CompTIA A+ Core 2: Mobile & Embedded Device Security

CompTIA    |    Beginner
  • 11 videos | 59m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 85 users Rating 4.6 of 85 users (85)
As mobile technology evolves, so does the need for mobile device security. Mobile device security features protect data, including sensitive and private information, on mobile devices such as smartphones, tablets, and laptops. Learn about screen lock security features such as facial recognition, PIN codes, fingerprint, pattern, and swipe devices. Discover the benefits of remote wiping features, locator applications, and device encryption. Next, explore how operating system updates can help secure devices and patch vulnerabilities. Then discover features of remote backup applications, firewalls, and mobile anti-virus and anti-malware solutions. Lastly, you'll get an overview of policies and procedures as they relate to BYOD, profile security requirements, and Internet of Things (IoT) security. Upon completion of this course, you'll be able to outline common methods for securing mobile and embedded devices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify when and how to use mobile remote wiping features
    Demonstrate how mobile operating system updates can patch and secure mobile and embedded devices
    Recognize the benefits of mobile device encryption features
    Recognize how to implement restrictions for failed login attempts on mobile devices
    Recognize the importance of mobile policies and procedures documentation
  • Provide an overview of internet of things (iot) security as it relates to mobiles and embedded devices
    Illustrate physical destruction techniques including drilling, shredding, degaussing, and incinerating
    List common recycling and repurposing best practices including erasing and formatting
    Identify outsourcing concepts including third party vendors and certification of destruction
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 54s
  • 6m 34s
    In this video, you will learn when and how to use mobile remote wiping features. FREE ACCESS
  • Locked
    3.  Updating Mobile Operating Systems
    6m 5s
    In this video, you will learn how mobile operating system updates can patch and secure mobile and embedded devices. FREE ACCESS
  • Locked
    4.  Mobile Device Encryption
    6m 36s
    Upon completion of this video, you will be able to recognize the benefits of mobile device encryption features. FREE ACCESS
  • Locked
    5.  Failed Login Attempts Restrictions
    5m 57s
    After completing this video, you will be able to recognize how to implement restrictions for failed login attempts on mobile devices. FREE ACCESS
  • Locked
    6.  Mobile Policies and Procedures
    6m 23s
    Upon completion of this video, you will be able to recognize the importance of documenting mobile policies and procedures. FREE ACCESS
  • Locked
    7.  Internet of Things (IoT) Security
    6m 58s
    After completing this video, you will be able to provide an overview of Internet of Things (IoT) security as it relates to mobiles and embedded devices . FREE ACCESS
  • Locked
    8.  Physical Destruction Techniques
    5m 42s
    After completing this video, you will be able to illustrate physical destruction techniques including drilling, shredding, degaussing, and incinerating. FREE ACCESS
  • Locked
    9.  Recycling and Repurposing
    5m 5s
    After completing this video, you will be able to list common recycling and repurposing best practices, including erasing and formatting. FREE ACCESS
  • Locked
    10.  Outsourcing Concepts
    6m 45s
    Find out how to identify outsourcing concepts, including third party vendors and certification of destruction. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 5s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 407 users Rating 4.6 of 407 users (407)
Rating 4.7 of 124 users Rating 4.7 of 124 users (124)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 105 users Rating 4.5 of 105 users (105)
Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
Rating 4.6 of 248 users Rating 4.6 of 248 users (248)