Description
Duration: 1 hour to complete
Audience: Software Developers and Software Architects
Overview: This course will provide participants with the secure programming practices necessary to build secure mobile applications. Finally, we will summarize numerous key mobile security controls that can be used to avert some of the most prevalent attacks facing applications today.
Participants of this module will…
– Review the various types of mobile application architectures
– Understand the mobile application threat model
– Discuss the implications of weak server-side controls
– Highlight the risks of poor authentication and authorization
– Dive into the risks associated with managing sensitive data on mobile devices
– Fundamental security principles that help improve the security of mobile applications