DURATION 4 Half Days

Course Overview

The Smartphone today is vulnerable and open to many potential attacks. In many cases organizations implement the BYOD while employees may download various applications that some of them may include malicious software, malware and viruses. These threats may cause tremendous damage to companies.

On-line Training

This Training is delivered as live on-line training, tacking advantage of the E-Learning Technology:
– Everywhere, every time, from you office/home
– ½ day session: No need to stop your project
– No travel expense & time

Who should attend?

This course is recommended for IT managers

Prerequisite:

Knowledge of IP, SIP and basic networking.

Course Outline:

Session 1

1. Security Threats

  • Security Criterias
  • External and Internal threats
  • Classic Threat Models

2. Security building blocks

  • FW, NAC and SBC
  • IDS and IPS
  • MDM versus Container

Session 2

3. Mobile Device Management (MDM)

  • The concept of MDM
  • Mobile Information Management (MIM)
  • Geolocation concept
  • Mobile Application Behavioral Analysis

4. Encryption methods for mobile clients

  • Public and Private keys
  • Symmetric and Asymmetric encryption keys
  • DES and Triple DES

Session 3

5. Encryption protocols for mobile clients

  • TLS
  • VPN and IPsec
  • Media encryption- SRTP
  • S/MIME

6. Secured Telephony Clients for Mobile devices

  • SIP Client
  • Protection against MIM: Encryption

7. Authentication by secured client

  • HTTP digest authentication
  • Lightweight scheme for authentication
  • Authentication Challenges

 

Session 4

8. Containers for mobile devices

  • The challenges
  • Container concept
  • Protection methods
  • Mails and Messages encryption

9. Session Border Controller (SBC)

  • NAT Traversal and FW penetration
  • Encryption functionality – TLS, SRTP, SDES, ZRTP, DTLS
  • Lawful interception
  • DoS and DDoS immunity
  • Deep Packet Inspection (DPI at all layers)

10. Summary                                                       

  • MLP- Multi-Layered-Protection concept
  • Vendors for Mobile protection
  • Penetration Tests
Close Menu