• Close
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Environments & Modes
      • Reporting
      • Customer Success
      • Get Started
    • Try it | Lab Journey series
    • Try it | Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • About Us
    • Company Overview
    • 20 Years of Innovation
    • Closing the Skills Gap
    • Diversity, Equity & Inclusion
    • Clients
    • Leadership
    • Careers
    • News & Events
    • Contact
  • Let’s Talk
  • Ed TALKS
  • We’re Hiring
  • Blog
  • Course Catalog
Security Innovation
  • Ed TALKS
  • We’re Hiring
  • Blog
  • Course Catalog
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Environments & Modes
      • Reporting
      • Customer Success
      • Get Started
    • Try it | Lab Journey series
    • Try it | Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • About Us
    • Company Overview
    • 20 Years of Innovation
    • Closing the Skills Gap
    • Diversity, Equity & Inclusion
    • Clients
    • Leadership
    • Careers
    • News & Events
    • Contact
  • Let’s Talk

Course Catalog / Subject / OWASP Mobile

OWASP Mobile

This series of courses is aimed to help developers, designers, architects, managers, and organizations identify and mitigate the most common threats to mobile applications and their data. As part of our customer success program, we can help suggest courses that meet multiple compliance mandates and reduce off the bench time. Download our compliance mapping to understand the various compliance mandates our courses map to.


View All Courses     Download Course Catalog

LAB 102 – Identifying Broken Object-Level Authorization Vulnerabilities


5 Minutes
Advanced

DES 271 – OWASP M1: Mitigating Improper Platform Usage


12 Minutes
Advanced

DES 272 – OWASP M2: Mitigating Insecure Data Storage


12 Minutes
Advanced

DES 273 – OWASP M3: Mitigating Insecure Communication


12 Minutes
Advanced

DES 274 – OWASP M4: Mitigating Insecure Authentication


12 Minutes
Advanced

DES 275 – OWASP M5: Mitigating Insufficient Cryptography


12 Minutes
Advanced

DES 277 – OWASP M7: Mitigating Client Code Quality


12 Minutes
Advanced

DES 278 – OWASP M8: Mitigating Code Tampering


12 Minutes
Advanced

DES 279 – OWASP M9: Mitigating Reverse Engineering


12 Minutes
Advanced

DES 280 – OWASP M10: Mitigating Extraneous Functionality


12 Minutes
Advanced

DES 276 – OWASP M6: Mitigating Insecure Authorization


12 Minutes
Advanced

Security Innovation

  • Training
  • Services
  • Solutions
  • Resources
  • About Us
  • Let’s Talk

Offices

Headquarters – Boston, MA
187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598
Sales: 1.877.839.7598 x1
Support: 1.877.839.7598 x2
Email: Support
Email: PR

Pune, India
516 World Trade Center – Tower 2
Kharadi, Pune, MH 411014
Phone: +91 820 840 1411
Email: India Sales

Seattle, WA
1511 3rd Ave #808
Seattle, WA 98101

Copyright © Security Innovation, Inc. All Rights Reserved

Privacy Policy