Integrating Mobile Devices into Your Penetration Testing Program - DefCamp 2015

Integrating Mobile Devices into Your Penetration Testing Program - DefCamp 2015

DefCamp via YouTube Direct link

Intro

1 of 23

1 of 23

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Integrating Mobile Devices into Your Penetration Testing Program - DefCamp 2015

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Car
  3. 3 Mobile Devices
  4. 4 Carrier Update
  5. 5 Corporate Mobile Devices
  6. 6 There is an app for everything
  7. 7 Social engineering works
  8. 8 QR codes
  9. 9 Detecting mobile malware
  10. 10 Using developer keys
  11. 11 Making malicious applications
  12. 12 What can we do
  13. 13 Phishing
  14. 14 Vulnerability on the Network
  15. 15 The Perimeter
  16. 16 Mobile Security Testing
  17. 17 Mobile Device Management bypasses
  18. 18 The bottom of the barrel
  19. 19 Please get over it
  20. 20 Questions for you
  21. 21 Strong security postures
  22. 22 Twofactor authentication
  23. 23 Getting onto iOS devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.