Certificate Course in Mobile Security
Under the Continuing Education Program of IIIT Delhi
Mobility as a technology will be a disruptive force for the next decade; and enterprise mobility programs will be fundamental for organizations to remain relevant. Mobile security is the core foundation for effective use of mobility as an enabling technology. Attacks on individuals and organizations through mobile devices and apps are intensifying, and are rapidly becoming the preferred vector for stealing personal and corporate data. The vulnerabilities and threats to mobility span across devices, applications, networks, transactions and operations, necessitating a comprehensive mobility security framework to mitigate the associated risks.
Learning Objectives
The ATOM approach
The course will expose participants to a comprehensive perspective of mobile security to enable them to adopt and leverage secure mobility practices.
Awareness
PC and mobile security models
Provenance, sandboxing isolation, permissions and encryption
Employee best practices for mobile devices and apps
Technology
Security features and technologies underlying mobile platforms
End-to-end security issues around mobile devices, platforms apps, networks and server side vulnerabilities
Operations
Mobile security operations including transactions security, mobile IAM, EAS, forensics, EFSS and mobile analytics
Features and usage of various mobile tools
Management
Components of enterprise mobility strategy and program
BYOD and enterprise apps strategy
Mobility governance
Enterprise mobility maturity
Course Syllabus
Module 1
Mobile security model
Mobile devices – threats and vulnerabilities
Overview of platform security features – Android, iOS
Mobile application security
Mobile Containers and DLP
Mobile network security cellular and WiFi networks
Server-side vulnerabilities
Module 2
Mobile authentication
Mobile transactions security
File Synchronization and Sharing
NAC and Exchange ActiveSync
Integrating mobile apps with backend systems
Mobile Analytics benchmark, performance and behavioral
Mobility management tools – MDM, MAM, MCM, TEM, MADP and EMM
Module 3
Strategy for secure enterprise mobility
BYOD, CYOD, COPE, COBO
Implementing an enterprise BYOD program
Enterprise mobile application strategy and Native, Web and Hybrid apps
Enterprise app stores and Public app stores
Mobility Center of Excellence (MCoE)
Analysing enterprise mobility maturity