Description: The final stage in moving toward a secure mobile enterprise requires the use of a mobile device management (MDM) platform. These management systems can lock down and govern all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. In this course, you will learn about a model for enterprise mobile security and two MDM systems from Microsoft – Intune and System Center Configuration Manager.

Target Audience: Enterprise network engineers and managers, network security engineers and managers, anyone tasked with providing secure access to company resources from mobile devices

Duration: 01:19

Description: Once you have identified threats to mobile security, the next step in creating the fully mobile-aware enterprise is to look at mitigation strategies. In this course, you will learn about threat mitigation in a small, unmanaged environment; in a semi-managed environment using Exchange ActiveSync; and in a fully managed environment using a mobile device management (MDM) solution. You will also learn about mitigation from a Bring Your Own Device (BYOD) and a company-owned device (COD) perspective.

Target Audience: Enterprise network engineers and managers, network security engineers and managers, anyone tasked with providing secure access to company resources from mobile devices

Duration: 01:36

Description: Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Requirements for a hardened back-end infrastructure are magnified by mobile units as these go-anywhere devices provide attackers with a potentially simple route into your back-end network. In this course, you will learn about encryption, some practical use cases in the mobile enterprise, and back-end hardening for mobile systems.

Target Audience: Enterprise network engineers and managers; network security engineers and managers; anyone tasked with providing secure access to company resources from mobile devices

Duration: 01:42

Description: Mobile security threats are among the most serious threats to the enterprise, as mobile attacks are often a gateway to a wider attack on connected resources. The Open Web Application Security Project tracks the top 10 security concerns for mobile devices and applications, and this course uses those risks as a basis for discussing mobile security. In this course, you will learn about some best practices for securely handling mobile devices.

Target Audience: Enterprise network engineers and managers; network security engineers and managers; anyone tasked with providing secure access to company resources from mobile devices

Duration: 01:57