Security and privacy on mobile devices

Security and privacy on mobile devices

The module aims at providing the basic knowledge required to understand, analyse and manage security and privacy on mobile devices. To achieve this objective, the module first introduces the key features of mobile operating systems, with a particular focus on Android, and app development processes, before examining the main security and privacy issues in the mobile world, as well as state-of-the-art techniques and how to analyse and resolve them. 

Would you like to attend the course live with the tutor? Download the course timetable and get in touch

Would you like to take the course via e-learning, available 24/7? Register on the platform

Topics

Mobile Ecosystem; Mobile App Security & Privacy; Static and Dynamic Testing Methods for VA/PT; Resilience & Obfuscation; Malware.

Target

Training for employees and professionals

Course structure

Module 1 - MOBILE ECOSYSTEM
6 hours
  • Overview on the mobile ecosystem
  • Analysis of Android and iOS architectures
  • An in-depth look at the Android operating system
  • The Android and iOS app development model
Module 2 - SECURITY& PRIVACY MOBILE APPLICATIONS
6 hours
  • Concepts of risk, vulnerability and attack surfaces
  • Vulnerabilities and attacks on operating systems and apps
  • User and mobile device profiling techniques
  • Attacks on user privacy
Module 3 – STATIC AND DYNAMIC METHODS FOR VA/PT
18 hours
  • Static analysis of Android and iOS applications
  • Dynamic analysis of Android and iOS applications
Module 4 - RESILIENCE AND OBFUSCATION
5 hours
  • Repackaging attacks and anti-repackaging techniques
  • Bytecode and native code obfuscation techniques
Module 5 - MALWARE
module 05 MALWARE  hours
  • Overview of mobile malware
  • Creation and analysis of mobile malware (basics)
WORKSHOP
16 hours
  • Static and dynamic analysis of real Android apps using state-of-the-art methodologies and tools
  • Protecting a genuine app from repackaging by using anti-repackaging and obfuscation techniques
  • Implementing anonymisation techniques in an app

Security and privacy on mobile devices

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…