The adaption of Mobile and Wireless communications technologies, in military, commercial and personal use has grown exponentially. But the mobile and wireless nature of these devices raise new and important security challenges not usually present in highly structured and static environments. Thus, the purpose of this course is to give students a full understanding of what mobile and wireless communication technologies are, how they work, how people find them and exploit them, and how they can be secured. This course is based on real world examples, solutions, and deployments. In general the course will address the the taxonomy of Mobile/wireless security, fundamentals of digital security including wireless Authentication and authorization schemes, privacy, threat analysis and security protocol security functionality and assurance issues.