Mobile Device Security & Handling

Intermediate
  • 5 Videos | 24m 58s
  • Includes Assessment
  • Earns a Badge
Likes 39 Likes 39
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.

WHAT YOU WILL LEARN

  • describe requirements for secure device data handling
    describe requirements for secure device authorization and authentication
    describe requirements for secure device sensors, jailbreaking, and mobile device management systems
  • describe requirements for secure device connectivity and apps
    describe requirements for users of secure devices

IN THIS COURSE

  • Playable
    1. 
    Secure Device Data-handling Requirements
    4m 9s
    UP NEXT
  • Playable
    2. 
    Device Authorization and Authentication Requirements
    5m 42s
  • Locked
    3. 
    Device Sensor, Jailbreak, & MDM System Requirements
    6m 27s
  • Locked
    4. 
    Secure Device Connectivity and App Requirements
    5m 46s
  • Locked
    5. 
    Secure Device User Requirements
    2m 54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 62 Likes 62  
Likes 108 Likes 108  
Likes 74 Likes 74  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 60 Likes 60  
Likes 12 Likes 12  
Likes 37 Likes 37