COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with Insecure Data Storage which includes threat agents such as an adversary that has attained a lost/stolen mobile device; malware or another repackaged app acting on the adversary’s behalf that executes on the mobile device.
After completing this course you will be able to:
- Identify the most common security aws in mobile apps related to insecure data storage
- Understand how an attacker might exploit such vulnerabilities in your software
- Eliminate or mitigate exposure to these common security threats
COURSE DETAILS
Course Number: DES 272
Course Duration: 12 minutes
Course CPE Credits: 25
Related Subject Matter
CWE
NICE
NIST
Penetration Testing
Foreign Languages Available:
English
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with Insecure Data Storage which includes threat agents such as an adversary that has attained a lost/stolen mobile device; malware or another repackaged app acting on the adversary’s behalf that executes on the mobile device.
After completing this course you will be able to:
- Identify the most common security aws in mobile apps related to insecure data storage
- Understand how an attacker might exploit such vulnerabilities in your software
- Eliminate or mitigate exposure to these common security threats
COURSE DETAILS
Course Number: DES 272
Course Duration: 12 minutes
Course CPE Credits: 25
Related Subject Matter
CWE
NICE
NIST
Penetration Testing
Foreign Languages Available:
English