Containers & Wrappers

  • 7 Videos | 25m 44s
  • Earns a Badge
Likes 10 Likes 10
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.

WHAT YOU WILL LEARN

  • describe BYOD containers for segregating data on BYOD devices
    describe usage scenarios for BYOD containers
    configure BYOD containers using Good Work
    describe security functionality offered by app wrapper technologies for mobile devices
  • describe methods to mitigate malicious functionality in mobile apps
    describe methods to mitigate code vulnerabilities in mobile apps
    describe mitigation strategies for BYOD and COD devices in the enterprise

IN THIS COURSE

  • Playable
    1. 
    BYOD Containers
    3m 5s
    UP NEXT
  • Playable
    2. 
    BYOD Container Usage Scenarios
    3m 11s
  • Locked
    3. 
    Configuring BYOD Containers
    3m 2s
  • Locked
    4. 
    Application Wrapper Overview
    2m 52s
  • Locked
    5. 
    Mitigating Malicious App Functionality
    4m 27s
  • Locked
    6. 
    Mitigating Code Vulnerabilities in Apps
    3m 3s
  • Locked
    7. 
    Exercise: Mitigating Threat for BYOD and COD Devices
    3m 33s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 244 Likes 244  
Likes 112 Likes 112