In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
Finance Certifications Goldman Sachs & Amazon Teams Trust
Build GenAI Apps from Scratch — UCSB PaCE Certificate Program
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Mobile Security Fundamentals
- Mobile Security Basic Architecture
- Mobile Security Defense
- Mobile Offensive (IOS) Part 1
- Mobile Offensive (Android) Part 2
Taught by
Ken Underhill