Mobile Device Security

Mobile computing has become very popular in the last few years due to its convenience, cost effectiveness and ease of use. Keep in mind that they are a fully functioning computers in the palm of your hand or on your wrist. However they share the same vulnerabilities and risks as desktop and laptop computers.

The bad actors love hacking these devices especially smart phones. Mobile devices are abundant with information such as geolocation tracking, contacts, etc. But there’s more! There’s money to be made in them there devices by hijacking them silently in the background for cryptomining, silent ad clicks, etc.. This course will show you how to prevent from being hacked and tracked.

Topics Covered

How mobile devices are compromised

Good practices to help keep your device safe

Security settings for Android

Security settings for Apple iOS