• Online, Self-Paced
Course Description
In this course, you will learn how to mitigate the risks associated with extraneous functionality. Typically, an attacker seeks to understand extraneous functionality within a mobile app in order to discover hidden functionality in backend systems. The attacker will typically exploit extraneous functionality directly from their own systems without any involvement by end-users.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Identify Extraneous Functionality
  • Understand how an attacker might exploit this vulnerability in your software
  • Mitigate exposure to this threat

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.