· Security Criterias
· External and Internal threats
· Classic Threat Models
· FW, NAC and SBC
· IDS and IPS
· MDM versus Container
· The concept of MDM
· Mobile Information Management (MIM)
· Geolocation concept
· Mobile Application Behavioral Analysis
· Public and Private keys
· Symmetric and Asymmetric encryption keys
· DES and Triple DES
· TLS
· VPN and IPsec
· Media encryption- SRTP
· S/MIME
· SIP Client
· Protection against MIM: Encryption
· HTTP digest authentication
· Lightweight scheme for authentication
· Authentication Challenges
· The challenges
· Container concept
· Protection methods
· Mails and Messages encryption
· NAT Traversal and FW penetration
· Encryption functionality – TLS, SRTP, SDES, ZRTP, DTLS
· Lawful interception
· DoS and DDoS immunity
· Deep Packet Inspection (DPI at all layers)
· MLP- Multi-Layered-Protection concept
· Vendors for Mobile protection
· Penetration Tests
· Q&A
· Evaluation