Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
Showing results for 
Search instead for 
Did you mean: 
Former Member
0 Kudos

Why you should attend this seminar:

This seminar addresses users that would like to get a closer look at mobile devices and their security, especially with the focus of integrating these devices in a company’s infrastructure.

Beyond looking at the management, the highly important security issues will be under close examination since these little details might pose a severe security risk. After providing a theoretical background, different security weaknesses are demonstrated using hands-on exercises.



·          Properties of mobile devices

·          Administration

·          Attacks:   

  • Physical access
  • Hardware Hacks
  • Analyzing the traffic
  • Man-in-the-Middle-Attacks


Apple iOS:

·          Security features

·          Mobile Device Management Solutions

·          Jailbreaks

·          Forensic analysis of an iPad

·          Attacking apps via proxy

·          Reverse engineering apps via debugger

Google Android:

·          Android's security features

·          Attacking old and up-to-date Android smartphones

·          Emulation of an Android phone

·          What Google knows about you

Windows Phone, Blackberry, etc:

·          Exploit ongoing vulnerabilities

·          Security features and protection measures

You can book this event directly here: