Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 118043528

Securing Mobile Devices in the Enterprise Training

Item number: 118043528

Securing Mobile Devices in the Enterprise Training

159,00 192,39 Incl. tax

Securing Mobile Devices in the Enterprise Training Award-winning E-Learning course Extensive interactive videos with spoken text Certified teachers Practical exercises Certificate.

Read more
Discounts:
  • Buy 2 for €155,82 each and save 2%
  • Buy 3 for €154,23 each and save 3%
  • Buy 5 for €147,87 each and save 7%
  • Buy 10 for €143,10 each and save 10%
  • Buy 25 for €135,15 each and save 15%
  • Buy 50 for €124,02 each and save 22%
  • Buy 100 for €111,30 each and save 30%
  • Buy 200 for €79,50 each and save 50%
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

Securing Mobile Devices in the Enterprise E-Learning

Order this amazing, award-winning Securing Mobile Devices in the Enterprise E-Learning Training course online, 1 year 24/7 access to extensive interactive videos, speeches, hands-on tasks and progress monitoring. After the course you will receive a certificate of attendance.

The ongoing proliferation of mobile devices has caused us to rethink the way we implement enterprise security. Mobile devices don't run corporate operating systems. They can go anywhere, they have heterogeneous and ubiquitous network access, and they may not be owned or managed by the enterprise themselves. In this series of Skillsoft courses, you will learn about a methodical and practical approach to enterprise device security that considers all these factors.

Course content

Mobile Security Overview

Course: 16 Minutes

  • Course Introduction
  • The Mobile Security Landscape
  • Overview of Security

Device Risks

Course: 15 Minutes

  • Identifying Risks
  • Sensitive Mobile Assets
  • Sensitive Usage of Mobile Devices
  • Sensitive Data Storage and Transport

Device and Back-end Threats

Course: 46 Minutes

  • Weak Server-side Controls
  • Insecure Data Storage
  • Insufficient Transport Layer Protection
  • Unintended Data Leakage
  • Poor Authorization and Authentication
  • Broken Cryptography
  • Client-side Injection
  • Security Decisions via Untrusted Inputs
  • Improper Session Handling
  • Lack of Binary Protections

Impact of Exploits

Course: 7 Minutes

  • Technical Impacts of Exploits
  • Business Impacts of Exploits

Secure Device Requirements

Course: 26 Minutes

  • Secure Device Data-handling Requirements
  • Device Authorization and Authentication Requirements
  • Device Sensor, Jailbreak, & MDM System Requirements
  • Secure Device Connectivity and App Requirements
  • Secure Device User Requirements

Practice: Threats

Course: 5 Minutes

  • Exercise: Assessing Mobile Threats

Cryptography Overview

Course: 8 Minutes

  • Course Introduction
  • Cryptography Usage
  • Cryptography One-way Functions

Hashing and Encryption

Course: 17 Minutes

  • Hashing Overview
  • Performing Hashing
  • Symmetric Encryption Overview
  • Asymmetric Encryption Overview
  • Performing Encryption

Digital Signing and Certificates

Course: 21 Minutes

  • Digital Signing Overview
  • Performing Digital Signing
  • Key Distribution
  • Digital Certificates Overview
  • Creating Certificates

Hardened Applications and Infrastructure

Course: 52 Minutes

  • Back-end Security Requirements
  • Application Hardening
  • Secure App Deployment
  • Protecting the Transport Layer
  • Infrastructure Security Requirements
  • Building a Demilitarized Zone
  • Reverse Proxy Features
  • Securing Directory Services and CA
  • Securing E-mail Services
  • Rights Management Systems
  • Protecting Data at Rest and in Transit
  • Mobile Device Management Systems

Practice: Secure Back-end Systems

Course: 5 Minutes

  • Exercise: Securing Back-end Systems

Mitigation Strategies

Course: 21 Minutes

  • Course Introduction
  • Requirements for the Mobile Enterprise
  • Mobile Device Ownership Models
  • Unmanaged Devices in a Small Organization
  • Unmanaged Company-owned Devices
  • Unmanaged Device User Policies

