×
CyberPhoenix

Mobile Security Training

This training teaches students the basics of mobile security on Android and iPhone through case studies, code examples, and best practices.

Course Overview

Our 4-day, instructor-led training course is designed for cyber security professionals. It will teach you:

  • Which risks, threats, and vulnerabilities are associated with wireless networks
  • How to implement the security measures that will protect your mobile network from these threats
  • To mitigate breaches in mobile security
  • The policies and procedures to incorporate for mobile security
  • Prerequisites: Before taking this course, you should have some professional experience in the field of cybersecurity

Schedule

Mobile Security Training

date
location
price
12/01/21 - 12/03/21 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,725
12/08/21 - 12/10/21 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,725
12/08/21 - 12/10/21 (3 days)

8:30AM - 4:30PM EST

Online
Open
$1,725
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

Participants will do the following:

  • Tour the mobile risk ecosystem with expert guides to both attack and and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URL schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using oAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips

Course Outline

Mobile Security and Privacy

  • Course overview
  • Mobile Security Threats

Practitioner’s Approach to Mobile Security

  • Mobile security principles
  • Application stores
  • Identity management problems
  • Privacy
  • Vulnerabilities
  • Threats and risks
  • Mitigation
  • Mobile security technical controls
  • Forensics
  • Security resources

End Users and Mobile Security

  • The security internetwork
  • Proliferation of smartphone breaches
  • Organizational internetwork security
  • Security for individuals

Older Mobile Device Users

  • Survey design
  • Situational crime prevention approach

Role of Mobile Devices to Improve Policing System for Efficiency and Effectiveness

  • Interactive constable on patrol system
  • Capabilities

Supervised Learning-Based Detection of Malware on Android Devices

  • Permissions
  • Malware landscape
  • Machine learning
  • Detection and user security
  • Implementation
  • Evaluation

Identifying Vulnerabilities in Android Applications

  • Modeling common vulnerabilities
  • Identifying vulnerabilities
  • Reviewing findings

Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps

  • Android overview
  • Setting up experiments
  • Reviewing findings

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone

  • Digital Evidence in Shanzhai phone
  • Timeline analysis of the digital evidence

RESTful IoT Authentication Protocols

  • REST foundations
  • RESTful IoT protocols
  • Security for RESTful IoT protocols
  • REST message authentication
  • RESTful IoT message authentication

Privacy Models

  • k-Anonymity
  • Mechanisms supportive of k-Anonymity
  • Differential privacy
  • Laplace for differential privacy

Digital Signature Schemes for Mobile Devices

  • Overview
  • The experiment

FAQs for Mobile Security Training

Who should attend this training?

This course is intended for Network Administrators, Solution Architects, and Administrators responsible for the security of mobile devices throughout an organization.

What are the prerequisites for this training?

Although there are no prerequisites, we encourage students to attend with experience in Android, iOS, Blackberry OS, Windows Mobile, and Java Mobile Edition operating systems.

Subscribe now

Get new class alerts, promotions, and blog posts