From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Mobile security enforcement
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Mobile security enforcement
- [Speaker] Mobile devices are packed with a wide variety of features and new ones appear on the market each time that the manufacturer upgrades devices. Security professionals should carefully monitor the use of these features and enforce restrictions on features that may pose a risk to security. I've already explained how you can use mobile device management or MDM solutions to restrict the configuration of mobile devices and enforce your organization's security policies. There are some ways that users might attempt to circumvent these controls. First, if you depend upon the device manufacturer's app store for the use of trusted apps, you should know that there are a variety of third-party app stores available on the internet. And those may not be as reliable and secure as the manufacturer's app store. Installing apps from unofficial sources is known as side loading as it bypasses the normal application loading…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Mobile connection methods4m 7s
- (Locked) Mobile device security3m 7s
- (Locked) Mobile device management7m 16s
- (Locked) Mobile device tracking3m 11s
- (Locked) Mobile application management3m 58s
- (Locked) Mobile security enforcement3m 56s
- (Locked) Bring Your Own Device (BYOD)4m 40s
- (Locked) Mobile deployment models2m 59s
- (Locked)
-
-
-
-