BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
Our 4-day, instructor-led training course is designed for cyber security professionals. It will teach you:
- Which risks, threats, and vulnerabilities are associated with wireless networks
- How to implement the security measures that will protect your mobile network from these threats
- To mitigate breaches in mobile security
- The policies and procedures to incorporate for mobile security
- Prerequisites: Before taking this course, you should have some professional experience in the field of cybersecurity
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Objectives
Participants will do the following:
- Tour the mobile risk ecosystem with expert guides to both attack and and defense
- Learn how cellular network attacks compromise devices over-the-air
- See the latest Android and iOS attacks in action, and learn how to stop them
- Delve into mobile malware at the code level to understand how to write resilient apps
- Defend against server-side mobile attacks, including SQL and XML injection
- Discover mobile web attacks, including abuse of custom URL schemes and JavaScript bridges
- Develop stronger mobile authentication routines using oAuth and SAML
- Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips
Course Outline
Mobile Security and Privacy
- Course overview
- Mobile Security Threats
Practitioner’s Approach to Mobile Security
- Mobile security principles
- Application stores
- Identity management problems
- Privacy
- Vulnerabilities
- Threats and risks
- Mitigation
- Mobile security technical controls
- Forensics
- Security resources
End Users and Mobile Security
- The security internetwork
- Proliferation of smartphone breaches
- Organizational internetwork security
- Security for individuals
Older Mobile Device Users
- Survey design
- Situational crime prevention approach
Role of Mobile Devices to Improve Policing System for Efficiency and Effectiveness
- Interactive constable on patrol system
- Capabilities
Supervised Learning-Based Detection of Malware on Android Devices
- Permissions
- Malware landscape
- Machine learning
- Detection and user security
- Implementation
- Evaluation
Identifying Vulnerabilities in Android Applications
- Modeling common vulnerabilities
- Identifying vulnerabilities
- Reviewing findings
Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
- Android overview
- Setting up experiments
- Reviewing findings
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
- Digital Evidence in Shanzhai phone
- Timeline analysis of the digital evidence
RESTful IoT Authentication Protocols
- REST foundations
- RESTful IoT protocols
- Security for RESTful IoT protocols
- REST message authentication
- RESTful IoT message authentication
Privacy Models
- k-Anonymity
- Mechanisms supportive of k-Anonymity
- Differential privacy
- Laplace for differential privacy
Digital Signature Schemes for Mobile Devices
- Overview
- The experiment
FAQs for Mobile Security Training
This course is intended for Network Administrators, Solution Architects, and Administrators responsible for the security of mobile devices throughout an organization.
Although there are no prerequisites, we encourage students to attend with experience in Android, iOS, Blackberry OS, Windows Mobile, and Java Mobile Edition operating systems.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org