Mobile devices are convenient, portable, inexpensive, powerful and essential to a lot of people. Considering many people have their own smartphones, it makes sense for some businesses to make use of that by allowing employees to use their smartphones to connect to corporate infrastructure for communication functions. This introduces security issues. Smartphones and tablets are not the only areas where wireless technology introduces risk into the enterprise environment, not to mention putting individuals at risk. Bluetooth, 802.11 wireless networks and near field communications all have the potential to be harmful. This course will cover the risks and remediations associated with wireless technology.
Apply mobile security principles to wireless networks, location security and hybrid systems
Examine the unique aspects of ad hoc network topology in order to implement secure MANET routing
Identify the type and characteristics of common security attacks and employ appropriate response and/or defense._
Formulate and implement security policies at an organizational level to meet enterprise security goals
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.