Mobile Security Threat Mitigation
Intermediate
- 18 Videos | 1h 1m 23s
- Includes Assessment
- Earns a Badge
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore threat mitigation strategies and configurations in various environments.
WHAT YOU WILL LEARN
-
describe the requirements for establishing a mobile enterprisedescribe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategydescribe mitigation strategies for unmanaged devices in a small organizationdescribe mitigation strategies for unmanaged company-owned devicesdescribe appropriate user policies for risk mitigation with unmanaged devicesconfigure security settings on-device for unmanaged Android devicesconfigure security settings on-device for unmanaged iPhone and iPad iOS devicesconfigure security settings on-device for unmanaged Windows Phone devicesdescribe requirements for secure cloud storage
-
use Boxcryptor to encrypt and secure cloud datadescribe Microsoft Exchange ActiveSync functionality for managing mobile devicesconfigure Office 365 Exchange ActiveSync to manage mobile devicesdescribe challenges with transport layer security, and how they can be solved with short-lived session keys and perfect forward secrecyconfigure perfect forward secrecy in Internet Information Servicesdescribe virtual private networks for securing network connectionsconnect a mobile device to a VPN serverdescribe Microsoft Azure Rights Management cloud-based rights management systemconfigure Microsoft Azure Rights Management System to protect confidential documents
IN THIS COURSE
-
1.Requirements for the Mobile Enterprise3m 23sUP NEXT
-
2.Mobile Device Ownership Models2m 44s
-
3.Unmanaged Devices in a Small Organization3m 11s
-
4.Unmanaged Company-owned Devices3m 41s
-
5.Unmanaged Device User Policies3m 41s
-
6.Configuring Unmanaged Android Devices3m 4s
-
7.Configuring Unmanaged iOS Devices4m 58s
-
8.Configuring Unmanaged Windows Phone Devices3m 34s
-
9.Secure Cloud Storage4m 1s
-
10.Encrypting Cloud Data3m 25s
-
11.Exchange ActiveSync Functionality2m 15s
-
12.Managing Devices with Exchange Active Sync3m 8s
-
13.Short-lived Session Keys4m 5s
-
14.Configuring Perfect Forward Secrecy2m 58s
-
15.Virtual Private Networking Overview3m 13s
-
16.Configuring Virtual Private Networks2m 29s
-
17.Microsoft Azure Rights Management Overview3m 38s
-
18.Protecting Content with Microsoft Azure RMS3m 54s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.