Mobile Security Administration: intermediate
- 8 Courses | 6h 57m 19s
- 8 Books | 44h 7m
Mobile devices are everywhere, and they bring security concerns with them. Explore, in-depth, aspects of mobile security.
COURSES INCLUDED
Mobile Security Threats
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.
20 videos |
1h 21m
Assessment
Badge
Mobile Device Security & Handling
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.
5 videos |
24m
Assessment
Badge
Mobile Security Technologies
Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Explore encryption and some practical use cases in the mobile enterprise.
16 videos |
54m
Assessment
Badge
Mobile Security Threat Mitigation
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore threat mitigation strategies and configurations in various environments.
18 videos |
1h 1m
Assessment
Badge
Containers & Wrappers
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.
7 videos |
23m
Badge
Configuring Enterprise-level Security
Mobile Device Management (MDM) platforms can lock down all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. Explore a model for enterprise mobile security, including Intune and System Center Configuration Manager.
16 videos |
1h 12m
Badge
Understanding Mobile Devices, Information Security, and Social Trend
As organizations continue to evolve, they must focus on key trends including mobility, information security, and social capabilities. In this course, you explore mobile trends and how mobility can impact a business. Discover how mobility incorporates mobile communication, hardware, and applications, and explore potential challenges organizations face when implementing mobile solutions. You'll also explore information security factors brought forward by the increased use of networks, computers, and mobiles. Discover how information security can protect physical and digital assets from theft, compromise, alteration, destruction, and unwanted manipulation, and explore potential challenges organizations face when implementing a security solution. You'll also learn about social trends including social networking and social media components. Lastly, explore how organizations are focusing on social trends including brand awareness, digital advertising, customer experience, and lead conversion. This course was originally created by Global Knowledge (GK).
18 videos |
1h 1m
Badge
Infrastructure Security
Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.
9 videos |
37m
SHOW MORE
FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.BOOKS INCLUDED
Book
Managing Online Risk: Apps, Mobile, and Social Media SecurityIncluding case studies, checklists, and policy samples, this book presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.
6h 44m
By Deborah Gonzalez
Book
Wireless Mobile Internet Security, Second EditionPresenting readers with an intimate sense of how mobile internet systems operate and how to address complex security issues, this book covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems.
9h 14m
By Man Young Rhee
Book
Securing Mobile DevicesExplaining that applying COBIT 5 to mobile device security establishes a uniform management framework, this book offers guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.
2h 12m
By ISACA
Book
Android Security Internals: An In-Depth Guide to Android's Security ArchitectureTaking us under the hood of the Android security system, this book describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
7h 31m
By Nikolay Elenkov
Book
iOS Penetration Testing: A Definitive Guide to iOS SecurityUnearthing some of the most significant attacks threatening iOS applications in recent times, this book will teach you the methods of patching them to make payment transactions and personal data sharing more secure.
1h 38m
By Kunal Relan
Book
Mobile Application Security with Open-Source ToolsAuthored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article examines insecure applications deployed in production systems as one of the most overlooked aspects in mobile security.
29m
By Sakthivel Rajendran
Book
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD DevicesAn essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
2h 46m
By Philip Chukwuma, Richard Cozart, Sajay Rai
Book
Security of Mobile CommunicationsProviding technicians and designers with a critical, comprehensive resource, this guide goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are secure.
13h 33m
By Noureddine Boudriga
SHOW MORE
FREE ACCESS