Enterprise Strength Mobile Device Security

Use mobile devices securely in business scenarios.
Course info
Rating
(35)
Level
Intermediate
Updated
Jan 8, 2015
Duration
5h 4m
Table of contents
Getting a Grip on Mobile Security
Security Threat Discussion
Cryptography Primer
Defining Requirements for Secure Mobile Devices
Defining Requirements for a Secure Mobile Backend Infrastructure
Risk Mitigation Strategies
Technologies Able to Satisfy Security/Mitigation Requirements
Reaching Enterprise Security
Description
Course info
Rating
(35)
Level
Intermediate
Updated
Jan 8, 2015
Duration
5h 4m
Description

Mobile devices have changed the way we use IT-services fundamentally over the last few years, but from a business perspective these consumer-focused devices carry substantial risks and are open to many security threats. This course creates awareness of the many common security threats for businesses in mobile scenarios, and delivers pragmatic approaches to secure your enterprise.

About the author
About the author

Alexander Wechsler has been working many years doing project and partner management for customers in the enterprise and embedded market. Many of his projects turned into showcases for the successful use of modern software technology.