Finance Certifications Goldman Sachs & Amazon Teams Trust
Get 20% off all career paths from fullstack to AI
Overview
Syllabus
Intro
Who are you, and what are you doing here?
Hacker Fail
Summary
Multitude of Devices
Why do we care?
Security on Mobile
Data at Rest
Data in Motion
Voice
Personnel Security Concerns
Perimeter Security Concerns
Who owns the data
Detection/Mitigation Concerns
Cellular Phone Attack Surface
SmartPhone Attack Surface
Browser
Applications
Flashlight App
Cellular Interception
GSM Interception Under $2000
IMSI Catching
Mobile Intercept: Attack Vectors
Other GSM Attack Vectors
Remote Access Tools
Conclusion
Emerging Threats in Mobile Computing
Taught by
LASCON
Reviews
5.0 rating, based on 1 Class Central review
-
its very interesting and i learned a lot about mobile computing threats attack, i can use all the knowlegde i gained here to my future career