SEC571: Mobile Device Security
One constant in the rapidly evolving mobile device market is user demand for access to corporate data. Whether corporate or employee-owned (the bring your own device or BYOD model), mobile device use creates new challenges for organizations that must safeguard sensitive data.
This course is designed to help students gain the skills necessary to implement a secure mobile device deployment. Students will examine the threats and vulnerabilities affecting mobile device deployments, understand legal issues and constraints facing organizations, and develop policies and controls to guide mobile device use. Focusing on Apple iOS, Android, BlackBerry and Windows Phone devices, students will learn about the architectural strengths and weaknesses of each platform, identifying countermeasures and risk mitigation tactics to protect against common threats. Students learn to use a combination of policy, mobile device management (MDM) and network controls to defend against common threats including mobile device malware, stolen devices, wireless attacks and rooted or jailbroken devices. Throughout the course, a combination of lecture, hands-on lab exercises and real-world experience is used to guide students through a tested model for secure mobile device use.
A Sampling of Topics
- Evaluating mobile device management (MDM) solutions
- Wireless LAN design and deployment
- Mitigating the threat of stolen devices
- Legal issues affecting mobile device deployments
- Architectural weaknesses in Apple iOS, Android, BlackBerry and Windows Phone
- Building a lab for testing mobile device controls
- Developing policies for mobile device use
Sun Feb 24th, 2013
9:00 AM - 5:00 PM
Mon Feb 25th, 2013
9:00 AM - 5:00 PM
Mobile Device Security requires a Windows, Linux, or Macintosh computer with the following minimum hardware requirements:
Please install the following software on the computer:
You must have the ability to disable the host firewall (Windows firewall or other third party firewall) and antivirus running on your desktop. This usually means you need to have administrative privilege on the machine.
DO NOT plan on just killing your antivirus service or processes, because most antivirus tools still function even when their associated services and processes have been terminated
If you have additional questions about the laptop specifications, please contact email@example.com.
|Who Should Attend|