YoVDO

Learning Mobile Device Security

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Hardware Security Courses Mobile Device Management Courses Mobile Device Security Courses Two-Factor Authentication Courses Android Security Courses iOS Security Courses

Course Description

Overview

Get a practical, hands-on approach to mobile security: securing your Android or iOS phone against hackers, thieves, and snoops.

Syllabus

Introduction
  • Securing mobile devices
  • What you should know
1. Considering the Need for Security
  • Risks of technology
  • Risks of mobile devices
  • Acquire a device securely
  • Dispose of a device securely
  • Dispose of an Android device
  • Dispose of an iOS device
  • The layers of mobile device security
  • Securing mobile accounts
  • Securing device access
  • Securing device backups
2. Securing an Android Device
  • Set up a Google Play account
  • Set up a Google family account
  • Securing device access
  • Updating Android software
  • Lock screen security for Android
  • Enable Find My Mobile security
  • Android backup and restore
  • Set up two-factor authentication
3. Securing an iOS Device
  • Set up an Apple ID
  • Security for iTunes Family Sharing accounts
  • Securing device access
  • Update iOS software
  • Lock screen security
  • Find My iPhone
  • iOS privacy options
  • iOS security through careful use and Screen Time
  • Set up two-factor authentication
  • iOS backup and restore
4. Security through Mobile Management
  • Defining a managed mobile device
  • Understanding Apple Business Manager
  • Understanding Android Enterprise
5. Securing Device Hardware
  • Understanding mobile device hardware risk
  • Cameras and microphones
  • Screen protectors
  • Sensors and radios
  • Design for security
Conclusion
  • Next steps

Taught by

Ryan Spence

Related Courses

CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent
Securing Android Apps
LinkedIn Learning
Android Security: Inter-app and Network Communication Security
Pluralsight
Android Security: Effective Permission Handling
Pluralsight
Ethical Hacking: Hacking Mobile Platforms
Pluralsight