Mobile devices are convenient, portable, inexpensive, powerful and essential to a lot of people. Considering many people have their own smartphones, it makes sense for some businesses to make use of that by allowing employees to use their smartphones to connect to corporate infrastructure for communication functions. This introduces security issues. Smartphones and tablets are not the only areas where wireless technology introduces risk into the enterprise environment, not to mention putting individuals at risk. Bluetooth, 802.11 wireless networks and near field communications all have the potential to be harmful. This course will cover the risks and remediations associated with wireless technology.
Learning Objectives
- Apply mobile security principles to wireless networks, location security and hybrid systems
- Examine the unique aspects of ad hoc network topology in order to implement secure MANET routing
- Identify the type and characteristics of common security attacks and employ appropriate response and/or defense._
- Formulate and implement security policies at an organizational level to meet enterprise security goals
Framework Connections
Specialty Areas
- Cyber Defense Analysis
- Cyber Defense Infrastructure Support
- Vulnerability Assessment and Management
- Cyber Operations
- Targets
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.