Mobile Device Security & Handling

Intermediate
  • 5 videos | 24m 58s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 138 users Rating 4.5 of 138 users (138)
Mobile attacks are often a gateway to a wider attack on connected resources. Explore secure device data-handling, authorization and authentication, system requirements, and user requirements.

WHAT YOU WILL LEARN

  • Describe requirements for secure device data handling
    Describe requirements for secure device authorization and authentication
    Describe requirements for secure device sensors, jailbreaking, and mobile device management systems
  • Describe requirements for secure device connectivity and apps
    Describe requirements for users of secure devices

IN THIS COURSE

  • 4m 9s
  • 5m 42s
  • Locked
    3.  Device Sensor, Jailbreak, & MDM System Requirements
    6m 27s
  • Locked
    4.  Secure Device Connectivity and App Requirements
    5m 46s
  • Locked
    5.  Secure Device User Requirements
    2m 54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 324 users Rating 4.4 of 324 users (324)
Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Rating 4.4 of 281 users Rating 4.4 of 281 users (281)