Since the birth of the iPhone in 2007, the smartphone has become our mobile device of choice, allowing us to be more connected and productive than ever.
With these extremely powerful mini-computers in our pockets, containing private, confidential, and sometimes sensitive data, it has evolved into an increasing target for hackers and governmental agencies alike from all over the globe. And with more than 3.5 billion devices in use, it's easy to understand why smartphone users are likely to be targeted.
Therefore, it is important to understand the major threat vectors as well as how to reduce the risks of our smartphones getting hacked.
What will you learn in this course?
The main objective of this course is for you to know:
The course has been split into three modules.
Who should take this course?