Course: Securing Mobile Devices in the Enterprise

$199.00
$240.79 incl. vat

duration: 10 hours |

Language: English (US) |

access duration: 90 days |

Details

In this mobile security training course you will learn the best opportunities that exist for securing mobile devices. You will learn the ten most common security problems of mobile devices alinged with the OWASP. You will learn about encryption and back-end hardening for mobile systems. Finally you will learn to suppress unavoidable risks and the impact as small as possible and you get an introdution about the Intune and System Center Configuration Manager on an enterprise level related to mobile security.

Result

After finishing this course you will be familiar with the possibilities of securing mobile devices.

Prerequisites

There is no specific knowledge required.

Target audience

Security Specialist

Content

Securing Mobile Devices in the Enterprise

10 hours

Securing Mobile Devices in the Enterprise: Mobile Security Threats

  • |INS start the course |/INS
  • describe current mobile devices and form factors
  • describe the current state of mobile device security
  • describe mobile security considerations
  • describe the process to determine risk in a mobile environment
  • describe sensitive mobile assets
  • describe sensitive usage scenarios for mobile devices
  • describe how mobile data is stored and transported
  • list the OWASP top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systems
  • describe how insecure data storage affects mobile device front-end and back-end systems
  • describe how insufficient transport layer protection affects mobile device front-end and back-end systems
  • describe how unintended data leakage affects mobile device front-end and back-end systems
  • describe how poor authorization and authentication affects mobile device front-end and back-end systems
  • describe how broken cryptography affects mobile device front-end and back-end systems
  • describe how client-side injection affects mobile device front-end systems
  • describe how security decisions via untrusted inputs affect mobile device back-end systems
  • describe how improper session handling affects mobile device front-end systems
  • describe how lack of binary protections affects mobile device front-end systems
  • describe the potential technical impacts of mobile exploits
  • describe the potential business impacts of mobile exploits
  • describe requirements for secure device data handling
  • describe requirements for secure device authorization and authentication
  • describe requirements for secure device sensors, jailbreaking, and mobile device management systems
  • describe requirements for secure device connectivity and apps
  • describe requirements for users of secure devices
  • assess threats from OWASP top 10 and their impact on mobile systems

Securing Mobile Devices in the Enterprise: Mobile Security Technologies

  • start the course
  • describe usage scenarios for cryptography
  • describe the theory of one-way cryptographic functions and hashes
  • describe hashing and identify the main hashing algorithms
  • perform hashing using Windows PowerShell
  • describe symmetric encryption
  • describe asymmetric encryption and its common uses
  • encrypt and decrypt a message using OpenSSL
  • describe digital signing
  • perform digital signing using OpenSSL
  • describe key distribution in cryptographic systems
  • describe digital certificates and the process of issuing certificates in a CA system
  • create a certificate in Visual Studio makecert
  • describe requirements for back-end security for mobile applications
  • describe measures to harden services for mobile applications
  • describe requirements for securing app mobile app deployment
  • describe measures to protect mobile apps at the transport layer
  • describe infrastructure security requirements to support secure mobile apps
  • describe the architecture of a demilitarized zone to protect mobile app services
  • describe the use of a reverse proxy in protecting mobile app back-end services
  • describe processes for securing directory services and certificate authorities used in mobile app back-end systems
  • describe the use of S/MIME to secure e-mail in the enterprise
  • describe the use of rights management systems to secure document content
  • describe measures to protect data in transit and at rest
  • describe the use of mobile device management systems to fully manage secure mobile devices
  • describe threats to back-end systems, and strategies to mitigate them

Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation

  • start the course
  • describe the requirements for establishing a mobile enterprise
  • describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy
  • describe mitigation strategies for unmanaged devices in a small organization
  • describe mitigation strategies for unmanaged company-owned devices
  • describe appropriate user policies for risk mitigation with unmanaged devices
  • configure security settings on unmanaged Android devices
  • configure security settings on |INS |/INS unmanaged iPhone and iPad iOS devices
  • configure security settings on |INS |/INS unmanaged Windows Phone devices
  • describe requirements for secure cloud storage
  • use Boxcryptor to encrypt and secure cloud data
  • describe Microsoft Exchange ActiveSync functionality for managing mobile devices
  • configure Office 365 Exchange ActiveSync to manage mobile devices
  • describe challenges with transport layer security, and how they can be solved with short-lived session keys and perfect forward secrecy
  • configure perfect forward secrecy in Internet Information Services
  • describe virtual private networks for securing network connections
  • connect a mobile device to a VPN server
  • describe BYOD containers for segregating data on BYOD devices
  • describe usage scenarios for BYOD containers
  • configure BYOD containers using Good Work
  • describe security functionality offered by app wrapper technologies for mobile devices
  • describe methods to mitigate malicious functionality in mobile apps
  • describe methods to mitigate code vulnerabilities in mobile apps
  • describe Microsoft Azure Rights Management cloud-based rights management system
  • configure Microsoft Azure Rights Management System to protect confidential documents
  • describe mitigation strategies for BYOD and COD devices in the enterprise

Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security

  • start the course
  • describe network architecture challenges for securing enterprise mobile devices
  • describe a solution for enterprise mobile device security challenges based on Microsoft's product portfolio
  • create an account for Microsoft Intune
  • navigate the Microsoft Intune interface
  • enroll devices in Microsoft Intune
  • target devices in Microsoft Intune
  • enforce configurations in Microsoft Intune
  • handle certificates in Microsoft Intune
  • deploy enterprise profiles in Microsoft Intune
  • distribute apps in Microsoft Intune
  • protect data in Microsoft Intune
  • describe Microsoft System Center Configuration Manager and Intune interoperability
  • configure the Microsoft Intune Connector Role
  • prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager
  • prepare for iOS device enrollment in Microsoft System Center Configuration Manager
  • create an account on Microsoft Intune, enroll devices, and deploy enterprise profiles

Course options

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

read more about the order process

What is included?

Certificate of participation Yes
Monitor Progress Yes
Award Winning E-learning Yes
Mobile ready Yes
Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact