| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Mobile devices are now used for risky activities such as purchases, social media, and emails. This topic provide practical instructions and hands-on exercises on the unique sets of evidence available on Smartphones, cellphone SMS exploits, intrusion, rooting, malware, and other application vulnerabilities. This will also cover the anatomy aspects of extracting and evaluating data from all types and technology of Smartphones. Bio: Charline Nixon is currently an IT Faculty at Calhoun Community College where she is responsible for teaching mobile/computer forensics, penetration testing, and ethical hacking courses. Her previous positions include, IT School Chair and IT Faculty Lead Instructor. She holds 2 PhD?s in Education and Management and 2 Masters in Business and Cyber Security, Graduate Certificate in Information Assurance, Six Sigma Black Belt. Charline has previously spoken at BSides Memphis, Skydog, Hackerhalted, Takedowncon, Women International Summit, and is one of the organizer of BSides Philippines, a co-organizers of BSides Huntsville. In addition she holds several IT certifications, including CEH, CHFI, ECSA, Smart-CTF, MCT, MCP,CASP (+10 others).
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast