Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Macquarie University

Cyber Security: Mobile Security

Macquarie University via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
• Watch our course introduction video before you enroll! (copy and paste into browser) https://vimeo.com/1176049359 Mobile Security | Defend the Devices That Move the World Smartphones are no longer just communication tools—they’re digital vaults, business terminals, and personal ID cards all in one. And with every swipe, tap, and download, they’re becoming the new frontline of cyber risk. This course gives you the skills to secure, investigate, and defend the most pervasive technology in modern life. Protect the Pocket-Sized Threat Surface Developed by Macquarie University’s Cyber Skills Academy—ranked in the top 1% of universities globally and recognised as Australia’s leading cyber security school—this course has been co-designed with industry to reflect the fast-evolving realities of mobile threat landscapes, digital forensics, and enterprise security. You’ll gain deep technical knowledge and forensic capability across: • Mobile architecture fundamentals including iOS and Android OS, secure boot processes, and encryption systems. • File system analysis and the interpretation of mobile digital artifacts for forensic investigation. • The use of specialist tools like Autopsy, FTK, and debug environments to recover and analyse mobile data. • Evidence acquisition techniques that uphold integrity and are admissible in court—across memory, storage, and network traffic. • Deep static and runtime behavioural analysis of mobile applications to uncover hidden threats and trace user interactions. • Mobile device security mechanisms (e.g., authentication, encryption, anti-malware) and how attackers exploit them—and how to stop them. Forensically Ready. Security Smart. Legally Sound. This course is ideal for law enforcement personnel, digital forensic analysts, security professionals, and anyone working in threat detection, mobility, or enterprise IT. You’ll not only understand how mobile devices are targeted, but how to investigate them thoroughly—and secure them intelligently. Whether you’re building resilience into your organisation or preparing for mobile threat response, this course ensures you have the skills to defend what’s in every hand and pocket. Investigate with precision. Defend with confidence. Secure the mobile edge.

Syllabus

  • Mobile Device Foundations
    • This module builds foundational knowledge of mobile device architecture, operating systems like iOS and Android, and application ecosystems. Understand how mobile devices store and secure data, including encryption and secure boot processes. You will also learn ethical and legal considerations for handling mobile digital evidence, ensuring compliant investigative activities. This topic provides technical grounding and an ethical lens for managing mobile device security and supporting digital forensics.
  • Mobile Operating System Forensic Analysis
    • Mobile operating systems like Android and iOS contain digital evidence. This module teaches you to examine and interpret digital artifacts across major mobile OS file systems. Learn how devices structure, store, and index data, gaining practical experience in reconstructing user activity timelines through forensic analysis. Extract actionable insights from app usage, file access, location data, and system logs for incident response and cyber investigations. By the end, you will confidently conduct forensic analysis on iOS and Android devices, uncovering digital evidence aligned with professional standards.
  • Mobile Forensics Tools
    • Accessing critical mobile data for forensic purposes requires specific tools. This module provides hands-on experience with mobile forensics tools like Autopsy, Android/iOS Debug Tools, and FTK. Explore the capabilities and limitations of open-source and commercial solutions to extract, decode, and analyze data from various mobile platforms. Focus on investigating proprietary systems and third-party applications to understand where forensic data resides and how to access it legally. Compare tools to choose the right solution for mobile incident investigations.
  • Acquiring Digital Evidence
    • Acquiring digital evidence from mobile devices demands precision and legal understanding. This module covers mobile evidence acquisition techniques, including physical and logical extraction, memory dumps, network traffic capture, and cloud data retrieval. Learn to preserve data integrity, maintain chain of custody, and ensure evidence admissibility in court. Examine practical considerations for extracting artifacts from device memory, SD cards, and over-the-air sources through real-world scenarios. Approach mobile evidence acquisition with technical rigor and legal foresight for defensible, reliable forensic work.
  • Investigating Mobile Apps
    • Mobile applications hold critical evidence for user behavior and malicious activity. This module develops advanced investigation techniques to uncover insights from apps through static analysis (code inspection, file structures) and runtime behavioral analysis. Learn to dissect application data, analyze user interactions, and identify evidence sources across Android and iOS platforms. Evaluate the security posture of mobile platforms by examining app behavior, recognizing vulnerabilities and strengths impacting investigations. Gain skills to extract overlooked forensic value, becoming a sharper digital investigator.
  • Securing Mobile Devices
    • Mobile devices are prime targets for cybercriminals. This module explores the security landscape of smartphones and tablets, providing knowledge to assess and investigate protective mechanisms. Explore core security concepts like authentication, access control, and encryption, and their impact on forensic readiness. Identify and analyze mobile malware, understand infection vectors, and investigate malicious application behaviors. Gain hands-on experience bypassing protections like passcodes and biometrics in lawful forensic contexts. Evaluate mobile device security from defensive and investigative perspectives, ensuring forensic soundness against evolving threats.

Taught by

Matt Bushby

Reviews

4.6 rating at Coursera based on 14 ratings

Start your review of Cyber Security: Mobile Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.