July 2022
Intermediate to advanced
352 pages
9h 12m
English
This chapter includes questions from the following topics:
• Describe mobile platform attacks
• Identify mobile device management
• Identify mobile platforms vulnerabilities and attack vectors
• Identify IoT security threats and attacks
• List IoT security and hacking tools
• List IoT hacking methodology
I grew up in a time when television had only three channels, the music industry was all up in arms because of the new technology allowing anyone to tape their own music (cassette tapes), and if you needed to talk to someone about something, you had to either meet them face to face or call them on their one and only home phone (and hope they were there). Oh, sure, the ultra-rich had phones ...
Read now
Unlock full access