University of Technology Sydney

42036 Cyber Security for Mobile Platforms

6cp; 3hpw, on campus
Requisite(s): ( 32548 Cybersecurity OR (48730 Cybersecurity AND 30 credit points of completed study in spk(s): MAJ03445 Networking and Cybersecurity major BSc ))
These requisites may not apply to students in certain courses. See access conditions.
Recommended studies:

knowledge of network security, Java programming, and Internet Protocols is required. Knowledge of mobile application development is desirable.

Cyber security program



Mobile devices with their hugely increased usage of various applications and services have attracted a plethora of possible attacks. Organisations and businesses have to adapt and deploy special security measures while users face new generation of security threats.

This subject provides an in-depth technical overview of the new security risks and threats of modern mobile platforms and operating systems, and their implications. It also introduces mobile threats ranging The subject also covers the security of enterprise networks, while BYOD (Bring Your Own Device) model is being widely adopted in corporate and small/medium size enterprise networks. This poses significant additional and new threats to network security administrators. The subject covers how Shadow IT solutions might not be relevant and how administrators should adapt to circumvent insider attacks enabled by BYOD.

The subject takes practice-based learning allowing students to perform penetrations tests to some locally set private networks. It also uncovers some limitations of one the most popular tools to trace back information leakage in mobile apps by giving the students the possibility to demonstrate their own covert channel techniques. Finally, the students are able to adapt a regular network firewalling policy to mobile environment and observe the possible threats and circumvention techniques.

Typical availability

Spring session, City campus

Detailed subject description.

Access conditions

Note: The requisite information presented in this subject description covers only academic requisites. Full details of all enforced rules, covering both academic and admission requisites, are available at access conditions and My Student Admin.