In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
PowerBI Data Analyst - Create visualizations and dashboards from scratch
40% Off Career-Building Certificates
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Mobile Security Fundamentals
- Mobile Security Basic Architecture
- Mobile Security Defense
- Mobile Offensive (IOS) Part 1
- Mobile Offensive (Android) Part 2
Taught by
Ken Underhill