Just a few years ago, cellphone security was the last thing on most users’ minds. But today, keeping your data secure on your smartphones is just as critical as securing your desktop and laptop computers.
Some cybersecurity experts would argue that mobile security is even more crucial because smartphone use now outranks desktop use 51 to 44 percent (tablet 4 percent). Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is an increasingly intricate puzzle. According to a report by the Ponemon Institute, the average cost of a corporate data breach is $21,155 per day.
Non work related access is also risky business especially when tasks on mobile devices are carried out on public, unsecured Wi-Fi networks. Unsecured Wi-Fi networks can expose your personal data to attacks leading to identity theft and stolen credit card numbers. Personal banking via your smartphone is especially vulnerable to bad actors.
There’s also the issue of malware, which can gain access to your smartphone via the apps you download from third-parties.
Another cyber ambush, social engineering, is just as nefarious on the mobile front as it is on desktops. A staggering 90 percent of data breaches observed by Verizon’s Enterprise Solutions division are the result of phishing, a kind of digital scam to steal money. While only 7 percent of users fall for phishing attempts, those who do take the plunge tend to be repeat offenders. Verizon estimates that in a typical organization, 15 percent of users who are successfully phished will be phished at least one more time within the same year.
Mobile Security Training
To help you stay current on mobile security matters, Tonex offers a three-day Mobile Security Training course that explores enterprise mobile security with emphasis on mobile security weaknesses and threats.
Participants will learn about:
- Application security and SDLC Fundamentals
- Mobile networks and technologies
- Mobile threat models
- Mobile Device Management (MDM) and BYOD
- Secure Java, C# and Objectives C coding
- iOS and Android SDK, APIs and security features
- Web Service and Network Security
- Data Security and implementing encryption
- Application hardening and reverse engineering
Students will learn to describe fundamental principles of mobile security and the concepts behind mobile network security and behind MDM and BYOD. The course agenda also trains students to:
- Describe fundamental principles of application security
- Describe the security model of iOS devices
- Describe common threats to mobile application security
- Develop moderately complex applications using the iOS SDK
- Describe web services security model and vulnerabilities
- Properly implement SSL/TLS for web communications
- Utilize the security features of the iOS operating system and APIs
- Properly implement secure coding techniques
- Avoid insecure retention of data in memory
- Describe common implementations of cryptography such as PKI
- Leverage encryption for storage and/or communications
- Harden an application against attack to levels appropriate for the risk model of the application
Who Should Attend?
This class is recommended for mobile device manufacturers, application developers, mobile network operators, software companies, special ops, covert ops personnel, FBI, CIA, NSA, DoD offensive security professionals and other professionals from the Intel community.
Why Choose Tonex?
–Presenting highly customized learning solutions is what we do. For over 30 years Tonex has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances that, frankly, can be difficult to comprehend.
–Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score.
–Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops
Contact us for more information, questions, comments.