تفاصيل الدورة

Mobile devices and applications have become an integral part of our lives; so much so, that we cannot even imagine a day without them. But with advancing technology-wise, mobile devices have also risen on risk factor front. Among various potential attacks, device loss, data leakage, device theft, malware attacks and attacks on the mobile applications, top the charts. According to a report published by CSO, in 2017, more than 16 million incidents of mobile malware attacks were recorded.

The victims included all spheres of individuals and organizations, most of which had no intimation that they have gone through any cyber attack. The BYOD (Bring Your Device To Work) policy, followed by almost all the enterprises, is one of the most severe threat factor, with reference to securing the enterprises' information systems. 

Industry estimates suggest that over 95% of the mobile applications developed are vulnerable to different types of hacking. In 2014, 1 billion personal data records were reported to being compromised after being hit by cyber attacks. Apart from this, mobile malwares were, reportedly, found affecting 11.6 million mobile devices and the numbers have increased exponentially since then. According to the reports, 40% of companies don't scan the source code of their mobile applications for the presence of security vulnerabilities. On an average, an organization tests less than half of the mobile applications built by them and 33% of companies don't even test the applications (made by them) to ensure security. This makes the task of securing the information systems all the more important.

The lectures in this chapter aims at providing sufficient knowledge about various sections that will help in understanding the underlying systems (like iOS and Android) that our mobile devices run on, gauging the potential threat vectors and looking for optimal solutions to safeguard/ secure those systems.The major topics covered in this course are as follows: 

  1. Mobile Application Security
  2. Need for Mobile Application Security Testing
  3. Android Architecture
  4. Interaction with Android Devices
  5. Android Network Analysis
  6. Android Application Pen-Testing
  7. Rooting Android Devices
  8. Android Remote Control Tools
  9. Android Security Tool
  10. Malware in Android Devices
  11. Key Trends in Mobile Security

The course will provide further insights into iOS application testing.

تحديث بتاريخ 25 February, 2018
دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Networking and Security ابتداءً من الآن. See all courses