Certificate Course in Mobile Security

Under the Continuing Education Program of IIIT Delhi

Mobility as a technology will be a disruptive force for the next decade; and enterprise mobility programs will be fundamental for organizations to remain relevant. Mobile security is the core foundation for effective use of mobility as an enabling technology. Attacks on individuals and organizations through mobile devices and apps are intensifying, and are rapidly becoming the preferred vector for stealing personal and corporate data. The vulnerabilities and threats to mobility span across devices, applications, networks, transactions and operations, necessitating a comprehensive mobility security framework to mitigate the associated risks.

Learning Objectives

The ATOM approach

The course will expose participants to a comprehensive perspective of mobile security to enable them to adopt and leverage secure mobility practices.


PC and mobile security models
Provenance, sandboxing isolation, permissions and encryption
Employee best practices for mobile devices and apps


Security features and technologies underlying mobile platforms
End-to-end security issues around mobile devices, platforms apps, networks and server side vulnerabilities


Mobile security operations including transactions security, mobile IAM, EAS, forensics, EFSS and mobile analytics
Features and usage of various mobile tools


Components of enterprise mobility strategy and program
BYOD and enterprise apps strategy
Mobility governance
Enterprise mobility maturity

Course Syllabus

Module 1

Mobile security model
Mobile devices – threats and vulnerabilities
Overview of platform security features – Android, iOS
Mobile application security
Mobile Containers and DLP
Mobile network security cellular and WiFi networks
Server-side vulnerabilities

Module 2

Mobile authentication
Mobile transactions security
File Synchronization and Sharing
NAC and Exchange ActiveSync
Integrating mobile apps with backend systems
Mobile Analytics benchmark, performance and behavioral
Mobility management tools – MDM, MAM, MCM, TEM, MADP and EMM

Module 3

Strategy for secure enterprise mobility
Implementing an enterprise BYOD program
Enterprise mobile application strategy and Native, Web and Hybrid apps
Enterprise app stores and Public app stores
Mobility Center of Excellence (MCoE)
Analysing enterprise mobility maturity