-
Application Hardening
After watching this video; you will be able to describe measures to harden services for mobile applications.
-
Application Wrapper Overview
After watching this video; you will be able to describe security functionality offered by app wrapper technologies for mobile devices.
-
Assessing Mobile Threats
After watching this video; you will be able to assess threats from OWASP top 10 and their impact on mobile systems.
-
Asymmetric Encryption Overview
After watching this video; you will be able to describe asymmetric encryption and its common uses.
-
Back-end Security Requirements
After watching this video; you will be able to describe requirements for back-end security for mobile applications.
-
Broken Cryptography
After watching this video; you will be able to describe how broken cryptography affects mobile device front-end and back-end systems.
-
Building a Demilitarized Zone
After watching this video; you will be able to describe the architecture of a demilitarized zone to protect mobile app services.
-
Business Impacts of Exploits
After watching this video; you will be able to describe the potential business impacts of mobile exploits.
-
BYOD Container Usage Scenarios
After watching this video; you will be able to describe usage scenarios for BYOD containers.
-
BYOD Containers
After watching this video; you will be able to describe BYOD containers for segregating data on BYOD devices.
-
Client-side Injection
After watching this video; you will be able to describe how client-side injection affects mobile device front-end systems.
-
Configuring BYOD Containers
After watching this video; you will be able to configure BYOD containers using Good Work.
-
Configuring Perfect Forward Secrecy
After watching this video; you will be able to configure perfect forward secrecy in Internet Information Services.
-
Configuring the Microsoft Intune Connector Role
After watching this video; you will be able to configure the Microsoft Intune connector role.
-
Configuring Unmanaged Android Devices
After watching this video; you will be able to configure security settings on-device for unmanaged Android devices.
-
Configuring Unmanaged iOS Devices
After watching this video; you will be able to configure security settings on-device for unmanaged iPhone and iPad iOS devices.
-
Configuring Unmanaged Windows Phone Devices
After watching this video; you will be able to configure security settings on-device for unmanaged Windows Phone devices.
-
Configuring Virtual Private Networks
After watching this video; you will be able to connect a mobile device to a VPN server.
-
Creating a Microsoft Intune Account
After watching this video; you will be able to create an account for Microsoft Intune.
-
Creating Certificates
After watching this video; you will be able to create a certificate in Visual Studio makecert.
-
Cryptography One-way Functions
After watching this video; you will be able to describe the theory of one-way cryptographic functions and hashes.
-
Cryptography Usage
After watching this video; you will be able to describe usage scenarios for cryptography.
-
Deploy Enterprise Profiles in Microsoft Intune
After watching this video; you will be able to deploy enterprise profiles in Microsoft Intune.
-
Device Authorization and Authentication Requirements
After watching this video; you will be able to describe requirements for secure device authorization and authentication.
-
Device Sensor; Jailbreak; & MDM System Requirements
After watching this video; you will be able to describe requirements for secure device sensors; jailbreaking; and mobile device management systems.
-
Digital Certificates Overview
After watching this video; you will be able to describe digital certificates and the process of issuing certificates in a CA system.
-
Digital Signing Overview
After watching this video; you will be able to describe digital signing.
-
Distribute Apps in Microsoft Intune
After watching this video; you will be able to distribute apps in Microsoft Intune.
-
Encrypting Cloud Data
After watching this video; you will be able to use Boxcryptor to encrypt and secure cloud data.
-
Enforcing Configurations in Microsoft Intune
After watching this video; you will be able to enforce configurations in Microsoft Intune.
-
Enrolling Devices in Microsoft Intune
After watching this video; you will be able to enroll devices in Microsoft Intune.
-
Enterprise Mobile Device Security Challenges
After watching this video; you will be able to describe network architecture challenges for securing enterprise mobile devices.
-
Enterprise Mobile Device Security Model Solution
After watching this video; you will be able to describe a solution for enterprise mobile device security challenges based on Microsoft's product portfolio.
-
Exchange ActiveSync Functionality
After watching this video; you will be able to describe Microsoft Exchange ActiveSync functionality for managing mobile devices.
-
Handling Certificates in Microsoft Intune
After watching this video; you will be able to handle certificates in Microsoft Intune.
-
Hashing Overview
After watching this video; you will be able to describe hashing and identify the main hashing algorithms.
-
Identifying Risks
After watching this video; you will be able to describe the process to determine risk in a mobile environment.
-
Improper Session Handling
After watching this video; you will be able to describe how improper session handling affects mobile device front-end systems.
-
Infrastructure Security Requirements
After watching this video; you will be able to describe infrastructure security requirements to support secure mobile apps.
-
Insecure Data Storage
After watching this video; you will be able to describe how insecure data storage affects mobile device front-end and back-end systems.
