Cybersecurity Awareness - Mobile Device Security

Hours: 1 / Access Length: 180 Days / Delivery: Online, Self-Paced
Retail Price: $129.00

Course Overview:

Mobile device security is targeted at those who are moderate to heavy users of mobile devices but are unfamiliar with the risks inherent in accepting default, manufacturer and app vendor settings. This course introduces those who use mobile devices as part of their everyday background—whether at work, study, or play—to techniques for protecting those devices from being an attacker’s playground. By shifting security to the foreground, those who attend this course will learn to: Identify vulnerabilities in different mobile devices, apps, communications channels, Harden their devices against common attacks, Configure frequently used apps against misuse by others, Reduce exposure to compromised routers and electronic eavesdropping.

Instructor Biography:

Jennifer promotes responsible technology use (25-plus years) as an educator, certified project manager, and consultant with government, industry, and universities (Ball State, Purdue, Regis). Work in telecommunications includes leading statewide broadband infrastructure and eGovernment initiatives as Indiana’s director of eCommerce, for which she received the Indiana Hi Tech Woman of the Year Award, building and managing infrastructure for Delco Remy International, and co-authoring a 10-year strategy plan for the US Department of the Treasury. Publications include the chapter on data leakage prevention for the ABA’s best-seller, Data Breach and Encryption Handbook, information assurance blogs, and Hacking Wireless Access Points.

Course Outline:

Lesson 1: Uses and Technologies                
  • Mobile device adoption
  • Mobile device adaptations
  • Mobile technology platforms
  • Mobile device apps
  • Mobile device information markets
Lesson 2: Device Exploitation                         
  • Threat landscape trends
  • Physical hacking techniques
  • Logical hacking techniques
Lesson 3: Vulnerability Mitigation                
  • Device hardening techniques
  • Communications & network hardening techniques
  • Policy best practices
Lesson 4: Summary                            
  • Challenges for mobile device security
  • Countermeasures for mobile device vulnerability

System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.