Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Mobile Security

( Duration: 3 Days )

This Mobile Security training course will explore enterprise mobile security and teach you the mobile security weaknesses and threats. Learn how attackers can utilize mobile devices to abuse and attack organizations. This course covers various mobile security concerns, technical issues with mobile platforms, remediation strategies, security policies, and solutions on variety of mobile devices, smart devices and platforms including iOS (iPhone and iPad), Android, Blackberry and Windows Phone.

Explore the techniques to protect Mobile devices and smartphones since mobile threats are different. Learn how the mobile devices and platforms operate and integrate with IT infrastructure within the enterprise. Understand the role of Mobile device security policy and how it can impact the mobile security. Learn about mobile security and MDM solutions and how to extend protection beyond mobile devices, apps, and data.

This Mobile Security workshop is recommended for mobile device manufacturers, application developers, mobile network operators and Security professionals.

COURSE AGENDA

1

Mobile device overview

2

Mobile device characteristics

3

Weaknesses in mobile phones

4

Overview of mobile networks

5

GSM, CDMA, UTMS/HSPA/HSPA+, LTE, LTE-Advanced and WiFi Network and Security features and architecture

6

High-Level threats and vulnerabilities

7

Physical security controls

8

Exploit tools and attacks against mobile devices

9

Mobile devices and security infrastructures

10

iOS, Android, Blackberry and Windows Phone environment: emulator/sdk/hardware/

11

Basics concepts of reverse engineering mobile applications

12

Exploiting mobile applications

13

Attacking web applications, and web services

14

Decompiling and reversing Apps

15

Fuzzing Android Apps

16

Web App/Web Service Testing

17

Working with SQLite Manager

18

Using (Burp/Charles Proxy)

19

Device encryption support and threats

20

Mobile privacy concerns and threats

21

Guidelines and roadmaps for establishing mobile security policies

22

Analyzing trusted networks and untrusted content

23

Use of location services

24

Use of Applications created by unknown parties

25

Technologies for Mobile Device Management

26

Security Components and Architectures

27

Security for the Enterprise Mobile Device Solution Life Cycle

28

Restrictions on Mobile Devices and Access Levels

29

Penetration testing iOS, Android, Blackberry and Windows Phone

30

Penetrating the mobile applications

31

Policies on how to secure mobile devices

32

Jailbreaking tools and techniques

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X