This course addresses information security on mobile devices. Topics include information to be protected; risks involved; types of mobile devices; information at rest and in motion; encryption; attack scenario vulnerabilities; and aspects of defense-in-depth controls.
Learning Objectives
- Given the fact that companies are facing an increasing use of mobile devices, examine the elements that need to be protected.
- Given the fact that companies have a duty to protect assets, assess the risks presented by mobile devices.
- Given the need for employees and others to interact effectively with applications and data, inventory the diverse mobile devices that can interact.
- Given states of information at rest and in motion, evaluate the interaction of mobile devices and mobile data.
- Given the need for encrypting data, explain the fundamentals and implementation of cryptography to protect data in a mobile environment.
- Given the need to protect systems from attacks, evaluate the use of layered security to establish defense-in-depth controls.
- Given an organization's cybersecurity goals and objectives, set up a mobile security policy.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Training, Education, and Awareness
- Systems Requirements Planning
- Systems Analysis
- Test and Evaluation
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.