From the course: Learning Mobile Device Security
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Risks of technology
- With mobile technology, we can instantaneously communicate with anyone, any where in the world, record and share creations, or even look deep into the workings of our own bodies to see our biological past and future. Technology enables us to do things that were science fiction just a decade ago. My day-to-day activities are supported by at least two computers working in tandem at all times. My watch, smartphone, and car are constantly connected with the internet. They keep me in the know, so I can manage my schedule and stay on top of my day. These computers connect me with my friends, family, and coworkers all over the world. Computers in my car make it possible for the car to park itself, track and direct me to a destination, and even connect me to my favorite music. It is now a common assumption that our lives will have computers embedded in ever part of them with a promise of freeing up time, creating new opportunities, or giving new choices. The assumption is no longer can I…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Risks of technology2m 5s
-
(Locked)
Risks of mobile devices1m 31s
-
(Locked)
Acquire a device securely3m 6s
-
Dispose of a device securely1m 52s
-
(Locked)
Dispose of an Android device46s
-
(Locked)
Dispose of an iOS device47s
-
(Locked)
The layers of mobile device security1m
-
(Locked)
Securing mobile accounts2m 6s
-
(Locked)
Securing device access2m 42s
-
(Locked)
Securing device backups1m 22s
-
(Locked)
-
-
-
-
-