Mobile devices are now an integral part of the company environment and have long been used for more purposes than just making telephone calls. It is now common practice for many employees to use their mobile devices to process e-mails, surf the Internet and transmit a large quantity of often confidential company data. This concentration of interesting data make mobile devices very attractive to hackers.
This seminar is aimed at users who want to better understand security aspects of mobile devices, for example for integration in their own company infrastructure. In addition to management of the devices, critical points of attack will be illustrated. "Hands-on" exercises will also be carried out in order to analyze and show different vulnerabilities whose theoretical principles were formulated beforehand.
Principles in Linux