Friday, February 22, 2013

Mobile App and Device Ethical Hacking




Mobile Ethical Hacking ,  Mobile Applications and Device Security Workshop




To secure mobile devices and application, organization need to establish mobile security policies and enforcement rules.


Android Ethical Hacking 

Learn about mobile devices and mobile applications significant threats, and key principles behind mobile network architecture.

iOS Ethical Hacking Training

Assess the vulnerabilities of the main iOS and Android platforms building blocks :


  • Device Hardware
  • Operating System
  • Application Run-time


Through the workshop, the attendees will learn about

  • Mobile security an mobile security strategy
  • Mobile device and application weaknesses, mobile threat models and mobile security policies
  • Mobile Device Management (MDM)
  • Mobile application and mobile device data authentication, encryption, integrity, and threats
  • Open Web Application Security Project (OWASP)  
  • Mobile application  and Mobile device vulnerability assessment
  • Exploit tools and attacks against mobile devices and tablets including iOS, Android, Blackberry and Windows 
  • Mobile Devices and Infrastructure

No comments:

Post a Comment