• Classroom
  • Online, Instructor-Led
Course Description

This course addresses information security on mobile devices. Topics include information to be protected; risks involved; types of mobile devices; information at rest and in motion; encryption; attack scenario vulnerabilities; and aspects of defense-in-depth controls.

Learning Objectives

  1. Given the fact that companies are facing an increasing use of mobile devices, examine the elements that need to be protected.
  2. Given the fact that companies have a duty to protect assets, assess the risks presented by mobile devices.
  3. Given the need for employees and others to interact effectively with applications and data, inventory the diverse mobile devices that can interact.
  4. Given states of information at rest and in motion, evaluate the interaction of mobile devices and mobile data.
  5. Given the need for encrypting data, explain the fundamentals and implementation of cryptography to protect data in a mobile environment.
  6. Given the need to protect systems from attacks, evaluate the use of layered security to establish defense-in-depth controls.
  7. Given an organization's cybersecurity goals and objectives, set up a mobile security policy.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Training, Education, and Awareness
  • Systems Requirements Planning
  • Systems Analysis
  • Test and Evaluation
  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.