Join Ryan Spence for an in-depth discussion in this video What you should know, part of Learning Mobile Device Security.
- [Instructor] This course is for mobile device users. If you use a smartphone and are familiar with your device but have no device security experience, you should have no problem following along. Depending on your device, there are sections of this course that may not apply to you. For example, iOS users won't need to concern themselves with the Android chapter or vice versa. In this course, I show general recommendations for end users on personally owned devices. If your device is enrolled in a mobility program through a business or an organization, it would be wise to review the terms of that use for that program.
While my process may align with it or exceed it, your organization's program should take precedence over the recommendations I give here.
- Risks of mobile devices
- Disposing of mobile devices
- Securing an Android device
- Securing an iOS device
- Mobile device management on iOS and Android
- Securing mobile device hardware
Skill Level Beginner
Windows 10: Intune Device Managementwith Ryan Spence1h 39m Intermediate
Learning iPhone and iPad Securitywith Nick Brazzi1h 44m Beginner
1. Considering the Need for Security
2. Securing an Android Device
3. Securing an iOS Device
4. Security through Mobile Management
5. Securing Device Hardware
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.