National CAE Designated Institution
  • Online, Instructor-Led
Course Description

Mobile devices are convenient, portable, inexpensive, powerful and essential to a lot of people. Considering many people have their own smartphones, it makes sense for some businesses to make use of that by allowing employees to use their smartphones to connect to corporate infrastructure for communication functions. This introduces security issues. Smartphones and tablets are not the only areas where wireless technology introduces risk into the enterprise environment, not to mention putting individuals at risk. Bluetooth, 802.11 wireless networks and near field communications all have the potential to be harmful. This course will cover the risks and remediations associated with wireless technology.

Learning Objectives

  • Apply mobile security principles to wireless networks, location security and hybrid systems
  • Examine the unique aspects of ad hoc network topology in order to implement secure MANET routing
  • Identify the type and characteristics of common security attacks and employ appropriate response and/or defense._
  • Formulate and implement security policies at an organizational level to meet enterprise security goals

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Vulnerability Assessment and Management
  • Cyber Operations
  • Targets

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.