YoVDO

End User Mobile Security

Offered By: Cybrary

Tags

Mobile Security Courses

Course Description

Overview

Many organizations have begun allowing employees to use their personal devices for work purposes. Although convenient for users, the concept of Bring your Own Device (BYOD) has opened companies up to many security issues.

Therefore, users must know the risks of having personal mobile devices in the office and the best practices for mitigating those risks. This course is designed with the end-user in mind, and serves as the ideal starting point for anyone looking to enter the cyber security field and ultimately raise their threat awareness.

Through this curriculum, you will learn the differences between the security considerations for personal and work devices and the importance of following company policy when using personal devices at work. You will also gain a thorough understanding of what device permissions are and how/when to use them to keep your mobile device free of malware. The course also explores rooting and jailbreaking testing methods and how these methods should not be used for personal devices.

Prerequisites

For this course you need no special previous knowledge.

Course Goals

By the end of this course, students should be able to:

  • The importance of mobile device security?
  • What kind of threats are directed towards mobile devices?
  • Points where you should apply security measures on mobile devices?
  • How should mobile device security be organized?

Syllabus

  • End User Mobile Security
    • Introduction
    • Importance of Mobile Security
    • Hacking Different Types of Mobile Devices Part 1
    • Hacking Different Types of Mobile Devices Part 2
    • Responsibilities for Mobile Security
    • How to Secure Mobile Devices Part 1
    • How to Secure Mobile Devices Part 2
    • Recap

Taught by

Milan Cetic

Related Courses

Check Point Jump Start: Harmony Mobile
Checkpoint via Coursera
Check Point Jump Start: Harmony Mobile
Checkpoint via edX
Next-Gen Security: Mobile, IoT, and Cloud
University System of Maryland via edX
Advanced Cybersecurity
LearnKartS via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera