This technical training focuses on the top mobile hacking techniques for both android and IOS Platform so participants is able to determine the vulnerabilities and possible exploits as well as countermeasures. |
Description:
This technical training focuses on the top mobile hacking techniques for both android and IOS Platform so participants is able to determine the vulnerabilities and possible exploits as well as countermeasures.
This session is designed to help organizations to secure the implementation of BYOD by arming IT professionals with the required skills from developing policy to mobile hacking and mobility management. This hands-on program will expose participants to the critical knowledge of supporting BYOD infrastructures such as how to design, deploy, administer and secure a well-managed secure mobile environment within an organization.
Topics to be covered:
Introduction To BYOD Technology
BYOD Policy Development
BYOD Best Policies
Planning & Implementation of An Effective BYOD
Mobile Device Management (MDM)
Mobile Application Management (MAM)
Mobile Deployment Models
BYOD Security
Mobile Hacking And Countermeasures
Contingency Planning For Disasters
Defining The Roles And Responsibilities
Privacy And Legal Implications
Who should attend:
Penetration Tester, Ethical Hacker, Mobile developer, Information Security personnel, anyone who deals with implementation, testing, securing mobiles phones and tablets.
Learning outcome:
Participants will know how to perform a penetration testing on own deployment and evaluate mobile threats and possible exploits
Participants will have valuable insight on BYOD and industry guidelines for implementation and policy setting
Participants will understand the information security risks associated with mobile and BYOD
Participants will be able to develop and design a secure environment/network for BYOD