Shopping Cart  [0]

xx-Mobile Security: In-Depth Theory and Hands-On Hacking

Mobile Security: In-Depth Theory & Hands-On Hacking
Virtual Training


This Exclusive Online Course Starts January 28th!
Register online to reserve your spot.


Course Description

This 4-day virtual, live online course (taught by Georgia Weidman) delivers an introduction to securing mobile devices followed by a more hands-on session of mobile device/app security and penetration testing. Students will receive practical exercises and hands-on labs with virtual instances of popular mobile OSs, real vulnerabilities and working exploits.

In addition to being presented in a virtual classroom, courseware materials are made available with a downloadable, custom Linux distro with all of the virtual machines needed to recreate your own mobile hacking lab.

This course combines the 2-day In-Depth Theory and 2-day Hands-On Hacking courses into one program delivered at a discounted rate.

The Importance of Mobile Security

Smartphones and tablets have become essential to enterprise and government networks. In addition to providing convenient email access, these mobile devices have become critical systems for a wide variety of production applications.

With increased reliance on these devices, greater security implementations are a must. This course was designed to provide hands-on experience in designing a secure mobile phone network so that students are able to successfully support the secure deployment and use of mobile devices in their organizations.

Training Information

Online Course Dates:

Resources


Save 40%

When you sign up for both Mobile Security Online Courses (Theory and Hands-On Hacking).


Get to Know the Instructor

This course is taught by Georgia Weidman, a penetration tester, security researcher, and expert trainer. She holds a Master of Science degree in computer science, secure software engineering, and information security as well as CISSP, CEH, NIST 4011, and OSCP certifications.

Her work in the field of smartphone exploitation has been featured in print and on television internationally. She has presented her research at conferences around the world including Shmoocon, Hacker Halted, Security Zone, and Bsides. Georgia has delivered highly technical security training for conferences, schools, and corporate clients to excellent reviews.

Building on her experience, Georgia recently founded Bulb Security LLC, a security consulting firm specializing in security assessments/penetration testing, security training, and research/development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security. She is the creator of the Smartphone Pentest Framework, a tool to assess the security posture of mobile platforms in corporate environments.

Prerequisites

There are no prerequisites for this course.

Mobile Security: In-Depth Theory & Hands-On Hacking Features

  • Accelerated Learning - With over 11 years of education experience, we focus on the requirements that you need to be successful in your career.
  • Flexible, Affordable, Easy-to-Use - This virtual course delivers quality, superior instruction with unmatched simplicity enabling access to state of the art training without the hassle. With the virtual classroom learning experience you get HD video interaction with the instructor.

Curriculum Overview

Threats to Mobile Devices

  • Remote attacks
  • Client-Side attacks
  • Jailbreaking
  • Social engineering
  • Malicious SMS
  • Apps
  • Mobile modem security
  • Local privilege escalation issues
  • Updates

Overview of Security Architectures (with Android and iPhone)

  • Application sandboxing
  • Play/App Store
  • Application permission model
  • Bouncer
  • Security-related Android Linux kernel changes
  • Additional security measures introduced in later versions (whole disk encryption, ASLR, DEP, etc.)
  • Developer Standards
  • Code signing requirements

Mobile Devices in the Workplace

  • Bring Your Own Device
  • MDM solutions
  • On device restricting apps
  • User awareness training for smartphone security

Developing Secure Mobile Apps

  • Smartphone development basics
  • Storing data securely
  • Avoiding permission leak
  • Interacting with other apps and the OS safely

Penetration Testing Mobile Apps

  • Examples of apps with security vulnerabilities
  • Live analysis of apps
  • Disassembling mobile apps

Past Issues with Common Platforms

  • Known vulnerabilities in Android versions
  • Known vulnerabilities in iPhone versions
  • Analysis of available exploit code

Mobile Malware

  • Malicious app samples
  • Code analysis
  • Live analysis of samples
  • Malicious jailbreaks
  • Smartphone botnets

Penetration Testing Specific Platforms

  • Common issues
  • Remote issues
  • Client-side attacks
  • Social engineering campaigns
  • Post exploitation: privilege escalation, information gathering, and remote control
  • Using the Smartphone Pentesting Framework (SPF)

Is this Mobile Security Course Right for You?

If you plan to build a career in securing mobile devices, and are looking for the hands-on experience to take your knowledge and skills to the next level, then this is the course for you.