Mobile Security Administration: Intermediate

  • 7 Courses | 6h 32m 12s
  • 8 Books | 44h 7m
Likes 36 Likes 36
 
Mobile devices are everywhere, and they bring security concerns with them. Explore, in-depth, aspects of mobile security.

GETTING STARTED

Mobile Security Threats

  • Playable
    1. 
    Mobile Device Overview
    4m 7s
    NOW PLAYING
  • Playable
    2. 
    The Mobile Security Landscape
    5m 16s
    UP NEXT

COURSES INCLUDED

Mobile Security Threats
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices.
20 videos | 1h 30m
has Assessment available Badge
Mobile Device Security & Handling
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.
5 videos | 27m
has Assessment available Badge
Mobile Security Technologies
Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Explore encryption and some practical use cases in the mobile enterprise.
16 videos | 1h 1m
has Assessment available Badge
Infrastructure Security
Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.
9 videos | 40m
has Assessment available Badge
Mobile Security Threat Mitigation
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore threat mitigation strategies and configurations in various environments.
18 videos | 1h 10m
has Assessment available Badge
Containers & Wrappers
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.
7 videos | 25m
available Badge
Configuring Enterprise-level Security
Mobile Device Management (MDM) platforms can lock down all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. Explore a model for enterprise mobile security, including Intune and System Center Configuration Manager.
16 videos | 1h 16m
available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Managing Online Risk: Apps, Mobile, and Social Media Security
Including case studies, checklists, and policy samples, this book presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.
Book Duration 6h 44m
Book Authors By Deborah Gonzalez

Book

Wireless Mobile Internet Security, Second Edition
Presenting readers with an intimate sense of how mobile internet systems operate and how to address complex security issues, this book covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems.
Book Duration 9h 14m
Book Authors By Man Young Rhee

Book

Securing Mobile Devices
Explaining that applying COBIT 5 to mobile device security establishes a uniform management framework, this book offers guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.
Book Duration 2h 12m
Book Authors By ISACA

Book

Android Security Internals: An In-Depth Guide to Android's Security Architecture
Taking us under the hood of the Android security system, this book describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
Book Duration 7h 31m
Book Authors By Nikolay Elenkov

Book

iOS Penetration Testing: A Definitive Guide to iOS Security
Unearthing some of the most significant attacks threatening iOS applications in recent times, this book will teach you the methods of patching them to make payment transactions and personal data sharing more secure.
Book Duration 1h 38m
Book Authors By Kunal Relan

Book

Mobile Application Security with Open-Source Tools
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article examines insecure applications deployed in production systems as one of the most overlooked aspects in mobile security.
Book Duration 29m
Book Authors By Sakthivel Rajendran