Course
Skills Expanded
Enterprise Strength Mobile Device Security
Use mobile devices securely in business scenarios.
What you'll learn
Mobile devices have changed the way we use IT-services fundamentally over the last few years, but from a business perspective these consumer-focused devices carry substantial risks and are open to many security threats. This course creates awareness of the many common security threats for businesses in mobile scenarios, and delivers pragmatic approaches to secure your enterprise.
Table of contents
Getting a Grip on Mobile Security
19mins
Security Threat Discussion
39mins
Cryptography Primer
45mins
Defining Requirements for Secure Mobile Devices
23mins
Defining Requirements for a Secure Mobile Backend Infrastructure
32mins
Risk Mitigation Strategies
47mins
Technologies Able to Satisfy Security/Mitigation Requirements
41mins
Reaching Enterprise Security
52mins
- Introduction 2m
- Filling Our Architecture with Life 9m
- Enrolling Devices - Intune 7m
- Targeting User - Intune 2m
- Enforce Configurations - Intune 3m
- Deploy Certificates - Intune 3m
- Deploy Enterprise Profiles - Intune 2m
- Distribute Apps - Intune 4m
- Protect Data - Intune 3m
- Introducing SCCM / Intune 5m
- SCCM / Intune - Demo 11m
- Summary 2m