CompTIA Mobility+ MB0-001: Security

This course is included in our On-demand training solution.

Overview

The chief concern for organizations entering the world of BYOD and mobile device is security. With greater flexibility, the mobile nature of devices, and the ownership issues of BYOD, the potential for security issues has never been greater. This course covers security concepts and risks, and strategies for mitigating those risks in a connected, mobile world. This course is one of a series of courses that cover the objectives for CompTIA Mobility+ (MB0-001).

Target Audience

IT support personnel, mobility architects, network and security administrators, and anyone looking to gain technical skills for managing mobile devices

Prerequisites

None

Expected Duration

90 min.

Course Objectives

Course Introduction

IPSec Protocols

  • describe the characteristics of protocols used in the IPSec framework for securing communications
  • VPN Protocols

  • describe VPN technologies and protocols
  • Deprecated WiFi Encryption

  • describe deprecated WiFi encryption methods and why they should not be used
  • Current WiFi Encryption Technologies

  • describe current WiFi encryption methods and how they address previous issues
  • Web Traffic Encryption

  • describe encryption methods for web traffic
  • Encrypting Data at Rest

  • describe encryption methods for data at rest
  • Disk Encryption

  • describe disk encryption technologies
  • Removable Media Encryption

  • describe removable media encryption technologies and reasons for encrypting
  • Authentication

  • describe authentication concepts
  • Public Key Infrastructure

  • describe public key infrastructure and digital certificates
  • Software-Based Container Access

  • describe the use of software-based container access to secure applications
  • Data Segregation

  • describe the use of data segregation to isolate applications
  • Mobile Device Compliance

  • describe the importance of compliance for mobile devices and mechanisms for enforcement
  • Mobile Device Audit Reports

  • describe mobile device auditing and audit reports
  • Mobile Device Monitoring Applications

  • describe applications for monitoring mobile devices
  • Monitoring Logs

  • describe mobile device logs and their use in monitoring
  • Wireless Risks

  • describe risks to wireless security
  • Mitigating Wireless Risks

  • describe the methods for mitigating risks to wireless security
  • Software Risks

  • describe risks to security from software and applications
  • Mitigating Software Risks

  • describe mitigation techniques for software risks
  • Organizational Risks

  • describe organizational risks to security
  • Hardware Risks

  • describe security risks associated with devices and hardware
  • Identifying a Mobile Security Incident

  • describe the process for identifying a mobile security incident
  • Determine Policy-Based Incident Response

  • describe processes for determining policy based incident response
  • Perform Policy-Based Incident Response

  • describe how policy based incident response should be performed
  • Documenting Security Incidents

  • describe the documentation required for a security incident
  • Exercise: Mobile Device Security

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?