Get a Flight Credit worth up to $350 when you apply with code* by May 6, 2024
Mobile Devices and Communication Security
OVERVIEW
CEA CAPA Partner Institution: Universidad Carlos III de Madrid
Location: Madrid, Spain
Primary Subject Area: Computer Engineering
Instruction in: English
Course Code: 18202
Transcript Source: Partner Institution
Course Details: Level 400
Recommended Semester Credits: 3
Contact Hours: 42
Prerequisites: Cryptography and Computer Security,Computer Networks, Security Engineering
DESCRIPTION
1. Introduction
1.1. Mobile devices. Types and applications
1.2. Architecture and components
1.2.1. Architecture
1.2.2. Sensors
1.2.3. Physical protections
1.3. Security in mobile devices. Overview
1.4. Types of mobile communication networks. Threats
2. Security in mobile operating systems: Android and iOS
2.1. Android security
2.1.1. Structure and evolution
2.1.2. Security model
2.1.3. Permissions
2.1.4. User and packet management
2.1.5. Cryptographic providers and credentials
2.1.6. Communications security
2.2. iOS security
2.2.1. Structure
2.2.2. Protections provided by the Operating System
3. Mobile application security
3.1. Android applications
3.1.1. Structure
3.1.2. Third party components
3.1.3. Application analysis: static and dynamic techniques
3.2. Application markets. Types and features
3.3. Malware in mobile devices. Trends
4. Wireless and mobile communications security
4.1. Wireless security: WEP, WPA, WPA2
4.2 Mobile phone communications security
4.2.1. GSM
4.2.2. GPRS - EDGE
4.2.3. UMTS, LTE
4.2.4. 5G
4.3. Short-range communications security
4.3.1. NFC
4.3.2. Bluetooth
1.1. Mobile devices. Types and applications
1.2. Architecture and components
1.2.1. Architecture
1.2.2. Sensors
1.2.3. Physical protections
1.3. Security in mobile devices. Overview
1.4. Types of mobile communication networks. Threats
2. Security in mobile operating systems: Android and iOS
2.1. Android security
2.1.1. Structure and evolution
2.1.2. Security model
2.1.3. Permissions
2.1.4. User and packet management
2.1.5. Cryptographic providers and credentials
2.1.6. Communications security
2.2. iOS security
2.2.1. Structure
2.2.2. Protections provided by the Operating System
3. Mobile application security
3.1. Android applications
3.1.1. Structure
3.1.2. Third party components
3.1.3. Application analysis: static and dynamic techniques
3.2. Application markets. Types and features
3.3. Malware in mobile devices. Trends
4. Wireless and mobile communications security
4.1. Wireless security: WEP, WPA, WPA2
4.2 Mobile phone communications security
4.2.1. GSM
4.2.2. GPRS - EDGE
4.2.3. UMTS, LTE
4.2.4. 5G
4.3. Short-range communications security
4.3.1. NFC
4.3.2. Bluetooth
Speak with an
Admissions Advisor
Schedule an appointment to speak with a study abroad expert.
Book Appointment
LET'S CHAT