×
Phoenix TS

Mobile Security Training

This training teaches students the basics of mobile security on Android and iPhone through case studies, code examples, and best practices.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 4-day, instructor-led training course is designed for cyber security professionals. It will teach you:

  • Which risks, threats, and vulnerabilities are associated with wireless networks
  • How to implement the security measures that will protect your mobile network from these threats
  • To mitigate breaches in mobile security
  • The policies and procedures to incorporate for mobile security
  • Prerequisites: Before taking this course, you should have some professional experience in the field of cybersecurity

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

Participants will do the following:

  • Tour the mobile risk ecosystem with expert guides to both attack and and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URL schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using oAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips

Course Outline

Mobile Security and Privacy

  • Course overview
  • Mobile Security Threats

Practitioner’s Approach to Mobile Security

  • Mobile security principles
  • Application stores
  • Identity management problems
  • Privacy
  • Vulnerabilities
  • Threats and risks
  • Mitigation
  • Mobile security technical controls
  • Forensics
  • Security resources

End Users and Mobile Security

  • The security internetwork
  • Proliferation of smartphone breaches
  • Organizational internetwork security
  • Security for individuals

Older Mobile Device Users

  • Survey design
  • Situational crime prevention approach

Role of Mobile Devices to Improve Policing System for Efficiency and Effectiveness

  • Interactive constable on patrol system
  • Capabilities

Supervised Learning-Based Detection of Malware on Android Devices

  • Permissions
  • Malware landscape
  • Machine learning
  • Detection and user security
  • Implementation
  • Evaluation

Identifying Vulnerabilities in Android Applications

  • Modeling common vulnerabilities
  • Identifying vulnerabilities
  • Reviewing findings

Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps

  • Android overview
  • Setting up experiments
  • Reviewing findings

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone

  • Digital Evidence in Shanzhai phone
  • Timeline analysis of the digital evidence

RESTful IoT Authentication Protocols

  • REST foundations
  • RESTful IoT protocols
  • Security for RESTful IoT protocols
  • REST message authentication
  • RESTful IoT message authentication

Privacy Models

  • k-Anonymity
  • Mechanisms supportive of k-Anonymity
  • Differential privacy
  • Laplace for differential privacy

Digital Signature Schemes for Mobile Devices

  • Overview
  • The experiment

FAQs for Mobile Security Training

Who should attend this training?

This course is intended for Network Administrators, Solution Architects, and Administrators responsible for the security of mobile devices throughout an organization.

What are the prerequisites for this training?

Although there are no prerequisites, we encourage students to attend with experience in Android, iOS, Blackberry OS, Windows Mobile, and Java Mobile Edition operating systems.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)