Designing for Device Access & Protection

Windows 10    |    Expert
  • 15 videos | 53m 12s
  • Includes Assessment
  • Earns a Badge
Rating 3.9 of 7 users Rating 3.9 of 7 users (7)
Proper access to and protection for devices in the Enterprise is probably one of the most important design steps. Discover how to plan for device enrollment and the company portal, and plan protection for data on devices.

WHAT YOU WILL LEARN

  • Design device inventory
    Design mobile device management authority
    List device management prerequisites
    Customize the company portal
    Customize company terms and conditions
    Design configuration policies
    Design compliance policies
    Design conditional access policies
  • Design activesync policies
    Design policy conflicts
    Design protection of data in e-mail when accessing it from a mobile device
    Design sharepoint data protection when accessing it from a mobile device
    Design for protection of data of applications using encryption
    Design for full and selective wipes
    List design steps to take when planning and for the protection of data in e-mail and sharepoint when accessing them from mobile devices

IN THIS COURSE

  • 3m 33s
    Find out how to design a device inventory. FREE ACCESS
  • 3m 6s
    Find out how to design mobile device management. FREE ACCESS
  • Locked
    3.  Device Management
    4m
    After completing this video, you will be able to list the prerequisites for device management. FREE ACCESS
  • Locked
    4.  The Company Portal
    3m 32s
    During this video, you will learn how to customize the company portal. FREE ACCESS
  • Locked
    5.  Company Terms and Conditions
    3m
    During this video, you will learn how to customize your company's terms and conditions. FREE ACCESS
  • Locked
    6.  Configuration Policies
    3m 41s
    Learn how to design policies for configuring systems. FREE ACCESS
  • Locked
    7.  Compliance Policies
    2m 41s
    In this video, you will learn how to design compliance policies. FREE ACCESS
  • Locked
    8.  Conditional Access Policies
    4m 4s
    In this video, you will learn how to design conditional access policies. FREE ACCESS
  • Locked
    9.  Exchange ActiveSync Policies
    3m 22s
    In this video, learn how to design ActiveSync policies. FREE ACCESS
  • Locked
    10.  Policy Conflicts
    1m 5s
    In this video, learn how to design policies that conflict with each other. FREE ACCESS
  • Locked
    11.  Mobile E-mail Data Protection
    5m 50s
    Learn how to design data protection in e-mail when accessing it from a mobile device. FREE ACCESS
  • Locked
    12.  SharePoint Data Protection
    4m 25s
    Learn how to design data protection for SharePoint when accessing it from a mobile device. FREE ACCESS
  • Locked
    13.  Application Data Protection
    4m 1s
    In this video, you will learn how to design for data protection using encryption. FREE ACCESS
  • Locked
    14.  Full and Selective Wipes
    3m 29s
    Learn how to design for full and partial wipes. FREE ACCESS
  • Locked
    15.  Exercise: Plan Mobile Device Data Protection
    3m 25s
    After completing this video, you will be able to list design steps to take when planning for the protection of data in e-mail and SharePoint when accessing them from mobile devices. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 46 users Rating 4.6 of 46 users (46)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)