5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Mobile devices are one of the core components of today's network environments, so it's vital to know how and where they are possibly vulnerable. In this course, you'll explore the attack surface related to mobile devices and the Top 10 Mobile Risks as defined by OWASP, in terms of both attacking and defending these critical pieces of infrastructure. Next, you'll examine common vulnerabilities and attack tools for both Android and iOS, as well as defensive measures you can take to secure them. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them. To complete this course, you'll learn about the need for mobile device management software, how to deploy it, and how it helps secure things in a BYOD world. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEHv11: Mobile Hacking, OS Security & Device Management

  • describe OWASP Top 10 Mobile Risks
  • identify the OWASP defined Top 10 Mobile Risks to mobile devices
  • recognize the attack surface related to mobile devices
  • recognize the mobile risks as defined by OWASP
  • describe debugging and access tools available for Android devices
  • identify security and risk associated with rooting an Android device
  • identify sources of information for the Android environment
  • recognize common android vulnerability and attack tools
  • identify defenses associated with iOS devices
  • identify jailbreaking types associated with iOS devices
  • recognize attack vectors associated with iOS devices
  • recognize tools that could be used as attack vectors with iOS devices
  • identify how mobile device management should be deployed along with security policies
  • identify security issues around BYOD and mobile device management
  • identify the need and capabilities of mobile device management
  • recognize the tools and software available to do mobile device management