Ethical Hacking: Hacking Mobile Platforms

Pluralsight is not an official partner or accredited training center of EC-Council. Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. You'll learn how to make sure everything stays secure.
Course info
Rating
(79)
Level
Beginner
Updated
Feb 2, 2016
Duration
4h 56m
Table of contents
Description
Course info
Rating
(79)
Level
Beginner
Updated
Feb 2, 2016
Duration
4h 56m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Okay, who here DOESN'T have a mobile device? Hands anyone? Didn't think so. Mobile devices have, at an alarming rate, become extremely popular with users and businesses. So next question, what are you doing about it's security? Anyone? Most folks have approached mobile devices with the attitude of "if it works, syncs, and plays games, I'm good". Overlooking this side of technology will lead you into one day appearing on an online video with the words "FAIL" plastered across your company's logo (or your face!). This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Ethical Hacking: Cryptography
Beginner
2h 28m
Dec 3, 2018
Ethical Hacking: Vulnerability Analysis
Intermediate
3h 14m
Sep 27, 2018
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

MDM: Mobile Device Management, Guidelines, and Tools
So the next logical step in this whole environment is how to manage it. We're going to do that with something called MDM, as well as creating guidelines and using some cool tools. Now speaking from a traditional IT perspective, we'd like to manage our desktops and laptops with some type of device. And when it comes to then adding in all these additional mobile devices, I'm reminded of the quote from the classic non-Oscar winning film, Top Gun, in the famous quote of, "I feel the need. . . "the need for speed", no drug reference there. And the reason why both Maverick and Goose wanted this was not only for the exhilaration, but for aircraft there is two things that helps them as far as combating the enemy, and that one is altitude, and the other is speed. Sometimes going fast and outrunning them, other times slowing way down so that they can turn sharper. And that's kind of the concept here is that we need some way of managing this nightmare. Now in this particular module we'll go through and take a look at MDM in detail, well, not in massive detail because I'm sure there's some other Pluralsight videos out there for vendor-specific MDM solutions, but we'll look at what those are, as well as how to evade MDMs. And we'll also take a look at the attacks themselves that can be done. Now with us introducing in a MDM into our environment, it also becomes a target, so we'll also wanna take a look at how do we protect that device or that solution that's trying to protect us. And then we'll also look at something that helps us to detect jailbreaking or rooting of devices. Then we'll go through and take a look at those wonderful guidelines and tools that are available to us. So strap in, and let's buzz the tower just one time. And if you don't know that reference, then go watch a movie or ask somebody who was alive in the '80's. Here we go.