This course provides essential guidance to mobile system designers and developers on implementing technical controls at the software and device level to facilitate compliance with applicable regulatory requirements.
On successful completion of this course, learners should have the knowledge and skills to:
- Identify threats to mobile devices
- Explain why protecting user privacy and confidentiality is important
- Identify methods for encrypting data at rest and in transit
- Implement application code signing to ensure integrity
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.