This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought challenges and exercises as a framework, students will learn about:
- The purpose of Enterprise Mobile Management platforms
- Elements that make mobile networks and operating systems different
- Mobile malware classifications and detection strategies
- Mobile architecture data leakage detection and prevention strategies.