Unmanaged Device Configuration

Course: 21 Minutes

  • Configuring Unmanaged Android Devices
  • Configuring Unmanaged iOS Devices
  • Configuring Unmanaged Windows Phone Devices
  • Secure Cloud Storage
  • Encrypting Cloud Data

Semi-managed Device Configuration

Course: 6 Minutes

  • Exchange ActiveSync Functionality
  • Managing Devices with Exchange ActiveSync

Implementing Transport Layer Security

Course: 14 Minutes

  • Short-lived Session Keys
  • Configuring Perfect Forward Secrecy
  • Virtual Private Networking Overview
  • Configuring Virtual Private Networks

Containers and Wrappers

Course: 22 Minutes

  • BYOD Containers
  • BYOD Container Usage Scenarios
  • Configuring BYOD Containers
  • Application Wrapper Overview
  • Mitigating Malicious App Functionality
  • Mitigating Code Vulnerabilities in Apps

Rights Management

Course: 9 Minutes

  • Microsoft Azure Rights Management Overview
  • Protecting Content with Microsoft Azure RMS

Practice: Threat Mitigation

Course: 4 Minutes

  • Exercise: Mitigating Threat for BYOD and COD Devices

Enterprise Implementation Example

Course: 10 Minutes

  • Course Introduction
  • Enterprise Mobile Device Security Challenges
  • Enterprise Mobile Device Security Model Solution

Configuring Microsoft Intune

Course: 44 Minutes

  • Creating a Microsoft Intune Account
  • Navigating Microsoft Intune
  • Enrolling Devices in Microsoft Intune
  • Targeting Devices in Microsoft Intune
  • Enforcing Configurations in Microsoft Intune
  • Handling certificates in Microsoft Intune
  • Deploy Enterprise Profiles in Microsoft Intune
  • Distribute Apps in Microsoft Intune
  • Protect Data in Microsoft Intune

System Center Configuration Manager

Course: 18 Minutes

  • System Center Configuration Manager Overview
  • Configuring the Microsoft Intune Connector Role
  • Preparing for Windows Mobile Device Enrollment
  • Preparing for iOS Mobile Device Enrollment

Practice: Microsoft Intune

Course: 7 Minutes

  • Exercise: Configuring Intune
Language English
Qualifications of the Instructor Certified
Course Format and Length Teaching videos with subtitles, interactive elements and assignments and tests
Lesson duration 6:33 Hours
Progress monitoring Yes
Access to Material 365 days
Technical Requirements Computer or mobile device, Stable internet connections Web browsersuch as Chrome, Firefox, Safari or Edge.
Support or Assistance Helpdesk and online knowledge base 24/7
Certification Certificate of participation in PDF format
Price and costs Course price at no extra cost
Cancellation policy and money-back guarantee We assess this on a case-by-case basis
Award Winning E-learning Yes
Tip! Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.
Total
10/10 (1 Reviews)

    "Veel geleerd! Super goede uitleg van OEM!"

    Zehra on 01 Mar 2021

Loading...

OEM Office Elearning Menu Trots Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is vereerd met de nominatie voor 'Beste Opleider van Nederland' door Springest by STUDYTUBE, een blijk van erkenning voor onze excellente trainingen en toewijding aan kwaliteitsonderwijs. Dank aan alle cursisten.

Reviews

Total
10/10 (1 Reviews)

    "Veel geleerd! Super goede uitleg van OEM!"

    Zehra on 01 Mar 2021

25.000+

Deelnemers getrained

Springest: 9.1 - Edubookers 8.9

Gemiddeld cijfer

3500+

Aantal getrainde bedrijven

20+

Jaren ervaring

Even more knowledge

Read our most recent articles

View blog