Advanced Cybersecurity for Mobile Platforms (Canvas net)

Advanced Cybersecurity for Mobile Platforms (Canvas net)
The widespread use of mobile devices in businesses and private environments has changed how we interact with the internet. It has also increased demand for professionals specializing in mobile technologies. This course presents technical knowledge in a clear and intuitive way to help students acquire the skills they need to enter the field of security in mobile environments.

Requirements for taking this course:

Minimum hardware requirements:

- Processor: Intel i3 @ 1.80 GHz and 2 cores minimum

- RAM: 4 GB

- Hard Drive: 15 GB free

- Graphics Adapter: Intel HD Graphics 4000

- Network Adapter: Gigabit Ethernet (10/100/1000baseT) and/or WiFi a/b/g/n/ac


Recommended hardware requirements:

- Processor: Intel i5 @ 2.30 GHz and 2 or 4 cores

- RAM: 16 GB

- Hard Drive: 40 GB free

- Graphics Adapter: Intel HD Graphics 5500

- Network Adapter: Gigabit Ethernet (10/100/1000baseT) and/or WiFi a/b/g/n/ac


Technical requirements from users:

- Mobile technology professionals, developers and/or security.

- Computer skills, operating systems, programming languages and communication networks at intermediate level, ideal for students of engineering / computer science degree, telecommunications or technical training, or graduates and professionals / graduates working or seeking to expand knowledge:

. Specific knowledge in Java.

. Important to be familiar with command line and terminals, managing virtual machines and installation and management of software.

. For more technical aspects of security, although it is not absolutely necessary, some knowledge in scripting languages, Python or frameworks such as metasploit and vulnerability scanning tools.


In this course, students will learn about:

- The internal architecture of mobile devices and how secure applications are developed

- Vulnerabilities of mobile devices, including how to conduct a forensic analysis

- Risk and threat analysis, including examples of recent attacks and their impact

- Countermeasures and necessary mitigation plans