Securing Mobile Devices in the Enterprise: Mobile Security Threats
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Mobile security threats are among the most serious threats to the enterprise, as mobile attacks are often a gateway to a wider attack on connected resources. The Open Web Application Security Project tracks the top 10 security concerns for mobile devices and applications, and this course uses those risks as a basis for discussing mobile security. In this course, you will learn about some best practices for securely handling mobile devices.
Target Audience
Enterprise network engineers and managers; network security engineers and managers; anyone tasked with providing secure access to company resources from mobile devices
Prerequisites
None
Expected Duration (hours)
2.0
Lesson Objectives Securing Mobile Devices in the Enterprise: Mobile Security Threats
|INS start the course |/INS
describe current mobile devices and form factors
describe the current state of mobile device security
describe mobile security considerations
describe the process to determine risk in a mobile environment
describe sensitive mobile assets
describe sensitive usage scenarios for mobile devices
describe how mobile data is stored and transported
list the OWASP top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systems
describe how insecure data storage affects mobile device front-end and back-end systems
describe how insufficient transport layer protection affects mobile device front-end and back-end systems
describe how unintended data leakage affects mobile device front-end and back-end systems
describe how poor authorization and authentication affects mobile device front-end and back-end systems
describe how broken cryptography affects mobile device front-end and back-end systems
describe how client-side injection affects mobile device front-end systems
describe how security decisions via untrusted inputs affect mobile device back-end systems
describe how improper session handling affects mobile device front-end systems
describe how lack of binary protections affects mobile device front-end systems
describe the potential technical impacts of mobile exploits
describe the potential business impacts of mobile exploits
describe requirements for secure device data handling
describe requirements for secure device authorization and authentication
describe requirements for secure device sensors, jailbreaking, and mobile device management systems
describe requirements for secure device connectivity and apps
describe requirements for users of secure devices
assess threats from OWASP top 10 and their impact on mobile systems
Course Number: sp_emds_a01_it_enus
Expertise Level
Intermediate