University certificate
The world's largest school of business”
Why study at TECH?
Learn the specifics in Smartphone Cybersecurity and become an expert in the field”
Why Study at TECH?
TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class centre for intensive managerial skills training.
TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"
At TECH Global University
Innovation |
The university offers an online learning model that combines the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.
"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.
The Highest Standards |
Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...
95% of TECH students successfully complete their studies.
Networking |
Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.
100,000+ executives trained each year, 200+ different nationalities.
Empowerment |
Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.
500+ collaborative agreements with leading companies.
Talent |
This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision.
After completing this program, TECH helps students show the world their talent.
Multicultural Context |
While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.
TECH students represent more than 200 different nationalities.
Learn with the best |
In the classroom, TECH teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world.
Teachers representing 20 different nationalities.
TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:
Analysis |
TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.
Academic Excellence |
TECH offers students the best online learning methodology. The university combines the Relearning method (a postgraduate learning methodology with the highest international rating) with the Case Study. A complex balance between tradition and state-of-the-art, within the context of the most demanding academic itinerary.
Economy of Scale |
TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.
At TECH, you will have access to the most rigorous and up-to-date case studies in the academic community”
Syllabus
TECH Global University has devised this Postgraduate certificate in Smartphone Cybersecurity to offer its students the most relevant information in the field. The teaching staff have compiled the latest concepts and techniques in a straightforward structure so business professionals can easily understand the work involved in providing greater smartphone security and greater control over their work tools.
The structure of the curriculum will allow you to self-manage your learning through a comprehensive tour of the latest concepts in the field”
Syllabus
The Postgraduate certificate in Smartphone Cybersecurity is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments.
Throughout 150 hours of study, you will analyze a multitude of practical cases through individual work, which will allow you to acquire the necessary skills to develop successfully in your daily practice. It is, therefore, an authentic immersion in real business situations.
This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective.
A study plan designed especially for students, focused on their professional development, which prepares them to achieve excellence in the field of information security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the competencies to solve critical situations in a creative and efficient way.
The program is carried out in six weeks and is divided into one module:
Module 1. Smartphone Security
Where, When and How is it Taught?
TECH offers the possibility of developing this Postgraduate certificate in Smartphone Cybersecurity completely online. Over the course of 6 weeks, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.
Module 1. Smartphone Security
1.1. The World of Mobile Devices
1.1.1. Types of Mobile Platforms
1.1.2. IOS Devices
1.1.3. Android Devices
1.2. Mobile Security Management
1.2.1. OWASP Mobile Security Projects
1.2.1.1. Top 10 Vulnerabilities
1.2.2. Communications, Networks and Connection Modes
1.3. Mobile Devices in Business Environments
1.3.1. Risk
1.3.2. Device Monitoring
1.3.3. Mobile Device Management (MDM)
1.4. User Privacy and Data Security
1.4.1. Statements of Information
1.4.2. Licenses
1.4.2.1. Encryption
1.4.3. Secure Data Storage
1.4.3.1. Secure Storage on iOS
1.4.3.2. Secure Storage on Android
1.4.4. Best Practices in Application Development
1.5. Vulnerabilities and Attack Vectors
1.5.1. Vulnerabilities
1.5.2. Attack Vectors
1.5.2.1. Malware
1.5.2.2. Data Exfiltration
1.5.2.3. Data Manipulation
1.6. Main Threats
1.6.1. Untrained Users
1.6.2. Malware
1.6.2.1. Types of Malware
1.6.3. Social Engineering
1.6.4. Data Leakage
1.6.5. Information Theft
1.6.6. Unsecured Wi-Fi Networks
1.6.7. Outdated Software
1.6.8. Malicious Applications
1.6.9. Insecure Passwords
1.6.10. Weak or No Security Configuration
1.6.11. Physical Access
1.6.12. Loss or Theft of the Device
1.6.13. Identity Theft (Integrity)
1.6.14. Weak or Broken Cryptography
1.6.15. Denial of Service (DoS)
1.7. Main Attacks
1.7.1. Phishing Attacks
1.7.2. Attacks Related to Communication Modes
1.7.3. Smishing Attacks
1.7.4. Cryptojacking Attacks
1.7.5. Man in the middle
1.8. Hacking
1.8.1. Rooting and Jailbreaking
1.8.2. Anatomy of a Mobile Attack
1.8.2.1. Threat Propagation
1.8.2.2. Malware Installation on Devices
1.8.2.3. Persistence
1.8.2.4. Executing Payloads and Extracting Information
1.8.3. Hacking on iOS Devices: Mechanisms and Tools
1.8.4. Hacking Android Devices: Mechanisms and Tools
1.9. Penetration Testing
1.9.1. iOS Pentesting
1.9.2. Android Pentesting
1.9.3. Tools
1.10. Safety and Security
1.10.1. Security Configuration
1.10.1.1. On iOS Devices
1.10.1.2. On Android Devices
1.10.2. Safety Measures
1.10.3. Protection Tools
A unique, key, and decisive educational experience to boost your professional development and make the definitive leap"
Postgraduate Certificate in Smartphone Cybersecurity.
There is no doubt that the use of mobile devices has become widespread in today's society. In fact, they have gone from being simply phones to small computers capable of performing various tasks, such as browsing the Internet, running applications, storing data, locating positions on maps... among other functions. However, the growing "intelligence" of these devices has increased the attack surface and made them a prime target for attackers seeking to invade privacy, usurp identities, steal data and use the owners for criminal purposes. For this reason, an update such as the one proposed by this Postgraduate Certificate in Smartphone Cybersecurity is urgently needed.
Become a crack against the main threats of Smartphones
TECH has created a program for managers and professionals in the sector that will make a difference in the preparation in Security and Privacy in the field of Smartphones. Throughout the program, you will analyze the vulnerabilities and attack vectors common to mobile devices or secure data storage, among other key points. In addition, this Postgraduate Certificate in Smartphone Cybersecurity is highly compatible with your personal and professional obligations thanks to its online nature, and all this in only 150 hours!