Mobile Security

Mobile Security
Thumbnail

Description

From smartphones to tablets to watches, users are relying more and more on the convenience of mobile technology. Organizations must meet this growing trend with greater security measures to support critical business functions and protect sensitive data on enterprise devices. Mobile architectures, applications, networks and services must all be developed and managed in compliance with the oversight of a strong IT workforce.

This course provides an in-depth technical overview of the security features and limitations of modern mobile operating systems, including the top risks and vulnerabilities, every IT professional needs to know.

What you will learn

  • Mobile application security measures
  • Models to develop and secure Android applications
  • Security detection and measures in iOS
  • Trends in mobile device management (MDM)

Exclusive Interviews

  • Himanshu Dwivedi, Chief Executive Officer, Data Theorem
  • Mukul Khullar, Staff Information Security Engineer, LinkedIn

Prerequisites

We recommend that you have the equivalent of a BS in computer science, or a background in cybersecurity.

If you are less familiar with the content, we recommend starting with the course Foundations of Information Security. It provides the fundamentals necessary for subsequent courses in the program.

Time Commitment

This course is approximately 6 hours of video content with 1.5 hours of coursework.

Tuition

The All-Access Plan—a full year to view and complete course materials, video lectures, assignments and exams, at your own pace. Revisit course materials or jump ahead... all content remains at your fingertips year-round.

$2,970 for one-year access to all 8 online courses in the Advanced Cybersecurity Program

Individual Courses—60 days to view and complete course materials, video lectures, assignments and exams, at your own pace.

$495 per online course

Continuing Education Units

By completing this course, you’ll earn 1 Continuing Education Unit (CEU). CEUs cannot be applied toward any Stanford degree. CEU transferability is subject to the receiving institution’s policies.

CPEs: By completing the course, you can qualify for Group A or Group B Continuing Professional Education (CPE) credits to maintain your (ISC)² certifications, such as the CISSP. Final approval of CPEs is subject to (ISC)².

Record of Completion

When you complete each course, you’ll receive an email with a link to download your Record of Completion. This email will be sent to the address you provide in your mystanfordconnection within 3 business days of course completion.

Questions

[email protected]


Course Archived