Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Macquarie University

Cyber Security: Mobile Security

Macquarie University via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Mobile Security | Defend the Devices That Move the World Smartphones are no longer just communication tools—they’re digital vaults, business terminals, and personal ID cards all in one. And with every swipe, tap, and download, they’re becoming the new frontline of cyber risk. This course gives you the skills to secure, investigate, and defend the most pervasive technology in modern life. Protect the Pocket-Sized Threat Surface Developed by Macquarie University’s Cyber Skills Academy—ranked in the top 1% of universities globally and recognised as Australia’s leading cyber security school—this course has been co-designed with industry to reflect the fast-evolving realities of mobile threat landscapes, digital forensics, and enterprise security. You’ll gain deep technical knowledge and forensic capability across: • Mobile architecture fundamentals including iOS and Android OS, secure boot processes, and encryption systems. • File system analysis and the interpretation of mobile digital artifacts for forensic investigation. • The use of specialist tools like Autopsy, FTK, and debug environments to recover and analyse mobile data. • Evidence acquisition techniques that uphold integrity and are admissible in court—across memory, storage, and network traffic. • Deep static and runtime behavioural analysis of mobile applications to uncover hidden threats and trace user interactions. • Mobile device security mechanisms (e.g., authentication, encryption, anti-malware) and how attackers exploit them—and how to stop them. Forensically Ready. Security Smart. Legally Sound. This course is ideal for law enforcement personnel, digital forensic analysts, security professionals, and anyone working in threat detection, mobility, or enterprise IT. You’ll not only understand how mobile devices are targeted, but how to investigate them thoroughly—and secure them intelligently. Whether you’re building resilience into your organisation or preparing for mobile threat response, this course ensures you have the skills to defend what’s in every hand and pocket. Investigate with precision. Defend with confidence. Secure the mobile edge.

Syllabus

  • Mobile Device Fundamentals
    • In today’s hyperconnected world, mobile devices are the front lines of personal and organizational digital presence and often the first point of attack. This module lays the critical foundation for understanding the architecture, operating systems, and applications that power mobile ecosystems like iOS and Android. You’ll explore how mobile devices store and secure data, the nuances of their encryption protocols, and how secure boot processes are implemented across platforms. Just as importantly, you’ll develop a clear understanding of the ethical and legal considerations when handling mobile digital evidence, ensuring that all investigative activities adhere to legal frameworks, professional standards, and high ethical conduct. Whether you're investigating a breach, managing mobile device security, or supporting digital forensics in an enterprise environment, this topic gives you the technical grounding and ethical lens to engage confidently and compliantly.
  • Forensic Analysis of Mobile Operating Systems
    • Mobile operating systems like Android and iOS leave behind a rich trail of digital evidence, if you know where and how to look. In this topic, you’ll learn how to examine and interpret digital artefacts across the unique file systems of the major mobile OS platforms. You’ll explore how mobile devices structure, store, and index data, and gain practical experience in reconstructing timelines of user activity through forensic analysis. From app usage and file access to location data and system logs, this topic equips you with the skills to extract actionable insights from mobile devices, crucial for incident response and cyber investigations. By the end of this topic, you’ll be able to confidently conduct forensic analysis on iOS and Android devices, uncover digital evidence, and follow a structured process aligned with professional standards.
  • Mobile Forensics Tools
    • Modern mobile devices store vast amounts of critical data, but accessing that data for forensic purposes requires the right tools and techniques. In this module, you will gain hands-on experience with state-of-the-art mobile forensics tools such as Autopsy, Android/iOS Debug Tools, and FTK. You’ll explore the capabilities and limitations of both open-source and commercial solutions as you learn to extract, decode, and analyse data from various mobile platforms. Special focus will be given to investigating both proprietary systems and third-party applications, helping you understand where forensic data resides and how to access it legally and efficiently. By comparing tools across functionality, reliability, and usability, you’ll be equipped to choose the right tool for the job and provide sound recommendations during mobile incident investigations.
  • Digital Evidence Acquisition
    • Acquiring digital evidence from mobile devices is a critical step in any forensic investigation, one that must be handled with precision, care, and a deep understanding of legal and technical implications. In this topic, you'll explore the full spectrum of mobile evidence acquisition techniques, from physical and logical extraction to memory dumps, network traffic capture, and cloud data retrieval. You’ll learn how to preserve data integrity, maintain chain of custody, and ensure the admissibility of evidence in court. Practical considerations, such as the pros and cons of extracting artefacts from device memory, SD cards, and over-the-air sources, will be examined through real-world scenarios. By the end of this topic, you'll have a clear understanding of how to approach mobile evidence acquisition with both technical rigor and legal foresight, making your forensic work defensible, reliable, and impactful.
  • Digital Investigation of Mobile Apps
    • Mobile applications are treasure troves of data, often housing critical evidence that can illuminate user behaviour, malicious activity, or digital misconduct. In this topic, you’ll develop advanced investigation techniques to uncover and interpret hidden insights from apps through static analysis (code inspection, file structures) and runtime behavioural analysis (real-time activity tracking). You’ll learn how to dissect application data, analyse user interactions, and identify evidence sources across platforms like Android and iOS. By examining app behaviour under different scenarios, you'll also evaluate the security posture of various mobile platforms, recognising vulnerabilities and strengths that may impact an investigation. This topic will equip you with the skills to go beneath the surface of mobile applications and extract forensic value that is often overlooked, making you a sharper and more informed digital investigator.
  • Mobile Device Security
    • In today’s hyper-connected world, mobile devices are prime targets for cybercriminals. This topic explores the intricate security landscape of smartphones and tablets, equipping you with the knowledge to assess and investigate the protective mechanisms that both defend and obscure critical data. You’ll explore core security concepts such as authentication, access control, and encryption, and how these affect forensic readiness and analysis. Learn to identify and analyse mobile malware, understand infection vectors, and investigate malicious application behaviours. You'll also gain hands-on experience with tools and techniques for bypassing protections like passcodes and biometrics in a lawful forensic context. By the end of this topic, you’ll be able to evaluate mobile device security from both a defensive and investigative perspective, ensuring forensic soundness while navigating the challenges posed by evolving mobile threats.

Taught by

Matt Bushby

Reviews

4.5 rating at Coursera based on 13 ratings

Start your review of Cyber Security: Mobile Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.