Academics > Portfolio >

Course Catalogue

XX-149

Mobile Applications

Conducted by COSEC

Aim

The aim of this course is to develop an understanding of fundamentals and concepts associated with mobile applications and to examine mobile applications from both the perspective of the mobile device and the mobile network.

Details

Duration: 10 Weeks
Level of Effort: 40 Hours
Course Structure: Resident (1) - eLearning (8) - Resident (1)
Language: English 3333 IAW STANAG 6001
Classification: NATO Unclassified
Discipline: COP - Cyber Defence Operations
Area: CD - Cyber Defence Operations
Depth of Knowledge: 3 - Apply
ePrime No.: N/A
ETOC Code: N/A

Admin note

This is a pilot serial. Students will be expected to provide robust feedback throughout the course.

Course Iterations

Code Course Dates Open Seats
XX-149-A-19 18 Mar 19 - 24 May 19 6

If no seats are available, you may have your agency POC send a seat waiting list request. Please click on the POC Finder to obtain the contact information of your agency POC.

Learning Objectives

Andriod and IOS Architecture: Based on lectures and independently completed challenge problems, students will be able to discuss modern architectural frameworks to include Android and iPhone Operating System (iOS) and architectural components and containers such as activities, services, broadcast receivers, content providers and intents, in accordance with the guidelines provided by the course material.

Android and IOS Security Models: Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems students will review security models for both Android and iOS, in accordance with the guidelines provided by the course material.

Mobile Security Mechanisms: Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems students will discuss a variety of security mechanisms to include run-time virtualization, application sandboxing, memory management, system partitioning, and space layout randomization, in accordance with the guidelines provided by the course material.

Mobile Phone Dynamic Resources and Capabilities: Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems, students will be introduced to dynamic resources such as battery use, phone state, audio stream as well as communication implementations (cellular, WiFi, Bluetooth, NFC, FM), and hardware sensors to include the accelerometer, geomagnetic, orientation, gyroscope, proximity, Hall effect, gesture grid, humidity, and heart rate sensors, in accordance with the guidelines provided by the course material.

Mobile Application Development Environments: Based on lectures and DL analysis problems students will be introduced to common application development environments used to produce basic applications, in accordance with the guidelines provided by the course material.

Mobile Network Technologies: Based on lectures and independently completed challenge problems, students will discuss all mobile network technologies to include Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Long Term Evolution (LTE), LTE-Advanced, in accordance with the guidelines provided by the course material.

Mobile Network Architecture: Based on lectures and independently completed challenge problems, students will gain detailed insight into the architecture of mobile networks, in accordance with the guidelines provided by the course material

Location Based Services: Based on lectures and guided, hands-on lab exercises, students will discuss mechanics of location-based services, in accordance with the guidelines provided by the course material.

Signalling and Handover: Based on lectures and independently completed challenge problems, students will be introduced to concepts of signalling and handover, in accordance with the guidelines provided by the course material.

Short Message Service (SMS): Based on lectures and guided, hands-on lab exercises, students will discuss in detail short Message Service (SMS – text messaging), in accordance with the guidelines provided by the course material.

Silent SMS and IMSI catching: Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems, students will be introduced to mechanics of common network attacks such as Silent SMS and IMSI catching, in accordance with the guidelines provided by the course material.

Course Participants

This is a technical course that requires a technical education and/or experience background. The target audience is personnel (cyber technical managers, cyber operators, IT technicians and engineers) those work responsibilities require or would benefit from an in-depth understanding of mobile device functionality and the networks they attach to. Students attending this course should have a high degree of competence using computers and mobile devices.

Language Proficiency: English 3333 IAW STANAG 6001
Rank Requirements: NCO: OR-1 thru OR-9
Officer: OF-1 thru OF-5

Methodology

This ten weeks course is a mix of lectures, guided, hands-on lab exercises, independently completed challenge problems, and Distance Learning (DL) analysis problems. Lab exercises challenge problems are conducted in class using Sakai during the resident weeks. DL problems are conducted using Sakai during the non-resident weeks.
This course is designed so that the majority of the resources used in the teaching of the course will be supplied from the textbook as well as instructor’s materials, delivered in classroom (via PowerPoint presentations), supplemented with classroom discussions. The student's time will average 3 to 5 hours a week during the DL segment of the course, required for the DL problems.

Further Information

The students will be expected to know some basic information on computer networking and operating system functionality at a systems level. Some familiarity with Wireshark is required. An ability to program in Java is preferred but not required.