Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization's data. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.