-
Insufficient Transport Layer Protection
After watching this video; you will be able to describe how insufficient transport layer protection affects mobile device front-end and back-end systems.
-
Key Distribution
After watching this video; you will be able to describe key distribution in cryptographic systems.
-
Lack of Binary Protections
After watching this video; you will be able to describe how lack of binary protections affects mobile device front-end systems.
-
Managing Devices with Exchange ActiveSync
After watching this video; you will be able to configure Office 365 Exchange ActiveSync to manage mobile devices.
-
Microsoft Azure Rights Management Overview
After watching this video; you will be able to describe Microsoft Azure Rights Management cloud-based rights management system.
-
Mitigating Code Vulnerabilities in Apps
After watching this video; you will be able to describe methods to mitigate code vulnerabilities in mobile apps.
-
Mitigating Malicious App Functionality
After watching this video; you will be able to describe methods to mitigate malicious functionality in mobile apps.
-
Mobile Device Management Systems
After watching this video; you will be able to describe the use of mobile device management systems to fully manage secure mobile devices.
-
Mobile Device Overview
After watching this video; you will be able to describe current mobile devices and form factors.
-
Mobile Device Ownership Models
After watching this video; you will be able to describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy.
-
Navigating Microsoft Intune
After watching this video; you will be able to navigate the Microsoft Intune interface.
-
Overview of Security
After watching this video; you will be able to describe mobile security considerations.
-
Performing Digital Signing
After watching this video; you will be able to perform digital signing using OpenSSL.
-
Performing Encryption
After watching this video; you will be able to encrypt and decrypt a message using OpenSSL.
-
Performing Hashing
After watching this video; you will be able to perform hashing using Windows PowerShell.
-
Poor Authorization and Authentication
After watching this video; you will be able to describe how poor authorization and authentication affects mobile device front-end and back-end systems.
-
Preparing for iOS Mobile Device Enrollment
After watching this video; you will be able to prepare for iOS device enrollment in Microsoft System Center Configuration Manager.
-
Preparing for Windows Mobile Device Enrollment
After watching this video; you will be able to prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager.
-
Protect Data in Microsoft Intune
After watching this video; you will be able to protect data in Microsoft Intune.
-
Protecting Content with Microsoft Azure RMS
After watching this video; you will be able to configure Microsoft Azure Rights Management System to protect confidential documents.
-
Protecting Data at Rest and in Transit
After watching this video; you will be able to describe measures to protect data in transit and at rest.
-
Protecting the Transport Layer
After watching this video; you will be able to describe measures to protect mobile apps at the transport layer.
-
Requirements for the Mobile Enterprise
After watching this video; you will be able to describe the requirements for establishing a Mobile Enterprise.
-
Reverse Proxy Features
After watching this video; you will be able to describe the use of a reverse proxy in protecting mobile app back-end services.
-
Rights Management Systems
After watching this video; you will be able to describe the use of rights management systems to secure document content.
-
Secure App Deployment
After watching this video; you will be able to describe requirements for securing mobile app deployment.
-
Secure Cloud Storage
After watching this video; you will be able to describe requirements for secure cloud storage.
-
Secure Device Connectivity and App Requirements
After watching this video; you will be able to describe requirements for secure device connectivity and apps.
-
Secure Device Data-handling Requirements
After watching this video; you will be able to describe requirements for secure device data handling.
-
Secure Device User Requirements
After watching this video; you will be able to describe requirements for users of secure devices.
-
Securing Directory Services and CA
After watching this video; you will be able to describe processes for securing directory services and certificate authorities used in mobile app back-end systems.
-
Securing E-mail Services
After watching this video; you will be able to describe the use of S/MIME to secure e-mail in the enterprise.
-
Security Decisions via Untrusted Inputs
After watching this video; you will be able to describe how security decisions via untrusted inputs affect mobile device back-end systems.
-
Sensitive Data Storage and Transport
After watching this video; you will be able to describe how mobile data is stored and transported.
-
Sensitive Mobile Assets
After watching this video; you will be able to describe sensitive mobile assets.
-
Sensitive Usage of Mobile Devices
After watching this video; you will be able to describe sensitive usage scenarios for mobile devices.
-
Short-lived Session Keys
After watching this video; you will be able to describe challenges with transport layer security; and how they can be solved with short-lived session keys and perfect forward secrecy.
-
Symmetric Encryption Overview
After watching this video; you will be able to describe symmetric encryption.
-
System Center Configuration Manager Overview
After watching this video; you will be able to describe Microsoft System Center Configuration Manager and Intune interoperability.
-
Targeting Devices in Microsoft Intune
After watching this video; you will be able to target devices in Microsoft Intune.
-
Technical Impacts of Exploits
After watching this video; you will be able to describe the potential technical impacts of mobile exploits.
-
The Mobile Security Landscape
After watching this video; you will be able to describe the current state of mobile device security.
