Join Ryan Spence for an in-depth discussion in this video Acquire a device securely, part of Learning Mobile Device Security.
- [Instructor] The popularity of smart devices…is a $450 billion annual market.…The demand is so great that the value of a new smart device…extends well beyond the manufacturer's support.…Therefore, a large secondary supply is available…for those who either cannot afford…or obtain a new device from the manufacturer.…These secondary markets are a compelling…channel for users and organizations…who are motivated to avoid new devices;…however, they are also a source of vulnerability.…
Therefore, security must begin with how…you acquire your mobile device.…As with any strong market, the mobile device…market has traditional sales channels…as well as nontraditional sales channels.…Traditional sales channels usually include licensed…retailers, like Apple, Walmart, Best Buy, and Costco;…or service carriers, like T-Mobile,…Sprint, AT&T, and Verizon.…Nontraditional sales channels include…secondary market retail establishments…as well as online venues, like eBay and Craigslist.…
There are also secondary online markets…for used device acquisition, like Swappa and Zwee.…
Author
Released
1/9/2019- Risks of mobile devices
- Disposing of mobile devices
- Securing an Android device
- Securing an iOS device
- Mobile device management on iOS and Android
- Securing mobile device hardware
Skill Level Beginner
Duration
Views
Related Courses
-
Windows 10: Intune Device Management
with Ryan Spence1h 39m Intermediate -
Learning Android Security
with Dan Gookin1h 5m Beginner -
Learning iPhone and iPad Security
with Nick Brazzi1h 44m Beginner
-
Introduction
-
1. Considering the Need for Security
-
Risks of technology2m 5s
-
Risks of mobile devices1m 31s
-
Dispose of a device securely1m 52s
-
Securing mobile accounts2m 6s
-
Securing device access2m 42s
-
Securing device backups1m 22s
-
-
2. Securing an Android Device
-
Set up a Google Play account1m 21s
-
Securing device access1m 14s
-
-
3. Securing an iOS Device
-
Set up an Apple ID1m 22s
-
Securing device access1m 41s
-
Find My iPhone1m 1s
-
iOS privacy options1m 44s
-
iOS backup and restore1m 38s
-
-
4. Security through Mobile Management
-
5. Securing Device Hardware
-
Cameras and microphones3m 37s
-
Sensors and radios2m 28s
-
Conclusion
-
Next steps15s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Acquire a device securely