Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones. More and more users and businesses use smartphones to communicate, but also to plan and organize their users' work and also private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses inherent in smartphones that can come from the communication mode—like Short Message Service (SMS, aka text messaging), Multimedia Messaging Service (MMS), WiFi, Bluetooth and GSM, the de facto global standard for mobile communications. There are also exploits that target software vulnerabilities in the browser or operating system. And some malicious software relies on the weak knowledge of an average user. According to a finding by McAfee in 2008, 11.6% users had heard of someone else being affected by mobile malware, but only 2.1% had personal experience on such problem. However, this number is expected to grow. Security countermeasures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

Mobile security is a concept that has gained a lot of importance ever since the launch of the first mobile OS, Symbian, which was launched by Nokia. It is continuing to gain significance with the massive use of Android OS. This course will take you through the simple and practical approaches to implement mobile security techniques.

Course Curriculum

  • 1

    Mobile Security

    • Mobile Security - Introduction

      FREE PREVIEW
    • Mobile Security - Attack Vectors

    • App Stores & Security Issues

    • Mobile Security - Mobile Spam

    • Mobile Security - Android OS

    • Mobile Security - Android Rooting

    • Mobile Security - Android Rooting

    • Mobile Security - Securing Android Devices

    • Mobile Security - Android Security Tools

    • Mobile Security - Apple iOS

    • Mobile Security - iOS Device Tracking Tools

    • Mobile Security - Windows Phone OS

    • Mobile Security - BlackBerry OS

    • Mobile Security - BlackBerry Devices

    • Mobile Security - MDM Solution

    • SMS Phishing Countermeasures

    • Mobile Security - Mobile Protection Tools

    • Mobile Security - Pen Testing

You may also be interested in...

  • £600.00

    £600.00Certificate in Computer Security

    Buy Now
  • £600.00

    £600.00Certificate in Cyber Security

    Buy Now