End to End Mobile Security /

Saved in:
Bibliographic Details
Author / Creator:Minakata, Jeff, VerfasserIn.
Edition:1st edition.
Imprint:[Erscheinungsort nicht ermittelbar] : EC-Council, 2020
Boston, MA : Safari
Description:1 online resource (1 video file, circa 3 hr., 8 min.)
Language:English
Format: E-Resource Streaming Video Video
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13692307
Hidden Bibliographic Details
Other authors / contributors:Safari, an O'Reilly Media Company., MitwirkendeR.
Notes:Online resource; Title from title screen (viewed December 30, 2020).
Summary:The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how to secure our mobile devices and learn best practices. In this course, we will be taking a look at both iOS (Apple) and Android devices in order to learn best practices with our devices. How people can track us by the photos that we take, steps that we can take in securing our phone numbers, using secure communication to keep our conversations private, how to find our device(s) and lock them if they are lost or stolen, and much more. By the end of this course, you will build a better understanding of the attack and defence side in terms of mobile security.