This course is designed to provide a better understanding of security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs.
Using scenarios, thought challenges and exercises as a framework, students will learn about:
- the purpose of Enterprise Mobile Management platforms
- elements that make mobile networks and operating systems different
- mobile malware classifications and detection strategies
- mobile architecture data leakage detection and prevention strategies.
Target Audience
Government and business administrative employees who have managerial or supervisory responsibilities to develop policies and decisions regarding computer accessibility, IT personnel (including National Critical Sector Services personnel) with responsibilities in identifying and recommending authentication network standards.
Prerequisites
Learners should possess basic Windows user skills; a fundamental knowledge of computer networking concepts; and a fundamental knowledge of applications found on mobile devices.