Mobile Device Security & Handling

Intermediate
  • 5 Videos | 27m 28s
  • Includes Assessment
  • Earns a Badge
Likes 24 Likes 24
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.

WHAT YOU WILL LEARN

  • describe requirements for secure device data handling
    describe requirements for secure device authorization and authentication
    describe requirements for secure device sensors, jailbreaking, and mobile device management systems
  • describe requirements for secure device connectivity and apps
    describe requirements for users of secure devices

IN THIS COURSE

  • Playable
    1. 
    Secure Device Data-handling Requirements
    4m 9s
    UP NEXT
  • Playable
    2. 
    Device Authorization and Authentication Requirements
    5m 42s
  • Locked
    3. 
    Device Sensor, Jailbreak, & MDM System Requirements
    6m 27s
  • Locked
    4. 
    Secure Device Connectivity and App Requirements
    5m 46s
  • Locked
    5. 
    Secure Device User Requirements
    2m 54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 137 Likes 137  
Likes 3 Likes 3  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 287 Likes 287  
Likes 172 Likes 172