Securing Mobile Devices in the Enterprise: Mobile Security Technologies
Securing Mobile Devices in the Enterprise: Mobile Security Technologies
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Requirements for a hardened back-end infrastructure are magnified by mobile units as these go-anywhere devices provide attackers with a potentially simple route into your back-end network. In this course, you will learn about encryption, some practical use cases in the mobile enterprise, and back-end hardening for mobile systems.
Target Audience
Enterprise network engineers and managers; network security engineers and managers; anyone tasked with providing secure access to company resources from mobile devices
Prerequisites
None
Expected Duration (hours)
1.7
Lesson Objectives Securing Mobile Devices in the Enterprise: Mobile Security Technologies
start the course
describe usage scenarios for cryptography
describe the theory of one-way cryptographic functions and hashes
describe hashing and identify the main hashing algorithms
perform hashing using Windows PowerShell
describe symmetric encryption
describe asymmetric encryption and its common uses
encrypt and decrypt a message using OpenSSL
describe digital signing
perform digital signing using OpenSSL
describe key distribution in cryptographic systems
describe digital certificates and the process of issuing certificates in a CA system
create a certificate in Visual Studio makecert
describe requirements for back-end security for mobile applications
describe measures to harden services for mobile applications
describe requirements for securing app mobile app deployment
describe measures to protect mobile apps at the transport layer
describe infrastructure security requirements to support secure mobile apps
describe the architecture of a demilitarized zone to protect mobile app services
describe the use of a reverse proxy in protecting mobile app back-end services
describe processes for securing directory services and certificate authorities used in mobile app back-end systems
describe the use of S/MIME to secure e-mail in the enterprise
describe the use of rights management systems to secure document content
describe measures to protect data in transit and at rest
describe the use of mobile device management systems to fully manage secure mobile devices
describe threats to back-end systems, and strategies to mitigate them
Course Number: sp_emds_a02_it_enus
Expertise Level
Intermediate