Learn more about the academic programs we are delivering in Summer 2025. If you have any questions about part-time studies, please contact us.
Prerequisites:
This course provides students with concepts of discovering and exploiting flaws in mobile applications on a variety of platforms. Students learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.