
- This event has passed.
Mobile Payment Systems & Security
November 28, 2016 - December 1, 2016

Thanks to big moves by Apple, Samsung, Google and others, the world of mobile payments is rapidly evolving. More retailers accept digital payments than ever before. However, in a world where evolving cybercrime tactics are out to get people’s information, mobile payments can also cause the worst digital life experiences.
Therefore, this 4 days comprehensive course will be focusing key issues on mobile payment security. You will get updates on critical hacking techniques through live demonstration. You will also learn how hackers can break security features of mobile platforms and apps. The trainer will not only cover theoretical aspect of mobile security, but will also share his long experience with clients on mobile security. Attend this course and master how to protect apps, infrastructure and devices, in order to heighten security network of mobile payment gateway. The ultimate objective is to devise a security master plan against threats and hackers.
Course Highlights
- An overview of different types of mobile payments
- Various demonstrations of hacking techniques, attack vectors, and how attacks are performed
- How to protect applications, infrastructure and devices
- Security network of mobile payment gateway
- Security in the cloud
- Security master plan against threats and hackers
Key Learning Objectives
- Learn various types of attacks on mobile payment systems and information systems
- Learn the attack vectors and the anatomy of a targeted attack
- Understand the components of a comprehensive security program
- Understand security concepts and technologies in use today
- Learn how to harden computing devices (mobile, portable, workstation, server) and the network infrastructure
- Develop the strategy to detect and stop the malicious actor on your network
- Learn about various authentication systems used for the newest applications – Single sign-on, Federated identity management, SAML, OpenID, IDaaS
- Develop a secure approach to utilising cloud services
- Secure the application development environment
- Understand application development models and standards
- Learn the controls used to secure applications
- Equip with the techniques to test the security of custom applications during development
Who Should Attend
Directors, Managers, Supervisors, Engineers, Consultants of:IT Development
- IT DevelopmentIT Security
- IT SecurityInformation System
- Information SystemApplication Development
- Application DevelopmentMobile Network
- Mobile NetworkCyber Security
- Cyber SecuritySoftware Development
- Software DevelopmentIT Infrastructure
- IT InfrastructureMobility & Payment Solutions
- Mobility & Payment SolutionsMobile Banking
- Mobile BankingMobile Commerce
- Mobile CommerceE-Commerce
- E-CommerceRetail Banking
- Retail BankingDigital & Channel Management
- Digital & Channel ManagementDigital Innovation & Strategy
- Digital Innovation & StrategyEnterprise Architecture & Strategy
- Enterprise Architecture & StrategyIT Support
- IT SupportIT Operations
- IT OperationsIT Audit & Compliance
- IT Audit & ComplianceSecurity Policy
- Security PolicyIT Project
- IT ProjectPayment Process
- Payment ProcessTechnical Support
- Technical SupportQA / Software Testing
- QA / Software Testing
Testimonial:
“The trainer gives great real world examples and application of core concepts. Extremely thorough. Great class!” – Past Participant