Search for Training

Mobile Security

Course Overview


Mobile Security Training course will explore enterprise mobile security and teach you the mobile security weaknesses and threats. Learn how attackers can utilize mobile devices to abuse and attack organizations. This Course covers various mobile security concerns, technical issues with mobile platforms, remediation strategies, security policies, and solutions on variety of mobile devices, smart devices and platforms including iOS (iPhone and iPad), Android, Blackberry and Windows Phone. Explore the techniques to protect Mobile devices and smartphones since mobile threats are different. Learn how the mobile devices and platforms operate and integrate with IT infrastructure within the enterprise. Understand the role of Mobile device security policy and how it can impact the mobile security. Learn about mobile security and MDM solutions and how to extend protection beyond mobile devices, apps, and data.

Course Content


  • Mobile device overview
  • Mobile device characteristics
  • Weaknesses in mobile phones
  • Overview of mobile networks
  • GSM, CDMA, UTMS/HSPA/HSPA+,LTE, LTE-Advanced and WiFi Network and Security features and architecture
  • High-Level threats and vulnerabilities
  • Physical security controls
  • Exploit tools and attacks against mobile devices
  • Mobile devices and security infrastructures
  • iOS, Android, Blackberry and Windows Phone environment:emulator/sdk/hardware/
  • Basics concepts of reverse engineering mobile applications
  • Exploiting mobile applications
  • Attacking web applications, and web services
  • Decompiling and reversing Apps
  • Fuzzing Android Apps
  • Web App/Web Service Testing
  • Working with SQLite Manager
  • Using (Burp/Charles Proxy)
  • Device encryption support and threats
  • Mobile privacy concerns and threats
  • Guidelines and roadmaps for establishing mobile security policies
  • Analyzing trusted networks and untrusted content
  • Use of location services
  • Use of Applications created by unknown parties
  • Technologies for Mobile Device Management
  • Security Components and Architectures
  • Security for the Enterprise Mobile Device Solution Life Cycle
  • Restrictions on Mobile Devices and Access Levels
  • Penetration testing iOS, Android, Blackberry and Windows Phone
  • Penetrating the mobile applications
  • Policies on how to secure mobile devices
  • Jailbreaking tools and techniques

Customer Reviews


Thanks to Xpertised and the tutor who walked me through all the topics with Practical exposure which is helping me in my current project.
-Waseem

Course was quite helpful in terms of understanding of concepts and practicality. Its really a very friendly environment to learn. The timing were mutually chosen, as we both are working professional. I am quite satisfied with the course.
-Tanmoy

...more
Share:

For Batch Details
Call us at: +91 7259222234

Not sure? Consult Our Experts

What is the sum of 7 + 3? (security question)

Looking for a Training for

Myself

My Team/Organization

I agree to be contacted over mail or phone

or
Call us at: +91 7259222234

Subscribe to our weekly newsletter