Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws



Similar documents
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Cyber Security, Cyber Crimes and Cyber Laws

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

Certified Cyber Security Analyst VS-1160

Hands on, field experiences with BYOD. BYOD Seminar

Certified Cyber Security Analyst VS-1160

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

New-Age Undergraduate Programme

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Research on Situation and Key Issues of Smart Mobile Terminal Security

BYOD Guidance: BlackBerry Secure Work Space

A Taste of SANS SEC575 Part I: Invasion of the Mobile Phone Snatchers

Detailed Description about course module wise:

Lockup: A software tool to harden ios by disabling default Lockdown services

New-Age Master s Programme

Enterprise Apps: Bypassing the Gatekeeper

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Marble & MobileIron Mobile App Risk Mitigation

BYOD AND NEXT- GENERATION MOBILE SECURITY

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

InfoSec Academy Pen Testing & Hacking Track

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Guideline on Safe BYOD Management

Mobile Device Management

FORBIDDEN - Ethical Hacking Workshop Duration

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

EC-Council. Certified Ethical Hacker. Program Brochure

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Mobile Security & BYOD Policy

EC Council Certified Ethical Hacker V8

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Mobile Application Security and Penetration Testing Syllabus

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Protecting Android Mobile Devices from Known Threats

How-To Guide: Cyber Security. Content Provided by

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Ethical Hacking & Cyber Security Workshop

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Unit 3 Cyber security

Content Disclaimer Introduction

Practical Attacks against Mobile Device Management Solutions

KASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Why you need. McAfee. Multi Acess PARTNER SERVICES

Analysis of advanced issues in mobile security in android operating system

E Commerce and Internet Security

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Introduction to Cyber Security / Information Security

HackINFINITY Workshop (A two day workshop on Ethical Hacking & Information Security)

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Certified Secure Computer User

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security Intelligence Services. Cybersecurity training.

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Kaspersky Security for Mobile

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Security A to Z the most important terms

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Security Evaluation CLX.Sentinel

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Course Descriptions November 2014

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Pentesting Android Mobile Application

CYBERTRON NETWORK SOLUTIONS

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

The Key to Secure Online Financial Transactions

CRYPTUS DIPLOMA IN IT SECURITY

Small businesses: What you need to know about cyber security

ETHICAL HACKING CYBER SECURITY

Security Best Practices for Mobile Devices

Online Payments Threats

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Information Security Services

Ensuring the security of your mobile business intelligence

Transcription:

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

Training and Capacity Building Program on Mobile Threats, Android Security, IOS Security and Cyber Laws Over the past decade the numbers in the mobile arena are constantly on the rise. There is a upward trend in number of people using mobile phones, number of mobile phone manufacturers, types of operating systems, number of mobile applications.i.e. mostly everything relating to the mobile technology there is an upward trend. Out of these different trends one peculiar trend that is to be noticed is the rise in number of security issues in terms of mobile. Mobile security is a huge matter of concern now days for organizations considering the amount of trivial information which these devices hold onto them and share amongst them. Also with the introduction of wearable technology and features such as Apple Pay, Application Data sharing etc. the scope of security goes to a new horizon. This hands-on program is jointly organized by the IEEE Gujarat Section and CLS- Cyberra Legal Services with an aim to extend knowledge of mobile threats, mobile security & cyber laws for amongst upcoming IT, Management and Commerce, Law Students and professionals. About IEEE IEEE is the world s largest professional association comprising of over 430,000 members (including 120,000 student members) in more than 160 countries dedicated to advancing technological innovation and excellence for the benefit of humanity. India has nearly 50K members (accounting for ~ 43% of Asia-Pacific region) with an annual growth rate of 9%. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities.

It has 38 Societies and 7 technical Councils representing the wide range of IEEE technical interests. IEEE publishes more than 148 transactions, journals, and magazines; and sponsors more than 1,450 conferences in 92 countries. With this it manages a digital library of 4 million plus documents in the IEEE Xplore, with more than 10 million downloads each month. IEEE Standards Association has a portfolio of around 1,500 standards and projects under development. This includes the prominent IEEE 802.11 standards for wireless networking. For detail you may visit http://www.ieee.org/index.html. About IEEE GUJARAT SECTION IEEE Gujarat Section is one of 11 sections in India, completing its 25 years of foundation next year. It has around 1500 members, including 850 student members (spreading in 20 engineering institute campuses). We have 9 chapters (of 12 IEEE societies). We conduct one- and/or two-days workshops, conferences, half day seminars, 90 minute talks on many concurrent technical topics. Recently, in Nov. 2013, we organized National Workshop on Cyber Security. This year we have organized 2-Day Workshop on Emerging Research Trends in Engineering (in July 2014) and have planned to organize the National Seminar on Computer Vision and Image Processing (in Sep 2014) besides other events. Next year we are organizing an International Conference on the theme of Internet of Things, TENSYMP 2015 (in May 2015).For more details of Gujarat section, http://ieeegujaratsection.org/ and about the detailed history of Gujarat Section, http://www.ieeeghn.org/wiki/index.php/ieee_gujarat_section_history.

