Font size:

Securing Mobile Devices in the Enterprise video collection

88 videos    $99.00
Title Author Info
Application Hardening Dan Lachance 5 minutes
Application Wrapper Overview Dan Lachance 3 minutes
Assessing Mobile Threats Dan Lachance 5 minutes
Asymmetric Encryption Overview Dan Lachance 3 minutes
Back-end Security Requirements Dan Lachance 5 minutes
Broken Cryptography Dan Lachance 6 minutes
Building a Demilitarized Zone Dan Lachance 3 minutes
Business Impacts of Exploits Dan Lachance 3 minutes
BYOD Container Usage Scenarios Dan Lachance 3 minutes
BYOD Containers Dan Lachance 3 minutes
Client-side Injection Dan Lachance 5 minutes
Configuring BYOD Containers 3 minutes
Configuring Perfect Forward Secrecy Dan Lachance 3 minutes
Configuring the Microsoft Intune Connector Role Dan Lachance 5 minutes
Configuring Unmanaged Android Devices Dan Lachance 3 minutes
Configuring Unmanaged iOS Devices Dan Lachance 5 minutes
Configuring Unmanaged Windows Phone Devices Dan Lachance 4 minutes
Configuring Virtual Private Networks Dan Lachance 3 minutes
Creating a Microsoft Intune Account Dan Lachance 2 minutes
Creating Certificates Dan Lachance 4 minutes
Cryptography One-way Functions Dan Lachance 2 minutes
Cryptography Usage Dan Lachance 4 minutes
Deploy Enterprise Profiles in Microsoft Intune Dan Lachance 5 minutes
Device Authorization and Authentication Requirements Dan Lachance 6 minutes
Device Sensor; Jailbreak; & MDM System Requirements Dan Lachance 6 minutes
Digital Certificates Overview Dan Lachance 6 minutes
Digital Signing Overview Dan Lachance 3 minutes
Distribute Apps in Microsoft Intune Dan Lachance 7 minutes
Encrypting Cloud Data Dan Lachance 3 minutes
Enforcing Configurations in Microsoft Intune Dan Lachance 5 minutes
Enrolling Devices in Microsoft Intune Dan Lachance 5 minutes
Enterprise Mobile Device Security Challenges Dan Lachance 4 minutes
Enterprise Mobile Device Security Model Solution Dan Lachance 5 minutes
Exchange ActiveSync Functionality Dan Lachance 2 minutes
Handling Certificates in Microsoft Intune Dan Lachance 5 minutes
Hashing Overview Dan Lachance 4 minutes
Identifying Risks Dan Lachance 3 minutes
Improper Session Handling Dan Lachance 4 minutes
Infrastructure Security Requirements Dan Lachance 4 minutes
Insecure Data Storage Dan Lachance 3 minutes
Insufficient Transport Layer Protection Dan Lachance 5 minutes
Key Distribution Dan Lachance 3 minutes
Lack of Binary Protections Dan Lachance 3 minutes
Managing Devices with Exchange ActiveSync Dan Lachance 3 minutes
Microsoft Azure Rights Management Overview Dan Lachance 4 minutes
Mitigating Code Vulnerabilities in Apps Dan Lachance 3 minutes
Mitigating Malicious App Functionality Dan Lachance 4 minutes
Mobile Device Management Systems Dan Lachance 4 minutes
Mobile Device Overview Dan Lachance 4 minutes
Mobile Device Ownership Models Dan Lachance 3 minutes
Navigating Microsoft Intune Dan Lachance 3 minutes
Overview of Security Dan Lachance 5 minutes
Performing Digital Signing Dan Lachance 3 minutes
Performing Encryption Dan Lachance 3 minutes
Performing Hashing Dan Lachance 2 minutes
Poor Authorization and Authentication Dan Lachance 5 minutes
Preparing for iOS Mobile Device Enrollment Dan Lachance 3 minutes
Preparing for Windows Mobile Device Enrollment Dan Lachance 6 minutes
Protect Data in Microsoft Intune Dan Lachance 5 minutes
Protecting Content with Microsoft Azure RMS Dan Lachance 4 minutes
Protecting Data at Rest and in Transit Dan Lachance 4 minutes
Protecting the Transport Layer Dan Lachance 4 minutes
Requirements for the Mobile Enterprise Dan Lachance 3 minutes
Reverse Proxy Features Dan Lachance 6 minutes
Rights Management Systems Dan Lachance 3 minutes
Secure App Deployment Dan Lachance 3 minutes
Secure Cloud Storage Dan Lachance 4 minutes
Secure Device Connectivity and App Requirements Dan Lachance 6 minutes
Secure Device Data-handling Requirements Dan Lachance 4 minutes
Secure Device User Requirements Dan Lachance 3 minutes
Securing Directory Services and CA Dan Lachance 3 minutes
Securing E-mail Services Dan Lachance 4 minutes
Security Decisions via Untrusted Inputs Dan Lachance 4 minutes
Sensitive Data Storage and Transport Dan Lachance 4 minutes
Sensitive Mobile Assets Dan Lachance 3 minutes
Sensitive Usage of Mobile Devices Dan Lachance 3 minutes
Short-lived Session Keys Dan Lachance 4 minutes
Symmetric Encryption Overview Dan Lachance 2 minutes
System Center Configuration Manager Overview Dan Lachance 2 minutes
Targeting Devices in Microsoft Intune Dan Lachance 4 minutes
Technical Impacts of Exploits Dan Lachance 3 minutes
The Mobile Security Landscape Dan Lachance 5 minutes
Unintended Data Leakage Dan Lachance 3 minutes
Unmanaged Company-owned Devices Dan Lachance 4 minutes
Unmanaged Device User Policies Dan Lachance 4 minutes
Unmanaged Devices in a Small Organization Dan Lachance 3 minutes
Virtual Private Networking Overview Dan Lachance 3 minutes
Weak Server-side Controls Dan Lachance 3 minutes
Register Now
Securing Mobile Devices in the Enterprise video collection
  • Course ID:
    262960
  • Duration:
    n/a
  • Price:
    $99