Macquarie University

Cyber Security: Mobile Security

Macquarie University

Cyber Security: Mobile Security

Matt Bushby

位教师:Matt Bushby

访问权限由 New York State Department of Labor 提供

1,739 人已注册

深入了解一个主题并学习基础知识。

14 条评论

初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。

14 条评论

初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Analyse mobile OS architecture and identify security vulnerabilities.

  • Use forensics tools to extract and interpret mobile device evidence.

  • Detect mobile malware and apply reverse engineering techniques.

  • Implement best practices to secure mobile apps, data, and networks.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

12 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

本课程是 Cyber Security: Essentials for Forensics 专项课程 专项课程的一部分
在注册此课程时,您还会同时注册此专项课程。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

This module builds foundational knowledge of mobile device architecture, operating systems like iOS and Android, and application ecosystems. Understand how mobile devices store and secure data, including encryption and secure boot processes. You will also learn ethical and legal considerations for handling mobile digital evidence, ensuring compliant investigative activities. This topic provides technical grounding and an ethical lens for managing mobile device security and supporting digital forensics.

涵盖的内容

2个作业9个插件

Mobile operating systems like Android and iOS contain digital evidence. This module teaches you to examine and interpret digital artifacts across major mobile OS file systems. Learn how devices structure, store, and index data, gaining practical experience in reconstructing user activity timelines through forensic analysis. Extract actionable insights from app usage, file access, location data, and system logs for incident response and cyber investigations. By the end, you will confidently conduct forensic analysis on iOS and Android devices, uncovering digital evidence aligned with professional standards.

涵盖的内容

2个作业8个插件

Accessing critical mobile data for forensic purposes requires specific tools. This module provides hands-on experience with mobile forensics tools like Autopsy, Android/iOS Debug Tools, and FTK. Explore the capabilities and limitations of open-source and commercial solutions to extract, decode, and analyze data from various mobile platforms. Focus on investigating proprietary systems and third-party applications to understand where forensic data resides and how to access it legally. Compare tools to choose the right solution for mobile incident investigations.

涵盖的内容

2个作业6个插件

Acquiring digital evidence from mobile devices demands precision and legal understanding. This module covers mobile evidence acquisition techniques, including physical and logical extraction, memory dumps, network traffic capture, and cloud data retrieval. Learn to preserve data integrity, maintain chain of custody, and ensure evidence admissibility in court. Examine practical considerations for extracting artifacts from device memory, SD cards, and over-the-air sources through real-world scenarios. Approach mobile evidence acquisition with technical rigor and legal foresight for defensible, reliable forensic work.

涵盖的内容

2个作业8个插件

Mobile applications hold critical evidence for user behavior and malicious activity. This module develops advanced investigation techniques to uncover insights from apps through static analysis (code inspection, file structures) and runtime behavioral analysis. Learn to dissect application data, analyze user interactions, and identify evidence sources across Android and iOS platforms. Evaluate the security posture of mobile platforms by examining app behavior, recognizing vulnerabilities and strengths impacting investigations. Gain skills to extract overlooked forensic value, becoming a sharper digital investigator.

涵盖的内容

2个作业7个插件

Mobile devices are prime targets for cybercriminals. This module explores the security landscape of smartphones and tablets, providing knowledge to assess and investigate protective mechanisms. Explore core security concepts like authentication, access control, and encryption, and their impact on forensic readiness. Identify and analyze mobile malware, understand infection vectors, and investigate malicious application behaviors. Gain hands-on experience bypassing protections like passcodes and biometrics in lawful forensic contexts. Evaluate mobile device security from defensive and investigative perspectives, ensuring forensic soundness against evolving threats.

涵盖的内容

1篇阅读材料2个作业7个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

授课教师评分
(9个评价)
Matt Bushby
Macquarie University
15 门课程 17,551 名学生

提供方

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Computer Science 浏览更多内容