This course covers the rapidly evolving world of wireless networks, mobile platforms, and IoT devices. You will explore the vulnerabilities inherent in mobile operating systems and applications, learning how to safeguard these critical components. You will dive into wireless network security, learning the tools and techniques used to exploit and defend against unauthorized access. You will gain insights into the security challenges of IoT and operational technology systems, including SCADA and ICS devices. By the end of this course, you will be proficient in protecting sensitive data and ensuring the integrity of digital communications.

Certified Ethical Hacker (CEH): Unit 6
本课程是 Certified Ethical Hacker (CEH) 专项课程 的一部分


位教师:Pearson
访问权限由 Coursera Learning Team 提供
您将学到什么
Master techniques to exploit and secure wireless network vulnerabilities.
Evaluate and protect mobile applications on Android and iOS platforms.
Identify and mitigate security threats in IoT and operational technology systems.
Safeguard critical infrastructure components like SCADA and ICS devices.
您将获得的技能
要了解的详细信息

添加到您的领英档案
3 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有1个模块
In this course, you will explore how to hack mobile platforms, smartphones, and other mobile devices -- all prime targets for cyber criminals and attackers. You will learn about the different vulnerabilities of mobile operating systems, the security implications of mobile apps, and the different attack vectors that threaten these devices. You will learn about techniques used to compromise both IoT devices and operational technology systems, like SCADA devices, ICS systems, and many others.
涵盖的内容
22个视频3个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







