Phoenix TS

Mobile Security

This training teaches students the basics of mobile security on Android and iPhone through case studies, code examples, and best practices.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 3-day, instructor-led training course is designed for cyber security professionals. This Mobile Security course will teach students the basics of mobile security and more. Through case studies, code examples, and best practices, this course details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Upon completion of this course, students will be able to implement a systematic approach to security in mobile devices. Course topics will include: 

  • Which risks, threats, and vulnerabilities are associated with wireless networks
  • How to implement the security measures that will protect your mobile network from these threats
  • Breaches in mobile security
  • The policies and procedures to incorporate for mobile security

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

Participants will do the following:

  • Tour the mobile risk ecosystem with expert guides to both attack and and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URL schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using oAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips

FAQs for Mobile Security Training

Who should attend this training?

This course is intended for Network Administrators, Solution Architects, and Administrators responsible for the security of mobile devices throughout an organization.

What are the prerequisites for this training?

Although there are no prerequisites, we encourage students to attend with experience in Android, iOS, Blackberry OS, Windows Mobile, and Java Mobile Edition operating systems.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe to our

Newsletter

Get new class alerts, promotions, and blog posts.

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name