לימודי הייטק  לוגטל

Languages

  • English
  • עברית

  • About
  • Training
    • Internet of Things
    • Telecom
    • Hardware
    • Artificial Intelligence
    • Computer Tech. Skills
    • Catalog
    • Time table
    • Webinars
  • VILT E-learning
    • VILT Telecom
    • VILT Hardware
  • Consulting
  • Development
    • HW Development
    • Development
  • Worldwide
  • Contact Us
  • Join Us
  • Conferences
    • Upcoming Events
    • Past events
  • Partners
  • Articles
  • Why Logtel for training
  • Lecturers
  • Our classes
  • Customers
  • Choose course category
Choose course category:
  • C/C++
  • INTRODUCTORY SEMINAR
  • DATA SCIENCE & ARTIFICIAL INTELLIGENCE
  • SOFTWARE ENGINEERING
  • LINUX/UNIX
  • SECURITY
  • DOTNET
  • DATABASE
  • JAVA
  • INTERNET
  • OPEN SOURCE
  • REAL TIME AND EMBEDDED
  • SMARTPHONES
  • SOFTWARE TESTING
.

COMPUTER TECH. SKILLS

Smartphone Security

This course can also be delivered as E-Learning
Nº 4406
DATE: CALL DURATION: 2 Days
Register

Course Overview:
Smartphones and tablets enable increasing numbers of employees to work “anywhere, anytime.” The mass adoption of these devices in the enterprise has increased employee productivity but has also exposed the enterprise to new security risks. The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen.
The latest mobile plat¬forms were designed with security in mind— engineers attempted to build security features directly into the operating sys¬tem to limit attacks from the outset. However, these security provisions may not suffice to protect the enterprise assets that regularly find their way onto the de¬vices.
Complicating the security picture is the fact that nearly all mobile devices also operate outside the enterprise—they connect and synchronize out-of-the-box with third-party cloud services and computers whose security status is unknown and outside the enterprise’s control. Thus, a clearly documented and enforceable mobile security policy is critical in reducing the risk of data loss.
This course discusses security risks associated with Smartphones; the operating systems used, including their features and vulnerabilities; and the types of attacks that are made on Smartphones. It also includes a discussion on Smartphone Security Management and approaches to mitigating the risk.

Who should attend:
Anyone interested in learning more about Smartphone security.


Prerequisite:
Basic understanding of the mobile and its working environment.


Course Outline:
1. Introduction

2. Smartphone overview
• Definition of Smartphones
• The Smartphone (mobile) market
• Why should we care about Smartphone mobile security?

3. Smartphone’s OS overview
• Smartphone’s OS overview (Android, Windows Mobile, etc.)
• Vulnerabilities in Smartphone (mobile) OS

4. Attacks on Smartphones
• Mobile Malware
• Information Theft
• Unsolicited Information
• Theft of Service Attacks
• Denial of Service Attacks
5. Smartphone’s OS Security features
• iPhone security features overview
• Android security features overview
• Windows Mobile security features overview

6. Smartphone Security Management

7. Summary
Back to the list of courses
 
Jacques Bensimon,
Interview by the Famous LRTV

Logtel on Facebook


Courses
Smartphone Software Platforms
IoT Communication Networks
BoardDesignExpert (Petah Tikva)
VILT Tips & Tricks For Board Designers
Telecom
Video Integration
Introduction to OpenCL
Cellular Networks: From 2G to 5G
VoIP - Voice Over IP Telephony - Hands-on
Hardware
BoardDesignExpert (Petah Tikva)
Designing with Multi-Gigabit Serial I/O
C-based HLS Coding for Hardware Designers
C-based HLS Coding for Software Designers
CTS
Smartphone Security
iOS Development Course - 5 days
Object Oriented Analysis and Design
Social Networks
  • About
  • Training
  • Consulting
  • Development
  • Articles

Logtel (c) All rights reserved 2010-2011 | Logtel Computer Communications LTD. | Developed by: Hagit Bagno | Designed: NotFromHere