Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Corporate Espionage via Mobile Compromise - A Technical Deep Dive

WEareTROOPERS via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Dive into a technical exploration of corporate espionage through mobile device compromise in this conference talk from TROOPERS13. Examine the reality of corporate espionage, understand the kill chain process, and witness live demonstrations of exploits targeting PowerShell and the Linux Kernel. Gain insights into the methods used by attackers and learn how to protect against these sophisticated threats. Engage with the speaker during the Q&A session to deepen your understanding of mobile security vulnerabilities and defense strategies.

Syllabus

Intro
What is corporate espionage
Is it real
Kill Chain
Demo
Exploits
Demos
PowerShell T
Linux Kernel
Questions

Taught by

WEareTROOPERS

Reviews

Start your review of Corporate Espionage via Mobile Compromise - A Technical Deep Dive

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.