National CAE Designated Institution
  • Online, Instructor-Led
Course Description

Mobile devices are convenient, portable, inexpensive, powerful and essential to a lot of people. Considering many people have their own smartphones, it makes sense for some businesses to make use of that by allowing employees to use their smartphones to connect to corporate infrastructure for communication functions. This introduces security issues. Smartphones and tablets are not the only areas where wireless technology introduces risk into the enterprise environment, not to mention putting individuals at risk. Bluetooth, 802.11 wireless networks and near field communications all have the potential to be harmful. This course will cover the risks and remediations associated with wireless technology.

Learning Objectives

  • Apply mobile security principles to wireless networks, location security and hybrid systems
  • Examine the unique aspects of ad hoc network topology in order to implement secure MANET routing
  • Identify the type and characteristics of common security attacks and employ appropriate response and/or defense._
  • Formulate and implement security policies at an organizational level to meet enterprise security goals

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Vulnerability Assessment and Management
  • Cyber Operations
  • Targets

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.