Macquarie University
Cyber Security: Mobile Security
Macquarie University

Cyber Security: Mobile Security

Matt Bushby

位教师:Matt Bushby

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Analyse mobile OS architecture and identify security vulnerabilities.

  • Use forensics tools to extract and interpret mobile device evidence.

  • Detect mobile malware and apply reverse engineering techniques.

  • Implement best practices to secure mobile apps, data, and networks.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

June 2025

作业

12 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

本课程是 Cyber Security: Essentials for Forensics 专项课程 专项课程的一部分
在注册此课程时,您还会同时注册此专项课程。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

In today’s hyperconnected world, mobile devices are the front lines of personal and organizational digital presence and often the first point of attack. This module lays the critical foundation for understanding the architecture, operating systems, and applications that power mobile ecosystems like iOS and Android. You’ll explore how mobile devices store and secure data, the nuances of their encryption protocols, and how secure boot processes are implemented across platforms. Just as importantly, you’ll develop a clear understanding of the ethical and legal considerations when handling mobile digital evidence, ensuring that all investigative activities adhere to legal frameworks, professional standards, and high ethical conduct. Whether you're investigating a breach, managing mobile device security, or supporting digital forensics in an enterprise environment, this topic gives you the technical grounding and ethical lens to engage confidently and compliantly.

涵盖的内容

2个作业10个插件

Mobile operating systems like Android and iOS leave behind a rich trail of digital evidence, if you know where and how to look. In this topic, you’ll learn how to examine and interpret digital artefacts across the unique file systems of the major mobile OS platforms. You’ll explore how mobile devices structure, store, and index data, and gain practical experience in reconstructing timelines of user activity through forensic analysis. From app usage and file access to location data and system logs, this topic equips you with the skills to extract actionable insights from mobile devices, crucial for incident response and cyber investigations. By the end of this topic, you’ll be able to confidently conduct forensic analysis on iOS and Android devices, uncover digital evidence, and follow a structured process aligned with professional standards.

涵盖的内容

2个作业8个插件

Modern mobile devices store vast amounts of critical data, but accessing that data for forensic purposes requires the right tools and techniques. In this module, you will gain hands-on experience with state-of-the-art mobile forensics tools such as Autopsy, Android/iOS Debug Tools, and FTK. You’ll explore the capabilities and limitations of both open-source and commercial solutions as you learn to extract, decode, and analyse data from various mobile platforms. Special focus will be given to investigating both proprietary systems and third-party applications, helping you understand where forensic data resides and how to access it legally and efficiently. By comparing tools across functionality, reliability, and usability, you’ll be equipped to choose the right tool for the job and provide sound recommendations during mobile incident investigations.

涵盖的内容

2个作业7个插件

Acquiring digital evidence from mobile devices is a critical step in any forensic investigation, one that must be handled with precision, care, and a deep understanding of legal and technical implications. In this topic, you'll explore the full spectrum of mobile evidence acquisition techniques, from physical and logical extraction to memory dumps, network traffic capture, and cloud data retrieval. You’ll learn how to preserve data integrity, maintain chain of custody, and ensure the admissibility of evidence in court. Practical considerations, such as the pros and cons of extracting artefacts from device memory, SD cards, and over-the-air sources, will be examined through real-world scenarios. By the end of this topic, you'll have a clear understanding of how to approach mobile evidence acquisition with both technical rigor and legal foresight, making your forensic work defensible, reliable, and impactful.

涵盖的内容

2个作业8个插件

Mobile applications are treasure troves of data, often housing critical evidence that can illuminate user behaviour, malicious activity, or digital misconduct. In this topic, you’ll develop advanced investigation techniques to uncover and interpret hidden insights from apps through static analysis (code inspection, file structures) and runtime behavioural analysis (real-time activity tracking). You’ll learn how to dissect application data, analyse user interactions, and identify evidence sources across platforms like Android and iOS. By examining app behaviour under different scenarios, you'll also evaluate the security posture of various mobile platforms, recognising vulnerabilities and strengths that may impact an investigation. This topic will equip you with the skills to go beneath the surface of mobile applications and extract forensic value that is often overlooked, making you a sharper and more informed digital investigator.

涵盖的内容

2个作业7个插件

In today’s hyper-connected world, mobile devices are prime targets for cybercriminals. This topic explores the intricate security landscape of smartphones and tablets, equipping you with the knowledge to assess and investigate the protective mechanisms that both defend and obscure critical data. You’ll explore core security concepts such as authentication, access control, and encryption, and how these affect forensic readiness and analysis. Learn to identify and analyse mobile malware, understand infection vectors, and investigate malicious application behaviours. You'll also gain hands-on experience with tools and techniques for bypassing protections like passcodes and biometrics in a lawful forensic context. By the end of this topic, you’ll be able to evaluate mobile device security from both a defensive and investigative perspective, ensuring forensic soundness while navigating the challenges posed by evolving mobile threats.

涵盖的内容

1篇阅读材料2个作业8个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程7,317 名学生

提供方

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题