View programs
This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students are introduced to a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Previous Networking and security knowledges is recommended.
This course is delivered Online Asynchronously. For more information on the delivery methods, click here.
We are currently maintaining a waitlist for this course. If you would like your name added to the waitlist, please contact the Registration Call Centre at 905.721.3000.
Unfortunately, registration is no longer available for this course. Please check the upcoming semester or feel free to browse our website for other courses of interest. You may also click on the link above this course on the course detail page to be notified when a new class is added.
Course Filled to Capacity. Unfortunately, registration is no longer available for this course. Please check the upcoming intakes or feel free to browse our website for other courses of interest.