Mobile Network Security Technology and Application Training

Course Outline:

1 protection Where to start

2 should know in advance - Encryption and decryption

The first part of the mobile security techniques

3 3G security mechanism

4 WAP security

5 Wireless (WAP) PKI

6 OMA DRM and OMA Download

7 WEP and WPA

8 Bluetooth Security

Moving a second portion of the safety Attack and

9 mobile phone viruses and protection

10 PDA vulnerabilities and countermeasures

11 802.11 for the prevention and weaknesses ***

The third part of the deployment of mobile security

12 workstation security deployment

13 access points to deploy security

14 Gateway Security deployment

The fourth mobile security applications

15 Mobile Security payments

16 Secure Wireless LAN

Guess you like

Origin blog.51cto.com/14754730/2481410