- 9 videos | 36m 5s
- Includes Assessment
- Earns a Badge
Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.
WHAT YOU WILL LEARN
describe infrastructure security requirements to support secure mobile appsdescribe the architecture of a demilitarized zone to protect mobile app servicesdescribe the use of a reverse proxy in protecting mobile app back-end servicesdescribe processes for securing directory services and certificate authorities used in mobile app back-end systemsdescribe the use of S/MIME to secure e-mail in the enterprise
describe the use of rights management systems to secure document contentdescribe measures to protect data in transit and at restdescribe the use of mobile device management systems to fully manage secure mobile devicesdescribe threats to back-end systems, and strategies to mitigate them
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
Channel Security Trends
Channel Wintellect IT Security
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE