Course Details

Previous Page


Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The final stage in moving toward a secure mobile enterprise requires the use of a mobile device management (MDM) platform. These management systems can lock down and govern all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. In this course, you will learn about a model for enterprise mobile security and two MDM systems from Microsoft – Intune and System Center Configuration Manager.

Target Audience
Enterprise network engineers and managers, network security engineers and managers, anyone tasked with providing secure access to company resources from mobile devices

Prerequisites
None

Expected Duration (hours)
1.3

Lesson Objectives

Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security

  • start the course
  • describe network architecture challenges for securing enterprise mobile devices
  • describe a solution for enterprise mobile device security challenges based on Microsoft's product portfolio
  • create an account for Microsoft Intune
  • navigate the Microsoft Intune interface
  • enroll devices in Microsoft Intune
  • target devices in Microsoft Intune
  • enforce configurations in Microsoft Intune
  • handle certificates in Microsoft Intune
  • deploy enterprise profiles in Microsoft Intune
  • distribute apps in Microsoft Intune
  • protect data in Microsoft Intune
  • describe Microsoft System Center Configuration Manager and Intune interoperability
  • configure the Microsoft Intune Connector Role
  • prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager
  • prepare for iOS device enrollment in Microsoft System Center Configuration Manager
  • create an account on Microsoft Intune, enroll devices, and deploy enterprise profiles
  • Course Number:
    sp_emds_a04_it_enus