Infrastructure Security

Everyone
  • 9 videos | 37m 26s
Rating 4.4 of 16 users Rating 4.4 of 16 users (16)
Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.

IN THIS COURSE

  • 4m 27s
  • 2m 53s
  • Locked
    3.  Reverse Proxy Features
    5m 43s
  • Locked
    4.  Securing Directory Services and CA
    3m 32s
  • Locked
    5.  Securing E-mail Services
    4m 7s
  • Locked
    6.  Rights Management Systems
    2m 56s
  • Locked
    7.  Protecting Data at Rest and in Transit
    4m 11s
  • Locked
    8.  Mobile Device Management Systems
    4m 15s
  • Locked
    9.  Exercise: Securing Back-end Systems
    5m 23s

YOU MIGHT ALSO LIKE

Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)