CYBR 665 Securing Wireless and Mobile Technologies
Wireless Communication and Mobile technologies have become an essential part of our daily lives. Modern cellular technologies have enabled smartphones to access fast Internet and app based services besides traditional voice communication and sending text messages. Additionally, today¿s network typically include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. As more and more communications are conducted via cellular and mobile technologies, these technologies have become critical (and continue to become more critical) to cyber operations. This course provides and in depth introduction to various wireless technologies (with a focus on cellular technology) and how data is processed and securely transmitted using these technologies and ubiquitous devices. An overview of smart phone technologies, their embedded operating systems, and mobile protocols will also be provided.
First day attendance is mandatory.
Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Prerequisites
Special information
Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
2 Graduate credits
Effective August 17, 2021 to present
Learning outcomes
General
- Explain differences in core architecture between different generations of cellular and mobile network technologies
- Describe user associations and routing in a cellular/mobile network, interaction of elements within the cellular/mobile core, and end-to-end delivery of a packet and/or signal
- Identify the unique security and operational attributes in the wireless environment and their effects on network communications.
- Describe and implement a secure wireless network that uses modern encryption and enforces the proper authentication of users.
- Identify various vulnerabilities associated with wireless networks and demonstrate how to mitigate them
- Demonstrate clear understanding of security protocols used in wireless communications and how each addresses issues of authentication, integrity, and confidentiality
- Understand mobile protocols, registration procedures, and encryption standards
- Demonstrate ethical behavior appropriate to security-related technologies.
Fall 2024
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Securing Wireless and Mobile Technologies | Randall, Gerald Gregory | Books for CYBR-665-50 Fall 2024 | Course details for CYBR-665-50 Fall 2024 |