YoVDO

Mobile Computing Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Wireless Networking Courses VPN Courses Security Awareness Courses Biometrics Courses

Course Description

Overview

Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.

Syllabus

Introduction
In intermittently connected clients
In conference computer centers
Passphrases
Biometrics
ICCs
HR Database
ICC
Hardrick Compromise
Data Theft
RF Interception
Wireless Networking
Im on the inside
Combining useless information
Software tampering
Vectoring
VPNs
PeertoPeer
Better Authentication
Security Awareness
Information Security


Taught by

Black Hat

Related Courses

Access Controls
(ISC)² via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Data Privacy Fundamentals
Northeastern University via Coursera
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
iOS Development: Security
LinkedIn Learning