March 2026
Intermediate to advanced
400 pages
15h 45m
English
Like all network-based devices, mobile devices are subject to attacks that seek to exploit holes, backdoors, or other weaknesses in the software responsible for running the basic functions, the communication protocols, and the applications that reside on the device. Given the combination of varied usage patterns, broad adoption, and complex software, it’s no surprise that mobile devices are attractive targets for hackers and cybercriminals.
Read now
Unlock full access