Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Mobile Application and Device Security

( Duration: 3 Days )

In Mobile Application and Device Security training course, you will learn best practices for mobile security risk management as well as how to develop and deploy secure mobile applications. You will gain the skills to implement an effective mobile device security strategy, identify potential flaws in proprietary and third-party iOS and Android applications and leverage mobile application security and development best practices.

By attending Mobile Application and Device Security workshop, delegates will learn to:

  • Develop secure applications for Android and iOS
  • Leverage OWASP best practices for secure mobile app development
  • Identify and mitigate the most significant threats to mobile apps
  • Protect application data at rest and in motion
  • Implement optimum platform-specific application security configuration
  • Secure encryption keys on Android and iOS devices

COURSE AGENDA

1

Introduction to Mobile Security Management

  • Identifying components of a mobile Operating System (OS)
  • Recognizing application security challenges
  • Exposing the threats faced by mobile devices
  • Discovering mobile hacking tools
2

Defining the mobile threat model

  • Balancing usability with security
  • Identifying attack vectors and surfaces
  • Assessing risk and business benefits
3

Creating a practical security policy

  • Establishing device enrollment procedures
  • Instituting permissions on usage and control
  • Enhancing connectivity control
  • Specifying acceptable use
4

Evaluating vulnerabilities

  • Exploring multiple and diverse device environments
  • Recognizing the risks of mobile applications
  • Defining methods for determining vulnerabilities
  • Uncovering common device configuration errors
5

Mobile Device Management (MDM)

  • Centralizing device administration
  • Confronting BYOD challenges
  • Fortifying device synchronization
  • Modifying policies to work with each mobile OS
  • Handling lost or stolen devices
6

Securing the mobile endpoint

  • Designing procedures to secure iPhone, iPad and Android devices
  • Assessing access solutions
  • Safeguarding credentials
7

Maintaining data confidentiality and integrity

  • Applying whole disk and file encryption
  • Evaluating hardware encryption techniques
8

Establishing secure communication

  • Employing VPN/TLS technology properly
  • Assessing thin clients for mobile devices
  • Allowing remote connectivity
9

Applying secure development guidelines

  • Leveraging Xcode and Eclipse ADT
  • Implementing secure coding techniques
  • Differentiating between software and programming language vulnerabilities
10

Employing Open Web Application Security Project (OWASP) resources

  • Revealing the top mobile risks
  • Addressing identified exploits promptly
  • Defeating client-side injection attacks
  • Debugging a running app in an emulator
  • Reverse-engineering apps to identify vulnerabilities
11

Implementing mobile application security

  • Protecting user interface data
  • Storing data in the Android and iOS Keychain
  • Enforcing user authentication
  • Handling sessions properly
  • Defining trust boundaries
12

Standardizing permissions

  • Implications of Jail Breaking/Rooting
  • Evaluating platform challenges
13

Creating the assessment plan

  • Performing end-user device testing
  • Manual vs. automated testing
14

Assessing device vulnerabilities

  • Extracting sensitive data from iOS and Android file systems
  • Analyzing systems for information leaks
  • Determining remediation steps

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X