Mobile Security Administration: intermediate

  • 8 Courses | 6h 57m 19s
  • 8 Books | 44h 7m
Rating 2.0 of 1 users Rating 2.0 of 1 users (1)
Mobile devices are everywhere, and they bring security concerns with them. Explore, in-depth, aspects of mobile security.


Mobile Security Threats

  • 4m 7s
  • 5m 16s


Mobile Security Threats
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.
20 videos | 1h 21m has Assessment available Badge
Mobile Device Security & Handling
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.
5 videos | 24m has Assessment available Badge
Mobile Security Technologies
Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Explore encryption and some practical use cases in the mobile enterprise.
16 videos | 54m has Assessment available Badge
Mobile Security Threat Mitigation
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore threat mitigation strategies and configurations in various environments.
18 videos | 1h 1m has Assessment available Badge
Containers & Wrappers
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.
7 videos | 23m available Badge
Configuring Enterprise-level Security
Mobile Device Management (MDM) platforms can lock down all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. Explore a model for enterprise mobile security, including Intune and System Center Configuration Manager.
16 videos | 1h 12m available Badge
Understanding Mobile Devices, Information Security, and Social Trend
As organizations continue to evolve, they must focus on key trends including mobility, information security, and social capabilities. In this course, you explore mobile trends and how mobility can impact a business. Discover how mobility incorporates mobile communication, hardware, and applications, and explore potential challenges organizations face when implementing mobile solutions. You'll also explore information security factors brought forward by the increased use of networks, computers, and mobiles. Discover how information security can protect physical and digital assets from theft, compromise, alteration, destruction, and unwanted manipulation, and explore potential challenges organizations face when implementing a security solution. You'll also learn about social trends including social networking and social media components. Lastly, explore how organizations are focusing on social trends including brand awareness, digital advertising, customer experience, and lead conversion. This course was originally created by Global Knowledge (GK).
18 videos | 1h 1m available Badge
Infrastructure Security
Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.
9 videos | 37m


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.



Managing Online Risk: Apps, Mobile, and Social Media Security
Including case studies, checklists, and policy samples, this book presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.
book Duration 6h 44m book Authors By Deborah Gonzalez


Wireless Mobile Internet Security, Second Edition
Presenting readers with an intimate sense of how mobile internet systems operate and how to address complex security issues, this book covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems.
book Duration 9h 14m book Authors By Man Young Rhee


Securing Mobile Devices
Explaining that applying COBIT 5 to mobile device security establishes a uniform management framework, this book offers guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.
book Duration 2h 12m book Authors By ISACA


Android Security Internals: An In-Depth Guide to Android's Security Architecture
Taking us under the hood of the Android security system, this book describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
book Duration 7h 31m book Authors By Nikolay Elenkov


iOS Penetration Testing: A Definitive Guide to iOS Security
Unearthing some of the most significant attacks threatening iOS applications in recent times, this book will teach you the methods of patching them to make payment transactions and personal data sharing more secure.
book Duration 1h 38m book Authors By Kunal Relan


Mobile Application Security with Open-Source Tools
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article examines insecure applications deployed in production systems as one of the most overlooked aspects in mobile security.
book Duration 29m book Authors By Sakthivel Rajendran


Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
An essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
book Duration 2h 46m book Authors By Philip Chukwuma, Richard Cozart, Sajay Rai


Security of Mobile Communications
Providing technicians and designers with a critical, comprehensive resource, this guide goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are secure.
book Duration 13h 33m book Authors By Noureddine Boudriga


Channel Windows Mobile
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)