Requirements for taking this course:
Minimum hardware requirements:
- Processor: Intel i3 @ 1.80 GHz and 2 cores minimum
- RAM: 4 GB
- Hard Drive: 15 GB free
- Graphics Adapter: Intel HD Graphics 4000
- Network Adapter: Gigabit Ethernet (10/100/1000baseT) and/or WiFi a/b/g/n/ac
Recommended hardware requirements:
- Processor: Intel i5 @ 2.30 GHz and 2 or 4 cores
- RAM: 16 GB
- Hard Drive: 40 GB free
- Graphics Adapter: Intel HD Graphics 5500
- Network Adapter: Gigabit Ethernet (10/100/1000baseT) and/or WiFi a/b/g/n/ac
Technical requirements from users:
- Mobile technology professionals, developers and/or security.
- Computer skills, operating systems, programming languages and communication networks at intermediate level, ideal for students of engineering / computer science degree, telecommunications or technical training, or graduates and professionals / graduates working or seeking to expand knowledge:
. Specific knowledge in Java.
. Important to be familiar with command line and terminals, managing virtual machines and installation and management of software.
. For more technical aspects of security, although it is not absolutely necessary, some knowledge in scripting languages, Python or frameworks such as metasploit and vulnerability scanning tools.
In this course, students will learn about:
- The internal architecture of mobile devices and how secure applications are developed
- Vulnerabilities of mobile devices, including how to conduct a forensic analysis
- Risk and threat analysis, including examples of recent attacks and their impact
- Countermeasures and necessary mitigation plans