The rise of mobile malware is an enormous burden and responsibility for developers and IT staff as they are challenged to implement greater security measures to protect sensitive data.
(August 16, 2016) Stanford, CA - Mobile devices have evolved from novelty to necessity. Smartphones and tablets are ubiquitous both in work and personal life while wearable tech and mobile wallets appear to be growing in popularity. The BYOD (bring your own device) culture is spreading throughout workplaces, and remote working and cloud computing have increasingly become more prevalent. All of this sharing of huge amounts of personal and corporate data via mobile devices places significant and growing risks to companies, employees and individuals. The security threats faced by the traditional computers are advancing onto mobile platforms, and new types of attacks target the add-on functions of mobile devices- including cameras, wearables and location services.
Stanford’s online Mobile Security course for professionals provides an in-depth technical overview of the security features and limitations of modern mobile operating systems, including the top risks and vulnerabilities. Offered through the Stanford Center for Professional Development, this course is taught by Stanford Engineering professors Dan Boneh and John Mitchell as well as Stanford alumnus Neil Daswani, Chief Information Security Officer at LifeLock. Everyone who cares about security at their company can benefit from learning the latest in mobile security from these experts in the field.
“Mobile threats are increasing both in quantity and complexity,” says Professor Boneh. “Companies and individuals must be proactive in mitigating these risks.”
The Mobile Security course covers most mobile application security measures as well as the latest threats to security including data leakage, identifier leakage, third-party tags, and location privacy. Participants will learn what practices can be established to defend against threats in both Android and iOS applications. The online course will explore trends in mobile device management and device requirements will be reviewed in detail.
Developers, project managers, engineers, architects can get up to speed on all the different threats and learn how to create more secure mobile applications. Participants can complete the course at their own pace by viewing approximately 6-8 hours of online lectures, completing the follow up exercises and a final exam.