From the course: Learning Mobile Device Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Acquire a device securely
From the course: Learning Mobile Device Security
Acquire a device securely
- [Instructor] The popularity of smart devices is a $450 billion annual market. The demand is so great that the value of a new smart device extends well beyond the manufacturer's support. Therefore, a large secondary supply is available for those who either cannot afford or obtain a new device from the manufacturer. These secondary markets are a compelling channel for users and organizations who are motivated to avoid new devices; however, they are also a source of vulnerability. Therefore, security must begin with how you acquire your mobile device. As with any strong market, the mobile device market has traditional sales channels as well as nontraditional sales channels. Traditional sales channels usually include licensed retailers, like Apple, Walmart, Best Buy, and Costco; or service carriers, like T-Mobile, Sprint, AT&T, and Verizon. Nontraditional sales channels include secondary market retail establishments as well as online venues, like eBay and Craigslist. There are also…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Risks of technology2m 5s
-
(Locked)
Risks of mobile devices1m 31s
-
(Locked)
Acquire a device securely3m 6s
-
Dispose of a device securely1m 52s
-
(Locked)
Dispose of an Android device46s
-
(Locked)
Dispose of an iOS device47s
-
(Locked)
The layers of mobile device security1m
-
(Locked)
Securing mobile accounts2m 6s
-
(Locked)
Securing device access2m 42s
-
(Locked)
Securing device backups1m 22s
-
(Locked)
-
-
-
-
-