Smartphones are hard to hack: Myth or reality?

Formation inter-entreprise

À qui s'adresse la formation?

  • Private individuals
  • Business owners & self-employed professionals

If you work for a large enterprise and your only smartphone was provided by your employer, then your device may already have some restrictions in place through a MDM solution (not covered in this course). If you have some doubts, the best is to contact your IT department for guidance before signing up for this course.

Niveau atteint

Débutant

Durée

6,00 heure(s)

between 9:00 and 12:00 then between 13:00 and 16:00

Langues(s) de prestation

EN

Prochaine session

Prérequis

Smartphone running at least iOS 16 or Android 11 and its derivatives (EMUI, MIUI, Color OS, OxygenOS)

Objectifs

Since the birth of the iPhone in 2007, the smartphone has become our mobile device of choice, allowing us to be more connected and productive than ever.

With these extremely powerful mini-computers in our pockets, containing private, confidential, and sometimes sensitive data, it has evolved into an increasing target for hackers and governmental agencies alike from all over the globe. And with more than 3.5 billion devices in use, it's easy to understand why smartphone users are likely to be targeted.

Therefore, it is important to understand the major threat vectors as well as how to reduce the risks of our smartphones getting hacked.

At the end of this workshop, you will get:
  • A better appreciation about how vulnerable your smartphone really is
  • Awareness of how your smartphone could get compromised
  • Easy mitigations to quickly reduce the risk of your smartphone getting hacked

Contenu

This course is split into 3 modules:

Module 1: Smartphone Security Risks
  • The 3 components of smartphone security
  • The main motivations of hackers
  • Eight ways hackers make money
  • Three indirect consequences of getting your smartphone compromised
  • Module 1 Quiz
Module 2: Smartphone attack vectors
  • Overview
  • Physical access
  • Close proximity
  • Software & the cloud
  • Seven signs of compromise
  • Module 2 Quiz
Module 3: Smartphone security tips
  • Overview
  • Top 5 smartphone security mistakes
  • Tools & techniques to prevent an attack
  • Module 3 Quiz

Méthodes pédagogiques

A mix of theory, real world examples, interactive discussions and knowledge assessment through quizzes.

To help you take note digitally, you’ll receive a fillable PDF workbook, that you can print if you prefer taking notes manually.

Évaluation

There are quizzes after each module

Certificat, diplôme

A certificate of completion will be sent to the participants.

Mode d'organisation

This course takes place ON-SITE
Terres Rouges building
14, porte de France
L-4360 Esch/Alzette

Ces formations pourraient vous intéresser