• Online, Self-Paced
Course Description

In this course, you will learn about best practices for defending your mobile application’s code from attacks.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Describe what kinds of knowledge reverse engineering may reveal to an attacker
  • Identify partial mitigation techniques for reverse engineering
  • Give examples of how attackers might tamper with code to their benefit
  • Identify partial mitigation techniques for code tampering

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.