Overview
Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. Knowing the embedded security solutions of the operating systems common to mobile devices can be part of a security baseline for these devices.
- Describe the security concerns with BYOD
- Describe mobile device security options
Instructor: Raymond Lacoste
Secured Mobile Devices
- Threat of a BYOD Solution
- Creating BYOD Mobile Device Policies