dots bg

Mobile Security

The Mobile Security course aims to equip participants with the expertise and competencies to understand, anticipate and mitigate sophisticated mobile security threats effectively.

Course Instructor Adeptic Creative Labs

₹3000.00

dots bg

Course Overview

At the end of this course, the learner will be able to:


  • Discuss the key components and considerations of mobile security
  • Explain mobile device management solutions, mobile threat defence and mobile application management strategies
  • Discuss privacy and security risks, mitigation strategies and techniques in mobile security
  • Discuss common mobile security threats and vulnerabilities, and mitigation strategies for the same
  • Explain the principle of least privilege, defence-in-depth and secure API strategies in mobile security
  • Summarise strategies, tools, and practices for effective real-time threat detection, incident response, security incident management and secure deployment practices for mobile apps
  • Summarise advanced techniques, tools and methodologies for conducting security testing and validation in mobile app development
  • Explain the key elements of secure architecture design, strong authentication and access control in mobile security
  • Summarise app distribution strategies, best practices for secure communication and data security for mobile applications.
  • Summarise Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework for designing secure mobile applications


This course includes:


  • The Mobile Security course consists of six modules that are available to the learner for self-paced learning.
  • Each module is followed by a Quiz to check the learner’s understanding.
  • The learner can access the Resources section to access reading references and videos for the module.
  • Some modules have Virtual Labs that allow learners to apply concepts in a practical scenario.

Course Curriculum

1 Subject

Mobile Security

12 Learning Materials

01 - Introduction to Mobile Security - Part I

01 - Introduction to Mobile Security - Part I

ZIP

01 - Introduction to Mobile Security - Part II

01 - Introduction to Mobile Security - Part II

ZIP

02 - Privacy and Security Trade-Offs on Mobile Platforms - Part I

02 - Privacy and Security Trade-Offs on Mobile Platforms - Part I

ZIP

02 - Privacy and Security Trade-Offs on Mobile Platforms - Part II

02 - Privacy and Security Trade-Offs on Mobile Platforms - Part I

ZIP

03 - Mobile Security Threats and Protection - Part I

03 - Mobile Security Threats and Protection - Part I

ZIP

03 - Mobile Security Threats and Protection - Part II

03 - Mobile Security Threats and Protection - Part II

ZIP

04 - Principle of Least Privilege in Mobile Security - Part I

04 - Principle of Least Privilege in Mobile Security - Part I

ZIP

04 - Principle of Least Privilege in Mobile Security - Part II

04 - Principle of Least Privilege in Mobile Security - Part II

ZIP

05 - Designing Secure Mobile Applications - Part I

05 - Designing Secure Mobile Applications - Part I

ZIP

05 - Designing Secure Mobile Applications - Part II

05 - Designing Secure Mobile Applications - Part II

ZIP

06 - Securing Mobile Applications and Devices in Enterprises - Part I

06 - Securing Mobile Applications and Devices in Enterprises - Part I

ZIP

06 - Securing Mobile Applications and Devices in Enterprises - Part II

06 - Securing Mobile Applications and Devices in Enterprises - Part II

ZIP