Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.