|Course on Mobile Computing Security
THIS COURSE IS CLOSED
The user computing environment has changed considerably over the last decade because of the increased mobility of users. Mobility poses many security-related challenges (anonymous connections, "always on" connections, cleartext network traffic, wireless networks, and so on), many or most of which are typically not adequately addressed, even though effective solutions (technical, procedural and administrative) are widely available. Topics covered in this course include:
- Policies and procedures
- Securing wireless networks
- Securing handheld devices
- Forensics challenges with mobile devices
- Evaluating and auditing security in mobile environments
- Security products
Included in the course is an intensive class exercise in which attendees evaluate a real-life mobile computing policy and propose ways to improve it. The course also presents state-of-the-art forensics procedures and considerations in capturing and preserving evidence from mobile devices.
This course is appropriate for IT security and audit staff and system and network administrators. The subject matter consists of a mixture of technical and non-technical content. A fundamental knowledge of networking and particularly network security is helpful, but is not necessary.
To find out more about our services, please call us at 415.944.2977 or request additional information by emailing email@example.com.