Infrastructure Security

Intermediate
  • 9 videos | 36m 5s
  • Includes Assessment
  • Earns a Badge
Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.

WHAT YOU WILL LEARN

  • Describe infrastructure security requirements to support secure mobile apps
    Describe the architecture of a demilitarized zone to protect mobile app services
    Describe the use of a reverse proxy in protecting mobile app back-end services
    Describe processes for securing directory services and certificate authorities used in mobile app back-end systems
    Describe the use of s/mime to secure e-mail in the enterprise
  • Describe the use of rights management systems to secure document content
    Describe measures to protect data in transit and at rest
    Describe the use of mobile device management systems to fully manage secure mobile devices
    Describe threats to back-end systems, and strategies to mitigate them

IN THIS COURSE

  • 4m 18s
  • 2m 44s
  • Locked
    3.  Reverse Proxy Features
    5m 34s
  • Locked
    4.  Securing Directory Services and CA
    3m 23s
  • Locked
    5.  Securing E-mail Services
    3m 58s
  • Locked
    6.  Rights Management Systems
    2m 47s
  • Locked
    7.  Protecting Data at Rest and in Transit
    4m 2s
  • Locked
    8.  Mobile Device Management Systems
    4m 6s
  • Locked
    9.  Exercise: Securing Back-end Systems
    5m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE