Mobile phones and tablets have become an increasingly common system in enterprise and government networks, from small organizations to Fortune 10 companies. Often, mobile phone deployments grow organically, adopted by end-users for convenient email access, on up to the CEO for access to sensitive company resources and systems. In other cases, mobile phones and tablets have become critical systems for a wide variety of production applications from ERP to project management.
Whether Apple iPhone or iPad, Windows Phone, Android or BlackBerry phones or tablets, the use of mobile devices introduces new risks to an organization including distributed data storage and access mechanisms, lack of consistent patch management and firmware updates, the high probability of loss or device theft and more. Mobile code and software applications are also introducing new malware and data leakage problems that expose sensitive data or personally identifiable information assets. Topping off these problems is a non-technical issue: there simply are not enough people with the skills to securely deploy and manage mobile phone and tablet deployments today.
This course was designed to help organizations struggling with the problems introduced with mobile phone security. From policy to network architecture and deployment, from mobile code analysis to penetration testing and ethical hacking, this course will help you build the critical skills necessary to support the secure deployment and use of mobile phones and tablets. You'll get hands-on experience in designing a secure mobile phone network for local and remote users, make critical decisions to support devices, analyze and evaluate software threats, and learn how attackers exploit mobile phone weaknesses so you can test the security of your own deployment. With these skills you'll be a valued analyst, able to guide your organization through the challenges and pitfalls of securely deploying mobile devices.
Sign in to add slides, notes or videos to this session