Video description
The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how to secure our mobile devices and learn best practices.
In this course, we will be taking a look at both iOS (Apple) and Android devices in order to learn best practices with our devices. How people can track us by the photos that we take, steps that we can take in securing our phone numbers, using secure communication to keep our conversations private, how to find our device(s) and lock them if they are lost or stolen, and much more.
By the end of this course, you will build a better understanding of the attack and defence side in terms of mobile security
Table of Contents
Chapter 1: Introduction
Course Overview
Introduction
Disclaimer
Chapter 2: Applications
Application Security
Application Best Practices
Official Download Store vs. Unofficial
Applications for Security
Chapter 3: Mobile Security
VPN’s
Other DNS Alternative
Phone Lock Options
Mobile Password Managers
Chapter 4: Getting Paranoid
How You Can be Tracked with Your Phone?
Geolocation by Photos
Wi-Fi Spoofing
Faraday Bags
Buying a Phone and Service
Chapter 5: Email and Messaging
Encrypted Messengers
Email Phishing
Text Call and Scams
Alternative Encrypted Email
Sudo and Burner
Chapter 6: Lost Device and Disaster Recovery
iCloud and Google Drive Backup
MDM with Miradore
Tracking a Lost Device