Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. Knowing the embedded security solutions of the operating systems common to mobile devices can be part of a security baseline for these devices.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
25m
Skills Learned
After completing this online training course, students will be able to:
Describe the security concerns with BYOD
Describe mobile device security options
Any IT generalist
None
01. Secured Mobile Devices
- Threat of a BYOD Solution
- Creating BYOD Mobile Device Policies
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Describe the security concerns with BYOD
Describe mobile device security options
WHO SHOULD ATTEND
Any IT generalist
PREREQUISITES
None
COURSE OUTLINE
01. Secured Mobile Devices
- Threat of a BYOD Solution
- Creating BYOD Mobile Device Policies
SCHEDULE