Mobile Security Threat Mitigation

Intermediate
  • 18 videos | 1h 1m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 50 users Rating 4.5 of 50 users (50)
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore threat mitigation strategies and configurations in various environments.

WHAT YOU WILL LEARN

  • Describe the requirements for establishing a mobile enterprise
    Describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy
    Describe mitigation strategies for unmanaged devices in a small organization
    Describe mitigation strategies for unmanaged company-owned devices
    Describe appropriate user policies for risk mitigation with unmanaged devices
    Configure security settings on-device for unmanaged android devices
    Configure security settings on-device for unmanaged iphone and ipad ios devices
    Configure security settings on-device for unmanaged windows phone devices
    Describe requirements for secure cloud storage
  • Use boxcryptor to encrypt and secure cloud data
    Describe microsoft exchange activesync functionality for managing mobile devices
    Configure office 365 exchange activesync to manage mobile devices
    Describe challenges with transport layer security, and how they can be solved with short-lived session keys and perfect forward secrecy
    Configure perfect forward secrecy in internet information services
    Describe virtual private networks for securing network connections
    Connect a mobile device to a vpn server
    Describe microsoft azure rights management cloud-based rights management system
    Configure microsoft azure rights management system to protect confidential documents

IN THIS COURSE

  • 3m 23s
  • 2m 44s
  • Locked
    3.  Unmanaged Devices in a Small Organization
    3m 11s
  • Locked
    4.  Unmanaged Company-owned Devices
    3m 41s
  • Locked
    5.  Unmanaged Device User Policies
    3m 41s
  • Locked
    6.  Configuring Unmanaged Android Devices
    3m 4s
  • Locked
    7.  Configuring Unmanaged iOS Devices
    4m 58s
  • Locked
    8.  Configuring Unmanaged Windows Phone Devices
    3m 34s
  • Locked
    9.  Secure Cloud Storage
    4m 1s
  • Locked
    10.  Encrypting Cloud Data
    3m 25s
  • Locked
    11.  Exchange ActiveSync Functionality
    2m 15s
  • Locked
    12.  Managing Devices with Exchange Active Sync
    3m 8s
  • Locked
    13.  Short-lived Session Keys
    4m 5s
  • Locked
    14.  Configuring Perfect Forward Secrecy
    2m 58s
  • Locked
    15.  Virtual Private Networking Overview
    3m 13s
  • Locked
    16.  Configuring Virtual Private Networks
    2m 29s
  • Locked
    17.  Microsoft Azure Rights Management Overview
    3m 38s
  • Locked
    18.  Protecting Content with Microsoft Azure RMS
    3m 54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 7 users Rating 4.0 of 7 users (7)
Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Rating 4.4 of 34 users Rating 4.4 of 34 users (34)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 332 users Rating 4.4 of 332 users (332)
Rating 4.2 of 37 users Rating 4.2 of 37 users (37)
Rating 4.5 of 5370 users Rating 4.5 of 5370 users (5370)