CompTIA A+ Core 2: Mobile & Embedded Device Security
CompTIA
| Beginner
- 11 videos | 59m 3s
- Includes Assessment
- Earns a Badge
As mobile technology evolves, so does the need for mobile device security. Mobile device security features protect data, including sensitive and private information, on mobile devices such as smartphones, tablets, and laptops. Learn about screen lock security features such as facial recognition, PIN codes, fingerprint, pattern, and swipe devices. Discover the benefits of remote wiping features, locator applications, and device encryption. Next, explore how operating system updates can help secure devices and patch vulnerabilities. Then discover features of remote backup applications, firewalls, and mobile anti-virus and anti-malware solutions. Lastly, you'll get an overview of policies and procedures as they relate to BYOD, profile security requirements, and Internet of Things (IoT) security. Upon completion of this course, you'll be able to outline common methods for securing mobile and embedded devices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify when and how to use mobile remote wiping featuresDemonstrate how mobile operating system updates can patch and secure mobile and embedded devicesRecognize the benefits of mobile device encryption featuresRecognize how to implement restrictions for failed login attempts on mobile devicesRecognize the importance of mobile policies and procedures documentation
-
Provide an overview of internet of things (iot) security as it relates to mobiles and embedded devicesIllustrate physical destruction techniques including drilling, shredding, degaussing, and incineratingList common recycling and repurposing best practices including erasing and formattingIdentify outsourcing concepts including third party vendors and certification of destructionSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 54s
-
6m 34sIn this video, you will learn when and how to use mobile remote wiping features. FREE ACCESS
-
6m 5sIn this video, you will learn how mobile operating system updates can patch and secure mobile and embedded devices. FREE ACCESS
-
6m 36sUpon completion of this video, you will be able to recognize the benefits of mobile device encryption features. FREE ACCESS
-
5m 57sAfter completing this video, you will be able to recognize how to implement restrictions for failed login attempts on mobile devices. FREE ACCESS
-
6m 23sUpon completion of this video, you will be able to recognize the importance of documenting mobile policies and procedures. FREE ACCESS
-
6m 58sAfter completing this video, you will be able to provide an overview of Internet of Things (IoT) security as it relates to mobiles and embedded devices . FREE ACCESS
-
5m 42sAfter completing this video, you will be able to illustrate physical destruction techniques including drilling, shredding, degaussing, and incinerating. FREE ACCESS
-
5m 5sAfter completing this video, you will be able to list common recycling and repurposing best practices, including erasing and formatting. FREE ACCESS
-
6m 45sFind out how to identify outsourcing concepts, including third party vendors and certification of destruction. FREE ACCESS
-
1m 5s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.