Containers & Wrappers

Intermediate
  • 7 videos | 23m 14s
  • Earns a Badge
Rating 4.7 of 22 users Rating 4.7 of 22 users (22)
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.

WHAT YOU WILL LEARN

  • Describe byod containers for segregating data on byod devices
    Describe usage scenarios for byod containers
    Configure byod containers using good work
    Describe security functionality offered by app wrapper technologies for mobile devices
  • Describe methods to mitigate malicious functionality in mobile apps
    Describe methods to mitigate code vulnerabilities in mobile apps
    Describe mitigation strategies for byod and cod devices in the enterprise

IN THIS COURSE

  • 3m 5s
  • 3m 11s
  • Locked
    3.  Configuring BYOD Containers
    3m 2s
  • Locked
    4.  Application Wrapper Overview
    2m 52s
  • Locked
    5.  Mitigating Malicious App Functionality
    4m 27s
  • Locked
    6.  Mitigating Code Vulnerabilities in Apps
    3m 3s
  • Locked
    7.  Exercise: Mitigating Threat for BYOD and COD Devices
    3m 33s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.5 of 43 users Rating 4.5 of 43 users (43)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 7019 users Rating 4.6 of 7019 users (7019)
Rating 4.6 of 277 users Rating 4.6 of 277 users (277)
Rating 4.2 of 144 users Rating 4.2 of 144 users (144)