Containers & Wrappers
Intermediate
- 7 videos | 23m 14s
- Earns a Badge
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.
WHAT YOU WILL LEARN
-
describe BYOD containers for segregating data on BYOD devicesdescribe usage scenarios for BYOD containersconfigure BYOD containers using Good Workdescribe security functionality offered by app wrapper technologies for mobile devices
-
describe methods to mitigate malicious functionality in mobile appsdescribe methods to mitigate code vulnerabilities in mobile appsdescribe mitigation strategies for BYOD and COD devices in the enterprise
IN THIS COURSE
-
1.BYOD Containers3m 5sUP NEXT
-
2.BYOD Container Usage Scenarios3m 11s
-
3.Configuring BYOD Containers3m 2s
-
4.Application Wrapper Overview2m 52s
-
5.Mitigating Malicious App Functionality4m 27s
-
6.Mitigating Code Vulnerabilities in Apps3m 3s
-
7.Exercise: Mitigating Threat for BYOD and COD Devices3m 33s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.