top of page
Use Code GOLD2025 for 30% Off Member Gold
Mobile Hacking
With the proliferation of mobile devices, mobile hacking and security may be the most critical element to your company's information security plan. This course examines the many ways that mobile devices can be hacked and what we can do to secure them.​​​
This course and related courses can be found on our Online Training Platform
Outline
​​
1. The Mobile Risk Ecosystem
​​
2. Hacking the Cellular Network
​
3. IOS
​
4. Android
​
5. Mobile Malware
​
6. Bluetooth Hacking
​
7. Hacking a Simulated Android Device
​
8. Fento-Cells
​
8. Near Field Communication (NFC)
​
9. Stingrays for Eavesdropping on Cellular Communication
​
10. Securing Our Mobile Devices​​
bottom of page