Cybersecurity Awareness - Mobile Device Security

Hours: 1 / Access Length: 180 Days / Delivery: Online, Self-Paced
Retail Price: $129.00

Course Overview:

Mobile device security is targeted at those who are moderate to heavy users of mobile devices but are unfamiliar with the risks inherent in accepting default, manufacturer and app vendor settings. This course introduces those who use mobile devices as part of their everyday background—whether at work, study, or play—to techniques for protecting those devices from being an attacker’s playground. By shifting security to the foreground, those who attend this course will learn to: Identify vulnerabilities in different mobile devices, apps, communications channels, Harden their devices against common attacks, Configure frequently used apps against misuse by others, Reduce exposure to compromised routers and electronic eavesdropping.

Instructor Biography:

Jennifer promotes responsible technology use (25-plus years) as an educator, certified project manager, and consultant with government, industry, and universities (Ball State, Purdue, Regis). Work in telecommunications includes leading statewide broadband infrastructure and eGovernment initiatives as Indiana’s director of eCommerce, for which she received the Indiana Hi Tech Woman of the Year Award, building and managing infrastructure for Delco Remy International, and co-authoring a 10-year strategy plan for the US Department of the Treasury. Publications include the chapter on data leakage prevention for the ABA’s best-seller, Data Breach and Encryption Handbook, information assurance blogs, and Hacking Wireless Access Points.

Course Outline:

Lesson 1: Uses and Technologies                
  • Mobile device adoption
  • Mobile device adaptations
  • Mobile technology platforms
  • Mobile device apps
  • Mobile device information markets
Lesson 2: Device Exploitation                         
  • Threat landscape trends
  • Physical hacking techniques
  • Logical hacking techniques
Lesson 3: Vulnerability Mitigation                
  • Device hardening techniques
  • Communications & network hardening techniques
  • Policy best practices
Lesson 4: Summary                            
  • Challenges for mobile device security
  • Countermeasures for mobile device vulnerability

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.

Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.

**Outlines are subject to change, as courses and materials are updated.**