Join Ryan Spence for an in-depth discussion in this video The layers of mobile device security, part of Learning Mobile Device Security.
- [Instructor] In order to provide secure use…of any mobile device, we must consider…the cooperative layers of security provided to the user.…Layer one is account security.…Mobile devices interact with and are empowered…by their manufacturers through the use of cloud accounts.…These cloud accounts have their own set of security concerns…we will consider later in the course.…These accounts provide access to software,…device tracking, store email, store notes,…provide file storage and store contact lists.…
Layer two is device security.…The cooperative layers of the cloud accounts…is the access security options provided…on the device itself.…This layer controls access to the use of the device.…At this time, access security is provided…by passwords, finger prints, and facial recognition.…We will set up device access security in the coming videos.…It should be noted that ignoring this step…greatly exposes users to risk.…
- Risks of mobile devices
- Disposing of mobile devices
- Securing an Android device
- Securing an iOS device
- Mobile device management on iOS and Android
- Securing mobile device hardware
Skill Level Beginner
Windows 10: Intune Device Managementwith Ryan Spence1h 39m Intermediate
Learning iPhone and iPad Securitywith Nick Brazzi1h 44m Beginner
1. Considering the Need for Security
2. Securing an Android Device
3. Securing an iOS Device
4. Security through Mobile Management
5. Securing Device Hardware
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.