Ultimate Hacking: Mobile

Learn to identify and respond to mobile security threats and mobile device vulnerabilities

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom & Virtual Instructor-Led Training

The use of mobile devices (smartphones, PDAs, and tablets) along with mobile applications increases exponentially every year. As with any other application, hackers are trying to use mobile devices to steal data and compromise business systems. This class provides the knowledge to think like an attacker and assess the security of a mobile application before the attackers have a chance. In a classroom setting, instructors will teach you the necessary skills through demonstrations, labs, and lectures.

What You'll Learn

McAfee Foundstone consultants and instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. Foundstone experts bring their consulting experience of breaking into real enterprise wireless networks and share their methodologies in the classroom.

Key topics are supported by hands-on exercises and labs specifically designed to increase knowledge retention. This course will take you from theoretical knowledge to the all-important ability to “do it,” instead of just talk about it.

Why We Teach This Course

As with any other application, hackers target mobile devices to steal corporate data and compromise business systems. This class provides the knowledge and skills to think like an attacker and assess the security of a mobile application.

Who Teaches this Course

Foundstone consultants and managers, who actively practice network penetration engagements on many of the world’s leading corporate, government, and military networks, bring real-world scenarios to the classroom. Collectively, they have performed hundreds of web and e-commerce security assessments, as well as managed security programs at Big Five consulting firms, the United States Air Force, and on Wall Street. Foundstone instructors authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions,” one of the industry’s most popular and respected computer security guides.

Who Should Take this Course

This course is for system and network administrators, security personnel, auditors, consultants, and web designers concerned with web security. Basic Unix and Windows NT competency is required for this course to be fully beneficial.

Continuing Education Credits

This course qualifies for up to 24 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 21 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.