Use a smartphone or tablet? Learn simple, valuable techniques to protect your mobile device from attackers.
- [Jennifer] Hello, and welcome to Mobile Device Security, part of our Cybersecurity Awareness series. My name is Jennifer Kurtz. I am a business consultant and also lead graduate courses in cybersecurity at Regis University in Denver, Colorado. Writing my book on hacking wireless access points for Elsevier Publishing prompted a year of research into all aspects of wireless communications, including the obvious area of mobile devices. In this brief course on mobile device security, we will talk about various categories of devices, mobile phones, tablets, laptops, wearable devices, and appliances like digital cameras, baby monitors, insulin infusion pumps, and how they can be protected from compromise.
Many will be familiar to you. In these lessons, we will discuss the following topics, history of radio spectrum technology in international protocol agreements, trends in mobile device adoption, mobile device adaptations, mobile technology platforms, such as networks and hardware, mobile device applications, or apps, and market conditions for selling extracted or compromised mobile device information. Most importantly, we'll discuss how to make your mobile devices more secure.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- Mobile technology platforms
- Mobile device apps
- Physical and logical hacking techniques
- Device hardening
- Communications hardening