In this course, you will learn how to mitigate the risks associated with Insecure Communication which might include threat agents such as an adversary that shares local network (compromised or monitored Wi-Fi); carrier or network devices (routers, cell towers, proxy's, etc); or malware on your mobile device.
On successful completion of this course, learners should have the knowledge and skills to:
- Identify the most common security flaws in mobile apps related to insecure communication
- Understand how an attacker might exploit such vulnerabilities in your software
- Eliminate or mitigate exposure to these common security threats