Overview

Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. Knowing the embedded security solutions of the operating systems common to mobile devices can be part of a security baseline for these devices.

  • Describe the security concerns with BYOD
  • Describe mobile device security options

 

Instructor: Raymond Lacoste

Secured Mobile Devices

  • Threat of a BYOD Solution
  • Creating BYOD Mobile Device Policies