Mobile Device Security & Handling
- 5 Videos | 24m 58s
- Includes Assessment
- Earns a Badge
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.
WHAT YOU WILL LEARN
describe requirements for secure device data handlingdescribe requirements for secure device authorization and authenticationdescribe requirements for secure device sensors, jailbreaking, and mobile device management systems
describe requirements for secure device connectivity and appsdescribe requirements for users of secure devices
IN THIS COURSE
1.Secure Device Data-handling Requirements4m 9sUP NEXT
2.Device Authorization and Authentication Requirements5m 42s
3.Device Sensor, Jailbreak, & MDM System Requirements6m 27s
4.Secure Device Connectivity and App Requirements5m 46s
5.Secure Device User Requirements2m 54s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.