Close
COURSE LIST / KHOÁ HỌC XU HƯỚNG

Mobile Security & BYOD Management

Course Summary:

This technical training focuses on the top mobile hacking techniques for both android and IOS Platform so participants is able to determine the vulnerabilities and possible exploits as well as countermeasures.

Course Duration: 5 days


Course Content:

Description:

This technical training focuses on the top mobile hacking techniques for both android and IOS Platform so participants is able to determine the vulnerabilities and possible exploits as well as countermeasures.

This session is designed to help organizations to secure the implementation of BYOD by arming IT professionals with the required skills from developing policy to mobile hacking and mobility management. This hands-on program will expose participants to the critical knowledge of supporting BYOD infrastructures such as how to design, deploy, administer and secure a well-managed secure mobile environment within an organization.

Topics to be covered:

  • Introduction To BYOD Technology

  • BYOD Policy Development

  • BYOD Best Policies

  • Planning & Implementation of An Effective BYOD

  • Mobile Device Management (MDM)

  • Mobile Application Management (MAM)

  • Mobile Deployment Models

  • BYOD Security

  • Mobile Hacking And Countermeasures

  • Contingency Planning For Disasters

  • Defining The Roles And Responsibilities

  • Privacy And Legal Implications

    Who should attend:

    Penetration Tester, Ethical Hacker, Mobile developer, Information Security personnel, anyone who deals with implementation, testing, securing mobiles phones and tablets.

    Learning outcome:

  • Participants will know how to perform a penetration testing on own deployment and evaluate mobile threats and possible exploits

  • Participants will have valuable insight on BYOD and industry guidelines for implementation and policy setting

  • Participants will understand the information security risks associated with mobile and BYOD

  • Participants will be able to develop and design a secure environment/network for BYOD