Course Outline:
1 protection Where to start
2 should know in advance - Encryption and decryption
The first part of the mobile security techniques
3 3G security mechanism
4 WAP security
5 Wireless (WAP) PKI
6 OMA DRM and OMA Download
7 WEP and WPA
8 Bluetooth Security
Moving a second portion of the safety Attack and
9 mobile phone viruses and protection
10 PDA vulnerabilities and countermeasures
11 802.11 for the prevention and weaknesses ***
The third part of the deployment of mobile security
12 workstation security deployment
13 access points to deploy security
14 Gateway Security deployment
The fourth mobile security applications
15 Mobile Security payments
16 Secure Wireless LAN