CompTIA A+ Core 2: Mobile & Embedded Device Security

CompTIA A+    |    Beginner
  • 11 Videos | 59m 3s
  • Includes Assessment
  • Earns a Badge
As mobile technology evolves, so does the need for mobile device security. Mobile device security features protect data, including sensitive and private information, on mobile devices such as smartphones, tablets, and laptops. Learn about screen lock security features such as facial recognition, PIN codes, fingerprint, pattern, and swipe devices. Discover the benefits of remote wiping features, locator applications, and device encryption. Next, explore how operating system updates can help secure devices and patch vulnerabilities. Then discover features of remote backup applications, firewalls, and mobile anti-virus and anti-malware solutions. Lastly, you'll get an overview of policies and procedures as they relate to BYOD, profile security requirements, and Internet of Things (IoT) security. Upon completion of this course, you'll be able to outline common methods for securing mobile and embedded devices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify when and how to use mobile remote wiping features
    demonstrate how mobile operating system updates can patch and secure mobile and embedded devices
    recognize the benefits of mobile device encryption features
    recognize how to implement restrictions for failed login attempts on mobile devices
    recognize the importance of mobile policies and procedures documentation
  • provide an overview of Internet of Things (IoT) security as it relates to mobiles and embedded devices
    illustrate physical destruction techniques including drilling, shredding, degaussing, and incinerating
    list common recycling and repurposing best practices including erasing and formatting
    identify outsourcing concepts including third party vendors and certification of destruction
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 54s
    UP NEXT
  • Playable
    2. 
    Remote Wiping Features
    6m 34s
  • Locked
    3. 
    Updating Mobile Operating Systems
    6m 5s
  • Locked
    4. 
    Mobile Device Encryption
    6m 36s
  • Locked
    5. 
    Failed Login Attempts Restrictions
    5m 57s
  • Locked
    6. 
    Mobile Policies and Procedures
    6m 23s
  • Locked
    7. 
    Internet of Things (IoT) Security
    6m 58s
  • Locked
    8. 
    Physical Destruction Techniques
    5m 42s
  • Locked
    9. 
    Recycling and Repurposing
    5m 5s
  • Locked
    10. 
    Outsourcing Concepts
    6m 45s
  • Locked
    11. 
    Course Summary
    1m 5s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.