CYBR 665

Securing Wireless and Mobile Technologies

3 Graduate credits
Effective May 6, 2020 – Present

Graduation requirements this course fulfills

Wireless Communication and Mobile technologies have become an essential part of our daily lives. Modern cellular technologies have enabled smartphones to access fast Internet and app based services besides traditional voice communication and sending text messages. Additionally, today¿s network typically include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. As more and more communications are conducted via cellular and mobile technologies, these technologies have become critical (and continue to become more critical) to cyber operations. This course provides and in depth introduction to various wireless technologies (with a focus on cellular technology) and how data is processed and securely transmitted using these technologies and ubiquitous devices. An overview of smart phone technologies, their embedded operating systems, and mobile protocols will also be provided.

Special information

First day attendance is mandatory.Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.

Learning outcomes

General

  • Explain differences in core architecture between different generations of cellular and mobile network technologies
  • Describe user associations and routing in a cellular/mobile network, interaction of elements within the cellular/mobile core, and end-to-end delivery of a packet and/or signal
  • Identify the unique security and operational attributes in the wireless environment and their effects on network communications.
  • Describe and implement a secure wireless network that uses modern encryption and enforces the proper authentication of users.
  • Identify various vulnerabilities associated with wireless networks and demonstrate how to mitigate them
  • Demonstrate clear understanding of security protocols used in wireless communications and how each addresses issues of authentication, integrity, and confidentiality
  • Understand mobile protocols, registration procedures, and encryption standards
  • Demonstrate ethical behavior appropriate to security-related technologies.