Mobile Network Security (Corporate Only)


Mobile phones and tablets have become essential to enterprise and government networks ranging from small organizations to Fortune 500 companies and large agencies. These devices have become critical systems for a wide variety of production applications from enterprise resource planning (ERP) to project management. The use of such devices poses an array of new risks to organizations, including:

  • Distributed sensitive data storage and access mechanisms
  • Lack of consistent patch management and firmware updates
  • High probability of the device being hacked, lost or stolen


Mobile Network Security training is designed to help organizations secure their mobile devices by equipping personnel with the knowledge to design, deploy, operate, and assess a well-managed and safe mobile environment.

Course Objectives

  • Capture and evaluate mobile application network activity
  • Decrypt and manipulate Apple iOS application behavior
  • Identify the steps taken by Android malware
  • Reverse-engineer and change Android applications in the Google Play Store
  • Conduct mobile device and mobile application penetration tests

Eligibility Requirements

This course can be taken up by freshers and professionals who are looking for buidling up their career in Network Security.

  • Wireless LAN
    • 802.11 (Wi‐Fi)
    • Wireless Standards
  • Wireless Common Vulnerabilities and Threats
    • Eavesdropping
    • Man‐in‐the‐Middle (MITM)
    • Denial of Service (DoS)
  • Security Requirements
  • Wi‐Fi Network Access Control
  • Wi‐Fi Client and Data Security
    • Wired Equivalent Privacy (WEP)
    • Wi‐Fi Protected Access (WPA)
    • Wi‐Fi Protected Access (WPA2)
  • Wired Equivalent Privacy (WEP)
    • Introduction
    • Operation
    • Structure of WEP
    • WEP Encryption Vulnerability
    • WEP Message Authentication Vulnerability
    • Other Vulnerabilities
    • How WEP can be attacked?
  • Wi‐Fi Protected Access (WPA)
    • Introduction
    • How WPA works?
    • Difference between WPA and WPA2
    • How WPA can be attacked?
    • How to defend against WPA attacks?
  • Wi‐Fi Threats
    • Access Control Attack
    • Integrity Attack
    • Confidentiality Attack
    • Availability Attack
    • Authentication Attack
    • Rogue Access Point
    • Client Miss‐association
    • Misconfigured AP
    • Unauthorized Association
    • Ad Hoc Connection Attack
    • Honeypot Access point
    • AP Mac Spoofing
    • DoS Attack
    • Wi-Fi Signal Jamming
  • Wi‐Fi Network Discovery
  • GPS Mapping
  • Wireless Traffic Analysis
  • Bluetooth Network
  • Blue‐smacking
    • Blue‐jacking
    • Blue‐snarfing
    • Blue‐sniffing
    • Bluetooth Stack
    • Common Threats
    • How to defend against Bluetooth attacks?
  • Mobile Telecommunication Security
  • GSM Security Features
    • Subscriber Identity Protection
    • Authentication in GSM
    • Data Confidentiality in GSM
    • GSM Algorithms
  • 3GPP Security Architecture
    • 3GPP Security Services
    • Authentication and Key Agreement (AKA)
    • AKA Message Flow
    • Encryption in 3GPP
  • CDPD Key Agreement and Authentication
    • Cellular Digital Packet Data (CDPD)
    • Mobile Unit Authentication
  • Fraud Management
  • Mobile IP
    • IPSec Based Solution
    • Firewall vs. Mobile IP vs. Packet Filtering
    • MIP vs. Anti‐spoofing
  • Mobile Device Management (MDM)
    • Bring Your Own Device (BYOD)
    • MDM
    • Solutions
  • Mobile Network Security Guidelines

Live Virtual Class Info

This course can be delivered in live virtual classroom mode, where,  you do not have to travel miles to take up this courses as we bring learning at your fingertips

Cognitel’s easy-to-use interactive online platform provides access to students and professionals to engage in courses, delivered by our experienced subject matter expert, from comforts of their home, office or on mobile devices.

In Live Virtual Classroom training, there is provision of :

    1. One to One Training (Personalized) :

  • The start date can be scheduled depending on the participant’s convenience.
  • 5 classes @ 4 hours per day
  • Training Time:
    • 1900 hours to 2300 hours (Indian Standard Time)
    • 1330 hours to 1730 hours (Greenwich Mean Time)

    2. Group Training  :

  • Minimum batch size: 5 (to initiate a batch)
  • 5 classes @ 4 hours per day
  • Training Time:
    • 1900 hours to 2300 hours (Indian Standard Time)
    • 1330 hours to 1730 hours (Greenwich Mean Time)



    There are no reviews yet.

    Be the first to review “Mobile Network Security (Corporate Only)”

    Your email address will not be published. Required fields are marked *