Type to search LearningTree.com

Do you mean "{{response.correctedQuery}}" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.

 

Mobile App Development Training









Preferred method of contact?

Mobile Application and Device Security

COURSE TYPE

Advanced

Course Number

2781

Duration

3 Days

Enroll

About This Course: In this course, you learn best practices for mobile security risk management as well as how to develop and deploy secure mobile applications. You gain the skills to implement an effective mobile device security strategy, identify potential flaws in proprietary and third-party iOS and Android applications and leverage mobile application security and development best practices.

You Will Learn How To

  • Develop secure applications for Android and iOS
  • Leverage OWASP best practices for secure mobile app development
  • Identify and mitigate the most significant threats to mobile apps
  • Protect application data at rest and in motion
  • Implement optimum platform-specific application security configuration
  • Secure encryption keys on Android and iOS devices

Important Course Information

Requirements:

  • Mobile device application development and operation

Recommended Experience:

  • Mobile security knowledge

Software:

  • This course uses Apple computers running Mac OS X. Platform specific hands-on exercises are completed using the iOS simulator and Android emulator

Course Outline

  • Introduction to Mobile Security Management
  • Identifying components of a mobile Operating System (OS)
  • Recognizing application security challenges
  • Exposing the threats faced by mobile devices
  • Discovering mobile hacking tools
  • Developing a Mobile Device Security Strategy

Defining the mobile threat model

  • Balancing usability with security
  • Identifying attack vectors and surfaces
  • Assessing risk and business benefits

Creating a practical security policy

  • Establishing device enrollment procedures
  • Instituting permissions on usage and control
  • Enhancing connectivity control
  • Specifying acceptable use
  • Protecting Mobile Devices

Evaluating vulnerabilities

  • Exploring multiple and diverse device environments
  • Recognizing the risks of mobile applications
  • Defining methods for determining vulnerabilities
  • Uncovering common device configuration errors

Mobile Device Management (MDM)

  • Centralizing device administration
  • Confronting BYOD challenges
  • Fortifying device synchronization
  • Modifying policies to work with each mobile OS
  • Handling lost or stolen devices

Securing the mobile endpoint

  • Designing procedures to secure iPhone, iPad and Android devices
  • Assessing access solutions
  • Safeguarding credentials
  • Enhancing Mobile Data Security

Maintaining data confidentiality and integrity

  • Applying whole disk and file encryption
  • Evaluating hardware encryption techniques

Establishing secure communication

  • Employing VPN/TLS technology properly
  • Assessing thin clients for mobile devices
  • Allowing remote connectivity
  • Integrating Security throughout the Application Development Process

Applying secure development guidelines

  • Leveraging Xcode and Eclipse ADT
  • Implementing secure coding techniques
  • Differentiating between software and programming language vulnerabilities

Employing Open Web Application Security Project (OWASP) resources

  • Revealing the top mobile risks
  • Addressing identified exploits promptly
  • Defeating client-side injection attacks
  • Debugging a running app in an emulator
  • Reverse-engineering apps to identify vulnerabilities

Implementing mobile application security

  • Protecting user interface data
  • Storing data in the Android and iOS Keychain
  • Enforcing user authentication
  • Handling sessions properly
  • Defining trust boundaries

Standardizing permissions

  • Implications of Jail Breaking/Rooting
  • Evaluating platform challenges
  • Promoting a Secure Environment

Creating the assessment plan

  • Performing end-user device testing
  • Manual vs. automated testing

Assessing device vulnerabilities

  • Extracting sensitive data from iOS and Android file systems
  • Analyzing systems for information leaks
  • Determining remediation steps
Show complete outline
Show Less

Course Schedule

Attend this live, instructor-led course In-Class or Online via AnyWare.

Hassle-Free Enrollment: No advance payment required.
Tuition due 30 days after your course.

Feb 15 - 17 Ottawa/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Mar 22 - 24 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Jul 19 - 21 Toronto/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Aug 16 - 18 Ottawa/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Sep 20 - 22 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Guaranteed to Run

Bring this Course to Your Organization and Train Your Entire Team
For more information, call 1-888-843-8733 or click here

Tuition

Standard

$2650

Government

$2355

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your course exam on the last day of your course and receive a Certificate of Achievement with the designation "Awarded with Distinction."

Prev
Next

Questions

Call 1-888-843-8733 or click here »

An experienced training advisor will happily answer any questions you may have and alert you to any tuition savings to
which you or your organization may be entitled.

Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm


FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results.
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)
  • Make progress toward one or more Learning Tree Specialist & Expert Certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

Earn 17 Credits from NASBA

This course qualifies for 17 CPE credits from the National Association of State Boards of Accountancy CPE program. Read more ...

“As a technology professional with several years experience, I am continuously looking for bigger challenges in the field … I consider myself very fortunate to have experienced the quality hands-on training that enabled me to boost my resume.”

- I. de Alwis, Product Manager
Social Development Canada

Prev
Next
s