Mobile Security

Course Description

This series examines the challenges companies face while supporting a bring-your-own-device (BYOD) model. Each episode explores a potential mobile vulnerability and then explores methods to mitigate attacks exploiting that vulnerability. The series uses a hands-on approach actually demonstrating how each compromise works to help better inform systems administrators as to how these compromises occur.

Send a Message.


  • Enroll