Introduction:
we will deal with mobile security concepts mostly from the practical point of viewLoss of mobile device is a common issue that can put at risk not only you but even your contacts by possible phishing.Application hacking or breaching. This is the second most important issue. Many of us have downloaded and installed phone applications. Some of them request extra access or privileges such as access to your location, contact, browsing history for marketing purposes, but on the other hand, the site provides access to other contacts too. Other factors of concern are Trojans, viruses, etc.Smartphone theft is a common problem for owners of highly coveted smartphones such as iPhone or Android devices. The danger of corporate data, such as account credentials and access to email falling into the hands of a tech thief is a threat.
Objectives:
§ students will learn important mobile security concepts to build more secure mobile applications.
§ Design and build secure mobile applications on Android and iOS
§ understanding what the risks are to developing insecure mobile applications
§ Understand common mobile application security vulnerabilities
§ how hackers can target the app.
Course Outlines:
§ Attack Vector
§ Anatomy of a Mobile Attack
§ OWASP Mobile Top 10 Risks
§ Mobile Spam
§ Android OS
§ Security measures for Bluetooth devices
§ Android Rooting
§ Securing Android Devices
Who should attend?
§ security professionals
§ IT administrators
Learning Outcomes:
§ students will learn important mobile security concepts to build more secure mobile applications.
§ Design and build secure mobile applications on Android and iOS
§ understanding what the risks are to developing insecure mobile applications
§ Understand common mobile application security vulnerabilities
§ how hackers can target the app.