Course details

Securing Mobile Devices in the Enterprise: Mobile Security Technologies

Securing Mobile Devices in the Enterprise: Mobile Security Technologies

Target Audience
Expected Duration
Lesson Objectives
Course Number
Expertise Level

Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Requirements for a hardened back-end infrastructure are magnified by mobile units as these go-anywhere devices provide attackers with a potentially simple route into your back-end network. In this course, you will learn about encryption, some practical use cases in the mobile enterprise, and back-end hardening for mobile systems.

Target Audience
Enterprise network engineers and managers; network security engineers and managers; anyone tasked with providing secure access to company resources from mobile devices


Expected Duration (hours)

Lesson Objectives

Securing Mobile Devices in the Enterprise: Mobile Security Technologies

  • start the course
  • describe usage scenarios for cryptography
  • describe the theory of one-way cryptographic functions and hashes
  • describe hashing and identify the main hashing algorithms
  • perform hashing using Windows PowerShell
  • describe symmetric encryption
  • describe asymmetric encryption and its common uses
  • encrypt and decrypt a message using OpenSSL
  • describe digital signing
  • perform digital signing using OpenSSL
  • describe key distribution in cryptographic systems
  • describe digital certificates and the process of issuing certificates in a CA system
  • create a certificate in Visual Studio makecert
  • describe requirements for back-end security for mobile applications
  • describe measures to harden services for mobile applications
  • describe requirements for securing app mobile app deployment
  • describe measures to protect mobile apps at the transport layer
  • describe infrastructure security requirements to support secure mobile apps
  • describe the architecture of a demilitarized zone to protect mobile app services
  • describe the use of a reverse proxy in protecting mobile app back-end services
  • describe processes for securing directory services and certificate authorities used in mobile app back-end systems
  • describe the use of S/MIME to secure e-mail in the enterprise
  • describe the use of rights management systems to secure document content
  • describe measures to protect data in transit and at rest
  • describe the use of mobile device management systems to fully manage secure mobile devices
  • describe threats to back-end systems, and strategies to mitigate them
  • Course Number:

    Expertise Level