Browse Definitions :
Definition

mobile security certification

A mobile security certification is a formalized program that verifies the participant’s competency in tasks related to mobile security and administration.

mobile security helps ensure that mobile devices, their applications and their connections do not compromise network security. Depending on the specific provider, certification programs typically offer some combination of training courses and free educational materials as well as testing and certification.

Mobile security certifications include:

  • The SANS Institute’s GMOB (GIAC Mobile Device Security Analyst) focuses on the assessment of mobile devices and mobile apps for vulnerabilities and mobile penetration testing.
  • Citrix’s Certified Professional - Mobility (CCP-M) focuses on the design, installation, configuration and management of a Citrix XenMobile
  • CompTIA (Computing Technology Industry Association) Mobility+ certification provides basic vendor-neutral training.
  • FIPS (Federal Information Processing Standards) 140-2 is a federal mobile security certification for devices offering a ranking of 1-4 for the device’s security.
  • CMDSP (Certified Mobile Device Security Professional) is a certification program from the Mobile Resources Group with a focus on iOS and Android devices.
This was last updated in May 2016

Continue Reading About mobile security certification

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close