This course covers the fundamentals of mobile security and provides a hands-on experience through the use of live virtual machine labs, lab simulations, and case projects.
Mobile devices continue to grow in importance in managing our personal and business lives. As such, it makes them particularly vulnerable to attacks and how to defend against them. This course is an excellent starting point to understand the different types of mobile devices, understand the risks associated with mobile devices, develop a list of ways to secure mobile devices, learn how to apply mobile device app security, and learn how to implement BYOD security.
This course not only covers the fundamentals of mobile security, but also provides a hands-on experience through the use of live virtual machine labs, lab simulations, and case projects. Hands-on projects will have you create and use QR codes, use software to locate a missing laptop, and install an Android emulator to test different antimalware tools.
- This course can be taken on either a PC or Mac device.
- PC: Windows XP or later.
- Mac: OS X Snow Leopard 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Flash Player. Click here to download the Flash Player.
- Adobe Acrobat Reader. Click here to download the Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Learn to defend mobile devices which a vulnerable to cyber attacks. This course not only covers the fundamentals of mobile security but also provides hands-on experience through the use of live virtual machine labs, lab simulations, and case projects.
- Email capabilities and access to a personal email account.
- Types of Mobile Devices
- Portable Computers
- Wearable Technology
- Legacy Devices
- Mobile Device Removable Storage
- Mobile Device Risks
- Limited Physical Security
- Connecting to Public Networks
- Location Tracking
- Installing Unsecured Applications
- Accessing Untrusted Content
- Bring Your Own Device (BYOD) Risks
- Securing Mobile Devices
- Device Setup
- Device and app Management
- Device Loss or Theft
- Mobile Device App Security
- BYOD Security
- Hands-On Projects
- Case Projects
- Lab Simulations
- Live Virtual Machine Lab
- Final Exam