Tags
Language
Tags
November 2025
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Pluralsight - Enterprise Strength Mobile Device Security (2015)

    Posted By: house23
    Pluralsight - Enterprise Strength Mobile Device Security (2015)

    Pluralsight - Enterprise Strength Mobile Device Security (2015)
    MP4 | AVC 367kbps | English | 1024x768 | 15fps | 5h 03mins | AAC stereo 119kbps | 963 MB
    Genre: Video Training

    Mobile devices have changed the way we use IT-services fundamentally over the last few years, but from a business perspective these consumer-focused devices carry substantial risks and are open to many security threats. This course creates awareness of the many common security threats for businesses in mobile scenarios, and delivers pragmatic approaches to secure your enterprise.

    Getting a Grip on Mobile Security
    Introduction
    Course Agenda and Introduction
    Understanding of Course Objectives
    Summary

    Security Threat Discussion
    Introduction and Sensitive Assets
    Risks on Mobile Devices
    Risks in Mobile Solution Backend Systems
    Exploit Impacts and Summary

    Cryptography Primer
    Introduction
    Cryptography
    Hashing Demo
    Encryption
    Encryption Demo
    Digital Signing
    Digital Signing Demo
    Certificates
    Certificates Demo
    Summary

    Defining Requirements for Secure Mobile Devices
    Introduction
    Device Requirements Part 1
    Device Requirements Part 2
    Device Requirements Part 3
    User Requirements and Summary

    Defining Requirements for a Secure Mobile Backend Infrastructure
    Introduction
    Hardening Applications and Services
    Transport Layer Security
    Building Secure Infrastructure
    Security Services
    Mobile Device Management and Summary

    Risk Mitigation Strategies
    Introduction
    Mitigation Strategies
    Unmanaged Device Stage
    Android Security Settings Demo
    iOS Security Settings Demo
    Windows Phone Security Settings Demo
    Securing Cloud Storage
    Boxcryptor Demo
    Entering the Semi-managed Stage
    Exchange ActiveSync Demo
    Summary

    Technologies Able to Satisfy Security/Mitigation Requirements
    Introduction
    Securing Transport Layer
    Perfect Forward Secrecy Demo
    Virtual Private Networking
    VPN Demo
    BYOD Containers
    BYOD Container Demo
    Application Wrapper
    Application Security
    Rights Management Systems
    Azure RMS Demo
    Summary

    Reaching Enterprise Security
    Introduction
    Filling Our Architecture with Life
    Enrolling Devices - Intune
    Targeting User - Intune
    Enforce Configurations - Intune
    Deploy Certificates - Intune
    Deploy Enterprise Profiles - Intun
    Distribute Apps - Intune
    Protect Data - Intune
    Introducing SCCM / Intune
    SCCM / Intune - Demo
    Summary

    Pluralsight - Enterprise Strength Mobile Device Security (2015)

    Pluralsight - Enterprise Strength Mobile Device Security (2015)

    Pluralsight - Enterprise Strength Mobile Device Security (2015)


    No mirrors please