Securing Mobile Devices in the Enterprise: Mobile Security Technologies

  • Description
  • Reviews (0)

Description

Cryptography provides the means to secure data at rest and in transit, but that’s only part of the story for hardening mobile systems. Requirements for a hardened back-end infrastructure are magnified by mobile units as these go-anywhere devices provide attackers with a potentially simple route into your back-end network. In this course, you will learn about encryption, some practical use cases in the mobile enterprise, and back-end hardening for mobile systems.

Reviews

There are no reviews yet.

Be the first to review “Securing Mobile Devices in the Enterprise: Mobile Security Technologies”