Upon completing this course, you will have learned how to:
– Create an effective mobile device security strategy and policy with compliance
– Identify potential threats and motives for mobile device attacks, targets, sources, and methods used
– Understand likely consequences of a security breach
-Conduct a risk assessment
– Identify the differences between mobile device management and mobile application management as well as the differences between agent-based and agentless control
The use of mobile devices for everyday business is increasing. This means that organizations need to take a new look at their data security policies. Specifically, those that allow the use of mobile devices to access corporate networks. Regardless of whether employees use their own devices or corporate-issued devices, security will continue to be a challenge. This course discusses several different types of threats inherent to mobile work environments and offers strategies to help prevent sensitive corporate data from being accessed should your mobile environment become compromised.