Mobile Computing Security
Offered By: Black Hat via YouTube
Course Description
Overview
Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.
Syllabus
Introduction
In intermittently connected clients
In conference computer centers
Passphrases
Biometrics
ICCs
HR Database
ICC
Hardrick Compromise
Data Theft
RF Interception
Wireless Networking
Im on the inside
Combining useless information
Software tampering
Vectoring
VPNs
PeertoPeer
Better Authentication
Security Awareness
Information Security
Taught by
Black Hat
Related Courses
Information Security Management in a NutshellSAP Learning Enterprise and Infrastructure Security
New York University (NYU) via Coursera Personal Risk Reduction In Insecure Contexts
Politecnico di Milano via Polimi OPEN KNOWLEDGE Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Cyber Security Essentials: Your Role in Protecting the Company
Pluralsight