earn a Mobile Security Fundamentals Certificate of Completion
Similar Content