If you work for a large enterprise and your only smartphone was provided by your employer, then your device may already have some restrictions in place through a MDM solution (not covered in this course). If you have some doubts, the best is to contact your IT department for guidance before signing up for this course.
between 9:00 and 12:00 then between 13:00 and 16:00
Smartphone running at least iOS 16 or Android 11 and its derivatives (EMUI, MIUI, Color OS, OxygenOS)
Since the birth of the iPhone in 2007, the smartphone has become our mobile device of choice, allowing us to be more connected and productive than ever.
With these extremely powerful mini-computers in our pockets, containing private, confidential, and sometimes sensitive data, it has evolved into an increasing target for hackers and governmental agencies alike from all over the globe. And with more than 3.5 billion devices in use, it's easy to understand why smartphone users are likely to be targeted.
Therefore, it is important to understand the major threat vectors as well as how to reduce the risks of our smartphones getting hacked.
This course is split into 3 modules:
A mix of theory, real world examples, interactive discussions and knowledge assessment through quizzes.
To help you take note digitally, you’ll receive a fillable PDF workbook, that you can print if you prefer taking notes manually.
There are quizzes after each module
A certificate of completion will be sent to the participants.
This course takes place ON-SITETerres Rouges building14, porte de FranceL-4360 Esch/Alzette