The Mobile Security course aims to equip participants with the expertise and competencies to understand, anticipate and mitigate sophisticated mobile security threats effectively.
At the end of this course, the learner will be able to:
Discuss the key components and considerations of mobile security
Explain mobile device management solutions, mobile threat defence and mobile application management strategies
Discuss privacy and security risks, mitigation strategies and techniques in mobile security
Discuss common mobile security threats and vulnerabilities, and mitigation strategies for the same
Explain the principle of least privilege, defence-in-depth and secure API strategies in mobile security
Summarise strategies, tools, and practices for effective real-time threat detection, incident response, security incident management and secure deployment practices for mobile apps
Summarise advanced techniques, tools and methodologies for conducting security testing and validation in mobile app development
Explain the key elements of secure architecture design, strong authentication and access control in mobile security
Summarise app distribution strategies, best practices for secure communication and data security for mobile applications.
Summarise Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework for designing secure mobile applications
This course includes:
The Mobile Security course consists of six modules that are available to the learner for self-paced learning.
Each module is followed by a Quiz to check the learner’s understanding.
The learner can access the Resources section to access reading references and videos for the module.
Some modules have Virtual Labs that allow learners to apply concepts in a practical scenario.
null
Course Curriculum
1 Subject
Mobile Security
12 Learning Materials
01 - Introduction to Mobile Security - Part I
01 - Introduction to Mobile Security - Part I
ZIP
01 - Introduction to Mobile Security - Part II
01 - Introduction to Mobile Security - Part II
ZIP
02 - Privacy and Security Trade-Offs on Mobile Platforms - Part I
02 - Privacy and Security Trade-Offs on Mobile Platforms - Part I
ZIP
02 - Privacy and Security Trade-Offs on Mobile Platforms - Part II
02 - Privacy and Security Trade-Offs on Mobile Platforms - Part I
ZIP
03 - Mobile Security Threats and Protection - Part I
03 - Mobile Security Threats and Protection - Part I
ZIP
03 - Mobile Security Threats and Protection - Part II
03 - Mobile Security Threats and Protection - Part II
ZIP
04 - Principle of Least Privilege in Mobile Security - Part I
04 - Principle of Least Privilege in Mobile Security - Part I
ZIP
04 - Principle of Least Privilege in Mobile Security - Part II
04 - Principle of Least Privilege in Mobile Security - Part II
ZIP
05 - Designing Secure Mobile Applications - Part I
05 - Designing Secure Mobile Applications - Part I
ZIP
05 - Designing Secure Mobile Applications - Part II
05 - Designing Secure Mobile Applications - Part II
ZIP
06 - Securing Mobile Applications and Devices in Enterprises - Part I
06 - Securing Mobile Applications and Devices in Enterprises - Part I
ZIP
06 - Securing Mobile Applications and Devices in Enterprises - Part II
06 - Securing Mobile Applications and Devices in Enterprises - Part II