About CLS- Cyberra Legal Services Founded in Ahmedabad (Gujarat) in 2003, Cyberra Legal Services is a premier organization in mobile security/cyber-security/cyber law advisory, consultancy, training and education for IT, BPO, KPO, E-commerce, M-commerce, E- Governance, E-learning, Tele-Medicine, Cloud Computing and other sectors. It is the first of its kind of service venture in Gujarat with Key Personnel who are Technology Graduates, Law graduates, Ethical Hackers having specialization in cyber security and cyber laws. CLS serves its various clients in six cities namely Ahmedabad, Gandhinagar, Baroda, Rajkot, Mumbai and Delhi. CLS, in association with Manan Thakker & Associates (Advocates & Cyber Law Consultants), have filed highest number of cyber fraud compensation matters in the state of Gujarat till February, 2015. CLS holds memberships with three prestigious committees namely Cyber Security Consultant Selection Committee, Govt. of Gujarat; Cyber Security Committee of Gujarat Police s Raksha Shakti Universtiy and Legal Committee, GESIA. Objective of this course To facilitate understand & critical understanding about mobile computing. Understanding mobile threats, BYOD Policy, Android threats and IOS threats. To provide in-depth knowledge of through hands-on for Android Security and IOS security practices. To provide in-depth knowledge of Information Technology Act, 2000/Cyber Laws including Information Technology Amendment Act, 2008 for Mobile Computing. To train and prepare candidate to consider Mobile security and cyber laws as a career option.

Eligibility Criteria The said program is open for professionals and practitioners of the areas of mobile security, system administrator, mobile app developer, computer networking, cyber laws and allied fields and students of B.E./B.Tech./BCA/MCA/M.Sc.(IT)/M.Tech/LLB/LLM/CS/ICWA/CA/MBA/ BBA/PGDCA/B.Com./M.Com./B.A. in India. Desirable This course is meant for everyone who has a deep interest in mobiles and internet. Prior knowledge of mobile security is NOT mandatory. Benefits of completing this program You will get an edge over your peers for employment opportunity in Software, IT, Security and Consulting Companies BPO Companies LPO/KPO Companies Internet Service Providers Mobile Service Providers Corporate Business Houses Banks and Financial institutions Data Centers Certifying Authorities for Digital Signature Certificates Cyber Crime Cells Chartered Accountant Firms Law Firms Bio-Tech Companies

Pharmaceutical companies Clinical Research Organizations Life Science Companies and Hospitals. Colleges. Course Contents A. Android Threats & Security Android Overview Android framework Android file System Dalvik Virtual Machine Application Sandboxing Android SDK in depth Permission model of android Know your android application ADB and power of ADB commands Where to find Application Android Past Exploitation Android Malwares Hack the private data stored on Android Exploiting USB connections with Android Capture the data from the network Malicious SMS attack User information / Password theft Setting up Android development environment Setup the OS and tools for attack and protection

Attack the Android Network Analysis o Sniff the traffic o SSL sniffing o DNS attack Application analysis o Unsecure storage o Unencrypted databases o Privacy issues o Application Permissions Reverse Engineering o Hack the source code of the application o Source code signature bypass Android OS Attacks o By Pass screen lock o Fetch the Application data o Attack over internet o Android Spoofing o Android and Money Secure the Android Android and BYOD Securing Android binary Check list for Android assessment

B. IOS Threats & Security IOS Overview IOS framework IOS file System IOS Application Sandboxing Permission model of IOS application Know your IOS application Where to find Application IOS Past Exploitation IOS Malwares and Trojans User information stealing Capture the data from the network Unauthorized dialling attack Malicious SMS attack JailBreaking What is Jailbreak? How to perform Jailbreak Pros & cons of Jailbreak Assessing the Device Access With Jailbreaking Access Without Jailbreaking Remote Access via Command Line Setting up IOS attack environment Installing the application offline

Setup the OS and tools for attack and protection Attack the IOS Network Analysis o Sniff the traffic o SSL sniffing o DNS attack Application analysis o Unsecure storage o Unencrypted databases o Privacy issues o Application Permissions IOS Attacks o Privacy attack o Fetch the Application data o Monitoring Attack over internet o Keychain Dumper o System Amendment o IOS and Money o IOS Server Side attacks Secure the IDevice IOS and BYOD Securing IOS application Check list for IOS application assessment

C. Cyber-Laws Introduction to Information technology & Cyber Law Basics of E-commerce and Computer Fraud Techniques Cyber Security Fundaments, Techniques and Core Principles Cyber Space, Technology & Issues Regulating Cyber Space: International Regulating Cyber Space: National E-contract & Electronic Data Interchange E-signature and E-governance legality under I.T.Act, 2000 Cyber Contraventions, Compensation & Crimes under I.T.Act, 2000 ISPs and Websites Legal Liability under I.T.Act, 2000 Corporate Legal Liability under I.T.Act, 2000 Adjudication Process For Recovery of Losses under I.T.Act, 2000 IPR & Cyber Space Taxation Issues in Cyber Space Case Studies and Case Laws Study Material Specially compiled exclusive study material will be provided along with copy of the Information Technology Bare Act. Duration of the program Week end program (only Sundays-5 hours including break) for 1 months @ Ahmedabad (Gujarat) Evaluation

The candidates will be evaluated for maximum of 100 marks for which one MCQ (Multiple Choice Questions) Exam will be conducted at the end of program. The candidate needs to score at least 50% marks to complete the course and get the certificate of participation. Fee Structure Tuition Fees: Rs. 7,500/- for selected applications Application Charges: Rs. 150/- How to Apply The application form can be downloaded from www.cyberralegalservices.com or http://ieeegujaratsection.org/ or write to Program Coordinator. Candidate should write Certificate Program on Mobile Threats, Android Security, IOS Security & Cyber Laws on the envelope containing Application. Contact Us Ms. C M Thakker (Cyber Security & Cyber Law Advisor) Coordinator IEEE CLS Training Program on Mobile Threats, Android Security, IOS Security & Cyber Laws CLS - 2 nd Floor, Asha Complex, Bh. Navarangpura Police Station, Navarangpura, Ahmedabad 380009 (Gujarat) M: +91 095101 22995 Landline: 079-400 300 31 Website: http://ieeegujaratsection.org Website: www.cyberralegalservices.com