In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
Overview
Syllabus
- Mobile Security Fundamentals
- Mobile Security Basic Architecture
- Mobile Security Defense
- Mobile Offensive (IOS) Part 1
- Mobile Offensive (Android) Part 2
Taught by
Ken Underhill