0% found this document useful (0 votes)
58 views

Introduction Class DFP50123

This course covers secure mobile computing, focusing on vulnerabilities, threats, and mitigation techniques for mobile devices. Students will learn to assess risks to mobile security, configure security settings, and use security software. They will also develop skills in mobile application development, teamwork, and leadership relating to secure mobile environments. The course syllabus includes topics on information security, mobile technologies, vulnerabilities and attacks, and mobile security principles. Students are assessed through continuous assessments and a final exam.

Uploaded by

Jeff Maynard
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Introduction Class DFP50123

This course covers secure mobile computing, focusing on vulnerabilities, threats, and mitigation techniques for mobile devices. Students will learn to assess risks to mobile security, configure security settings, and use security software. They will also develop skills in mobile application development, teamwork, and leadership relating to secure mobile environments. The course syllabus includes topics on information security, mobile technologies, vulnerabilities and attacks, and mobile security principles. Students are assessed through continuous assessments and a final exam.

Uploaded by

Jeff Maynard
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

INTRODUCTION CLASS

SECURE MOBILE
COMPUTING
DFP50123
SITI SHARMILA BINTI OSMIN
SYNOPSIS
SECURE MOBILE COMPUTING course appraises
vulnerabilities and threat vector associated with
Mobile Computing devices. This course contains
a specifis emphasis on mitigation techniques
including security configurations as well as
security software.
COURSE LEARNING OUTCOMES (CLO):
Upon completion of this course, students should be able to:

CLO1 :
Manipulate the aspect of mobile computing, model and security principles using mobile
computing technology to develop applications ( P3, PLO 3 )
CLO2 :
Develop effective leadership and team work related to mobile secure environment( A4,
PLO 5 )
CLO3 :
Demonstrate best practices in developing mobile security computing in context of social
environment( A3, PLO 8 )
TRANSFERABLE SKILLS

LEADERSHIP,
AUTONOMY PERSONAL
AND SKILLS
RESPONSIBILITY
COURSE
SYLLABUS
CHAPTER 1
INFORMATION
SECURITY OVERVIEW
Identify the need for information security
Explain potential risks to information security
CHAPTER 2
MOBILE COMPUTING
TECHNOLOGIES
Identify the basics of mobile computing
Describe wireless system architecture
Discuss Mobile computing OS
CHAPTER 3
MOBILE COMPUTING
SECURITY
Describe CIA Triad in mobile computing
Explain mobile risk ecosystem
Explain Mobile Hacking
Measure mobile phone security and forensics
CHAPTER 4
MOBILE VULNERABILITIES

Describe vulnerabilities, threats and attacks.


Discuss vulnerabilities in mobile computing
Explain threats in mobile computing
Explain attacks in mobile computing
ASSESSMENT:
The course assessment consists of :

i. Continuous Assessment (CA) – 70%


ii. Final Assessment (FA) / Final Examination (FE) – 30%
Final assessment is carried out at the end of the semester.
BE RESPONSIBLE
IN THE CHAT BOX
Use the chat box for class-related
matters only
Only the chat feature for things related to your lessons and as
instructed by your teacher. Also, reading something is not the
same as hearing it, so think carefully before sending questions
or comments.
QUESTIONS?
CLARIFICATIONS?
Email Address
[email protected]

Mobile Number
019-5728463

You might also like