YoVDO

Windows 10 Features for a Mobile Workforce: Identity Management and Data Access

Offered By: Microsoft via edX

Tags

Information Technology Courses Cloud Computing Courses Data Protection Courses Identity Management Courses Windows 10 Courses

Course Description

Overview

The proliferation of consumer devices and ubiquitous information access is driving the enterprise away from a device-centric model centered on corporate-owned and provisioned devices to a bring-your-own-device (BYOD) model in which employees use their own devices to access corporate applications and data. Workers expect consistent access to corporate tools and data regardless of the type of device they’re using. They also want their corporate-issued technology and resources to look and behave like their personal technology—always on and always available from any device, from virtually anywhere.

An enterprise model that supports the use of consumer devices in the workplace and the ability to work from virtually anywhere and anytime must move from a device-focused view of IT management to one that’s people centric. In reality it is not the device that is mobile, it is the users.

It is important that the IT challenges of BYOD, Mobile device management, cloud computing, and hybrid identities be understood before one can understand how Windows 10 helps address those issues.


Syllabus

Week 1: Planning and Deploying Enterprise Services for a Mobile Workforce
Study the enterprise model that supports the use of consumer devices in the workplace and the ability to work from virtually anywhere and anytime must move from a device focused view of IT management to one that’s people centric. In reality it is not the device that is mobile, it is the users.

Week 2: Moving Your Identity to Azure

Regardless of the specific technologies that organizations use to implement cloud computing solutions, we will look at the essential characteristics that are part of a cloud computing solution.

Week 3: Building a Strategy to Enable a Mobile Workforce
In this module we look at the elements needing to be addressed for building enterprise strategy, i.e. Users, Devices, Data, and Apps. As well as the new business threats introduced in this mobile first world.

Week 4: Data Access and Protection
Here we look at various services and tools to allow secure access to corporate data.


Taught by

Philip E. Helsel and Kimberly Rasmusson-Anderson

Tags

Related Courses

Access Controls
(ISC)² via Coursera
Accessibilité numérique
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Administração de Sistemas e Serviços de Infraestrutura de TI
Cresça com o Google via Coursera
Administración de sistemas y servicios de infraestructura de TI
Crece con Google via Coursera
Administración de las Tecnologías de la Información
Universidad de Palermo via Coursera