

This course focuses on securing mobile applications by understanding common vulnerabilities, attack vectors, and defensive strategies. Students will learn how mobile apps are exploited and how to identify and mitigate security risks such as insecure data storage, weak authentication, and reverse engineering threats.
The course aligns with industry standards like OWASP Mobile Top 10 and prepares learners for real-world mobile penetration testing and secure app development practices.
Mobile application security fundamentals
Common vulnerabilities in mobile apps
Insecure data storage and communication risks
Authentication and authorization flaws
Cryptography weaknesses in mobile apps
Reverse engineering techniques
Code tampering and client-side risks
OWASP Mobile Top 10 vulnerabilities
Secure mobile app development practices
Want to receive push notifications for all major on-site activities?
Anonymous
3 years agoAnonymous
7 years agoAnonymous
7 years ago