Mobile_Network_Security

Mobile Network Security (Corporate Only)

(0 customer review) Write Review  Enquire
Course Duration: 40 Hours
Clear selection

Overview  

Mobile phones and tablets have become essential to enterprise and government networks ranging from small organizations to Fortune 500 companies and large agencies. These devices have become critical systems for a wide variety of production applications from enterprise resource planning (ERP) to project management. The use of such devices poses an array of new risks to organizations, including:

  • Distributed sensitive data storage and access mechanisms
  • Lack of consistent patch management and firmware updates
  • High probability of the device being hacked, lost or stolen

 

Mobile Network Security training is designed to help organizations secure their mobile devices by equipping personnel with the knowledge to design, deploy, operate, and assess a well-managed and safe mobile environment.

 

Product Description

  • Capture and evaluate mobile application network activity
  • Decrypt and manipulate Apple iOS application behavior
  • Identify the steps taken by Android malware
  • Reverse-engineer and change Android applications in the Google Play Store
  • Conduct mobile device and mobile application penetration tests

This course can be taken up by freshers and professionals who are looking for buidling up their career in Network Security.

  • Wireless LAN
    • 802.11 (Wi‐Fi)
    • Wireless Standards
  • Wireless Common Vulnerabilities and Threats
    • Eavesdropping
    • Man‐in‐the‐Middle (MITM)
    • Denial of Service (DoS)
  • Security Requirements
  • Wi‐Fi Network Access Control
  • Wi‐Fi Client and Data Security
    • Wired Equivalent Privacy (WEP)
    • Wi‐Fi Protected Access (WPA)
    • Wi‐Fi Protected Access (WPA2)
  • Wired Equivalent Privacy (WEP)
    • Introduction
    • Operation
    • Structure of WEP
    • WEP Encryption Vulnerability
    • WEP Message Authentication Vulnerability
    • Other Vulnerabilities
    • How WEP can be attacked?
  • Wi‐Fi Protected Access (WPA)
    • Introduction
    • How WPA works?
    • Difference between WPA and WPA2
    • How WPA can be attacked?
    • How to defend against WPA attacks?
  • Wi‐Fi Threats
    • Access Control Attack
    • Integrity Attack
    • Confidentiality Attack
    • Availability Attack
    • Authentication Attack
    • Rogue Access Point
    • Client Miss‐association
    • Misconfigured AP
    • Unauthorized Association
    • Ad Hoc Connection Attack
    • Honeypot Access point
    • AP Mac Spoofing
    • DoS Attack
    • Wi-Fi Signal Jamming
  • Wi‐Fi Network Discovery
  • GPS Mapping
  • Wireless Traffic Analysis
  • Bluetooth Network
  • Blue‐smacking
    • Blue‐jacking
    • Blue‐snarfing
    • Blue‐sniffing
    • Bluetooth Stack
    • Common Threats
    • How to defend against Bluetooth attacks?
  • Mobile Telecommunication Security
  • GSM Security Features
    • Subscriber Identity Protection
    • Authentication in GSM
    • Data Confidentiality in GSM
    • GSM Algorithms
  • 3GPP Security Architecture
    • 3GPP Security Services
    • Authentication and Key Agreement (AKA)
    • AKA Message Flow
    • Encryption in 3GPP
  • CDPD Key Agreement and Authentication
    • Cellular Digital Packet Data (CDPD)
    • Mobile Unit Authentication
  • Fraud Management
  • Mobile IP
    • IPSec Based Solution
    • Firewall vs. Mobile IP vs. Packet Filtering
    • MIP vs. Anti‐spoofing
  • Mobile Device Management (MDM)
    • Bring Your Own Device (BYOD)
    • MDM
    • Solutions
  • Mobile Network Security Guidelines

This course can be delivered in live virtual classroom mode, where,  you do not have to travel miles to take up this courses as we bring learning at your fingertips

Cognitel’s easy-to-use interactive online platform provides access to students and professionals to engage in courses, delivered by our experienced subject matter expert, from comforts of their home, office or on mobile devices.

In Live Virtual Classroom training, there is provision of :

    1. One to One Training (Personalized) :

  • The start date can be scheduled depending on the participant’s convenience.
  • Please feel free to reach support@cognitel.com, to schedule your class.
  • 5 classes @ 4 hours per day
  • Training Time:
    • 1900 hours to 2300 hours (Indian Standard Time)
    • 1330 hours to 1730 hours (Greenwich Mean Time)

    2. Group Training  :

  • Contact Support Team at support@cognitel.com for upcoming batch dates.
  • Minimum batch size: 5 (to initiate a batch)
  • 5 classes @ 4 hours per day
  • Training Time:
    • 1900 hours to 2300 hours (Indian Standard Time)
    • 1330 hours to 1730 hours (Greenwich Mean Time)

If you are interested for Live Virtual Classroom Sessions, please email us at:  support@cognitel.com or submit your requirement through the Enquiry Panel.

Reviews

There are no reviews yet.

Be the first to review “Mobile Network Security (Corporate Only)”