iPhone iPad Security is a course that provides an in depth into iPad and iPhone security: how to explore and address vulnerabilities throughout the iPhone networks (AT&T, Verizon and Sprint) and the device. Security professionals learn about network infrastructure, how to determine vulnerabilities, device forensics, application testing, and device auditing. Technical topics covered include, specific hacker attacks, data transmission models, iOS5.x directory structures, application code decompiling, and data protection.
After completing iPhone iPad Security, students will be equipped with a basic understanding of the following:
- Knowledgeable in in HSPA, LTE, EV-DO, CDMA, and WiFi data transmissions.
- Create solid mobile data policies and procedures and prioritize missing polices that lead to vulnerabilities.
- Execute and quantify penetration testing on an iPhone using the emulator.
- Understand data harvesting techniques, and worms.
- iOS exploit prevention – Identify potential security deficiencies in network transmission models, and devices operating system and application software.
- Execute device forensics and understand where sensitive data is stored and accessed on the iPhone.
- Review third party software and apps that can comprise security and other software that enhances security.
A strong understanding of structured programming and data networking, including knowledge of security protocols.
Students will be assigned 5 homework assignments, and 1 final exam.
Policies and procedures, Securing the Wireless Network/ Vulnerabilities of the wireless network (part 1). Common policies and the impact to security; Data time slice stealing; Data handling differences between AT&T and Verizon; vulnerabilities with Proportional Fair
Securing the Wireless Network/Vulnerabilities of the wireless network (part 2). Securing the iPhone device (part 1). Understanding iPhone directory structure, iOS, log files, and other data housing directories; ActiveSync; Jailbreak and other development and security tools.
Securing the iPhone device (part 2). SSH; Installer.app; SMS; SQLite Database; iPhone emulator
Forensics – challenges with the iPhone, Auditing security and security products. Good Forensic Practices; Technical Processes; Disk Layout; Property Lists; Non-Apple hacking and security software
Emulator exercise (penetration test setup and execution), emulator test, and Q&A. Use an Emulator on a Mac bringing together instructional point covered throughout the week. Q&A on topics covered. One hour test to quantify the material retained.
This course is Instructor-led and delivered through our award-winning online Learning Management System.