Smartphones now run powerful on-device AI that learns from your behavior—and that means new risk. In this intermediate course, you’ll learn how AI turns phones into active attack surfaces and how adversaries weaponize deepfakes, side-channel inference, and mobile LLM agents. Through short, focused videos and scenario-based discussions, you’ll see exactly how zero-permission sensors and cache traces reveal activity, how overlays and prompt injection hijack agents, and why “permissions” alone don’t ensure privacy. Then you’ll turn knowledge into action: baseline telemetry, write simple detection rules, verify links and intents, quarantine devices, rotate tokens, and draft a one-page SOP. AI-graded labs provide hands-on practice, and a capstone project ties everything together. By the end, you can detect, respond, and harden against AI-driven mobile threats—skills you can apply immediately at home or in an enterprise.
以 199 美元(原价 399 美元)购买一年 Coursera Plus,享受无限增长。立即节省

您将学到什么
Analyze how AI features like sensors, models, and agents make phones attack surfaces and enable deepfake-based scams.
Evaluate technical attack paths—zero-permission inference and multi-layer agent attacks—using real research cases.
Design a mobile-focused detection and response plan with simple rules, containment steps, and key resilience controls.
您将获得的技能
要了解的详细信息

添加到您的领英档案
December 2025
1 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有3个模块
This module sets the mental model for how AI embeds across the phone—keyboards, cameras, sensors, and agents—and why that expands risk. Learners examine deepfake social engineering and zero-permission inference attacks that leak behavior. They connect people/model/GUI/system layers to real incidents. A short intro activity builds intuition before deeper technical work.
涵盖的内容
4个视频2篇阅读材料1次同伴评审
This module examines the mechanics of AI-powered mobile exploits, from zero-permission sensor inference to multi-layer AI agent hijacking. Learners study real research cases, explore how deep learning amplifies attacks, and analyze adversarial examples and AI-enabled malware. The focus is on understanding how technical threats operate in practice, preparing learners for hands-on detection in the next module.
涵盖的内容
3个视频1篇阅读材料1次同伴评审
This module converts theory into practice by focusing on detection signals, response steps, and resilience controls. Learners design telemetry rules, run an incident response simulation, and propose hardening measures such as allow-lists, verified links, and attestation. The goal is to build practical readiness against mobile AI-driven threats.
涵盖的内容
4个视频1篇阅读材料1个作业2次同伴评审
提供方
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,





