In this course, you will learn about best practices for defending your mobile application’s code from attacks.
On successful completion of this course, learners should have the knowledge and skills to:
- Describe what kinds of knowledge reverse engineering may reveal to an attacker
- Identify partial mitigation techniques for reverse engineering
- Give examples of how attackers might tamper with code to their benefit
- Identify partial mitigation techniques for code tampering