Mobile Device Security & Handling

  • 5 Videos | 27m 28s
  • Includes Assessment
  • Earns a Badge
Likes 24 Likes 24
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.

WHAT YOU WILL LEARN

  • describe requirements for secure device data handling
    describe requirements for secure device authorization and authentication
    describe requirements for secure device sensors, jailbreaking, and mobile device management systems
  • describe requirements for secure device connectivity and apps
    describe requirements for users of secure devices

IN THIS COURSE

  • Playable
    1. 
    Secure Device Data-handling Requirements
    4m 9s
    UP NEXT
  • Playable
    2. 
    Device Authorization and Authentication Requirements
    5m 42s
  • Locked
    3. 
    Device Sensor, Jailbreak, & MDM System Requirements
    6m 27s
  • Locked
    4. 
    Secure Device Connectivity and App Requirements
    5m 46s
  • Locked
    5. 
    Secure Device User Requirements
    2m 54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 115 Likes 115  
Likes 13 Likes 13  
Likes 96 Likes 96  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 463 Likes 463  
Likes 287 Likes 287  
Likes 85 Likes 85