Advanced Mobile Devices Ethical Hacking

Length: 5 days

Audience: Network and system administrators supporting mobile phones and tablets, Pen testers, Ethical hackers, Auditors, Security personnel


The objective of the course is to provide an understanding of the fundamental risks of mobility, as well as those involving Wi-Fi and mobility infrastructure. It presents real world use cases on how devices can be compromised using industry attack tools and engages attendees in solution analysis methodology designed to protect against such vulnerabilities. Participants will learn how to significantly mitigate the risk introduced as a result of mobile devices accessing corporate data, while still preserving a seamless and productive user experience. The class involves participants through a combination of focused mobile protection labs and whiteboard sessions detailing potential solution and mitigation options.

More and more, with not only standard everyday mobile phone users but now with businesses increased reliance on these devices, organizations are quickly recognizing that mobile phones and tablets and other portable devices require greater security controls than a rubberized shock protector and complex password.



Classes

No classes are currently scheduled. If you would like to inquire about setting up a class please contact us with your detials.


Change your future this summer

90% OFF the ENTIRE LIBRARY

Use SUPERSUMMER code
BUY NOW
*Deal available only June 2019 on  Stonger's library bundle of virtual courses. Click button above to view collection.
close-link