If you work for a large enterprise and your only smartphone was provided by your employer, then your device may already have some restrictions in place through a MDM solution (not covered in this course). If you have some doubts, the best is to contact your IT department for guidance before signing up for this course.
4 hours and 15 minutes split into 3 videos
iPhone running at least iOS 15
Since the birth of the iPhone in 2007, the smartphone has become our mobile device of choice, allowing us to be more connected and productive than ever.
With these extremely powerful mini-computers in our pockets, containing private, confidential, and sometimes sensitive data, it has evolved into an increasing target for hackers and governmental agencies alike from all over the globe. And with more than 1 billion iPhones in use, it's easy to understand why smartphone users are likely to be targeted.
Therefore, it is important to understand the major threat vectors as well as how to reduce the risks of our iPhone getting hacked.
This course is split into 3 modules:
In addition to the videos, a fillable workbook in PDF format is offered to facilitate the knowledge acquisition.
No formal evaluation
A certificate of completion will be prepared upon explicit request.
You'll have lifetime access to the replay videos.
If at some point, I decide to move to another platform, I will contact you and give you a way to access them there.
You'll be able to consume this content either from a web browser or the Gumroad mobile application:
No, you'll only be able to stream the videos from the Gumroad web portal or mobile application.
Yes, provided that you have watched the 3 replay videos in their entirety within the first 30 days after the purchase.
Under these conditions, if you feel you didn't get the value you were expecting, then contact me and I'll refund you.