Containers & Wrappers
Intermediate
- 7 videos | 23m 14s
- Earns a Badge
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.
WHAT YOU WILL LEARN
-
Describe byod containers for segregating data on byod devicesDescribe usage scenarios for byod containersConfigure byod containers using good workDescribe security functionality offered by app wrapper technologies for mobile devices
-
Describe methods to mitigate malicious functionality in mobile appsDescribe methods to mitigate code vulnerabilities in mobile appsDescribe mitigation strategies for byod and cod devices in the enterprise
IN THIS COURSE
-
3m 5s
-
3m 11s
-
3m 2s
-
2m 52s
-
4m 27s
-
3m 3s
-
3m 33s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.