YoVDO

Mobile Computing Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Wireless Networking Courses VPN Courses Security Awareness Courses Biometrics Courses

Course Description

Overview

Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.

Syllabus

Introduction
In intermittently connected clients
In conference computer centers
Passphrases
Biometrics
ICCs
HR Database
ICC
Hardrick Compromise
Data Theft
RF Interception
Wireless Networking
Im on the inside
Combining useless information
Software tampering
Vectoring
VPNs
PeertoPeer
Better Authentication
Security Awareness
Information Security


Taught by

Black Hat

Related Courses

Understanding Wireless: Technology, Economics, and Policy
University of Notre Dame via edX
Internet of Things & Augmented Reality Emerging Technologies
Yonsei University via Coursera
Wireless Communication Emerging Technologies
Yonsei University via Coursera
Fundamentals Of MIMO Wireless Communication
Indian Institute of Technology, Kharagpur via Swayam
Wireless Ad Hoc and Sensor Networks
Indian Institute of Technology, Kharagpur via Swayam