-
Unintended Data Leakage
After watching this video; you will be able to describe how unintended data leakage affects mobile device front-end and back-end systems.
-
Unmanaged Company-owned Devices
After watching this video; you will be able to describe mitigation strategies for unmanaged company-owned devices.
-
Unmanaged Device User Policies
After watching this video; you will be able to describe appropriate user policies for risk mitigation with unmanaged devices.
-
Unmanaged Devices in a Small Organization
After watching this video; you will be able to describe mitigation strategies for unmanaged devices in a small organization.
-
Virtual Private Networking Overview
After watching this video; you will be able to describe virtual private networks for securing network connections.
-
Weak Server-side Controls
After watching this video; you will be able to list the OWASP top ten mobile risks; and describe how weak server-side controls affect mobile device back-end systems.
-
Securing Mobile Devices in the Enterprise: Mobile Security Threats
Mobile security threats are among the most serious threats to the enterprise, as mobile attacks are often a gateway to a wider attack on connected resources. The Open Web Application Security Project tracks the top 10 security concerns for mobile devices and applications, and this course uses those risks as a basis for discussing mobile security. In this course, you will learn about some best practices for securely handling mobile devices.
- |INS start the course |/INS
- describe current mobile devices and form factors
- describe the current state of mobile device security
- describe mobile security considerations
- describe the process to determine risk in a mobile environment
- describe sensitive mobile assets
- describe sensitive usage scenarios for mobile devices
- describe how mobile data is stored and transported
- list the OWASP top 10 mobile risks, and describe how weak server-side controls affect mobile device back-end systems
- describe how insecure data storage affects mobile device front-end and back-end systems
- describe how insufficient transport layer protection affects mobile device front-end and back-end systems
- describe how unintended data leakage affects mobile device front-end and back-end systems
- describe how poor authorization and authentication affects mobile device front-end and back-end systems
- describe how broken cryptography affects mobile device front-end and back-end systems
- describe how client-side injection affects mobile device front-end systems
- describe how security decisions via untrusted inputs affect mobile device back-end systems
- describe how improper session handling affects mobile device front-end systems
- describe how lack of binary protections affects mobile device front-end systems
- describe the potential technical impacts of mobile exploits
- describe the potential business impacts of mobile exploits
- describe requirements for secure device data handling
- describe requirements for secure device authorization and authentication
- describe requirements for secure device sensors, jailbreaking, and mobile device management systems
- describe requirements for secure device connectivity and apps
- describe requirements for users of secure devices
- assess threats from OWASP top 10 and their impact on mobile systems
-
Securing Mobile Devices in the Enterprise: Mobile Security Technologies
Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Requirements for a hardened back-end infrastructure are magnified by mobile units as these go-anywhere devices provide attackers with a potentially simple route into your back-end network. In this course, you will learn about encryption, some practical use cases in the mobile enterprise, and back-end hardening for mobile systems.
- start the course
- describe usage scenarios for cryptography
- describe the theory of one-way cryptographic functions and hashes
- describe hashing and identify the main hashing algorithms
- perform hashing using Windows PowerShell
- describe symmetric encryption
- describe asymmetric encryption and its common uses
- encrypt and decrypt a message using OpenSSL
- describe digital signing
- perform digital signing using OpenSSL
- describe key distribution in cryptographic systems
- describe digital certificates and the process of issuing certificates in a CA system
- create a certificate in Visual Studio makecert
- describe requirements for back-end security for mobile applications
- describe measures to harden services for mobile applications
- describe requirements for securing app mobile app deployment
- describe measures to protect mobile apps at the transport layer
- describe infrastructure security requirements to support secure mobile apps
- describe the architecture of a demilitarized zone to protect mobile app services
- describe the use of a reverse proxy in protecting mobile app back-end services
- describe processes for securing directory services and certificate authorities used in mobile app back-end systems
- describe the use of S/MIME to secure e-mail in the enterprise
- describe the use of rights management systems to secure document content
- describe measures to protect data in transit and at rest
- describe the use of mobile device management systems to fully manage secure mobile devices
- describe threats to back-end systems, and strategies to mitigate them
-
Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
Once you have identified threats to mobile security, the next step in creating the fully mobile-aware enterprise is to look at mitigation strategies. In this course, you will learn about threat mitigation in a small, unmanaged environment; in a semi-managed environment using Exchange ActiveSync; and in a fully managed environment using a mobile device management (MDM) solution. You will also learn about mitigation from a Bring Your Own Device (BYOD) and a company-owned device (COD) perspective.
- start the course
- describe the requirements for establishing a mobile enterprise
- describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy
- describe mitigation strategies for unmanaged devices in a small organization
- describe mitigation strategies for unmanaged company-owned devices
- describe appropriate user policies for risk mitigation with unmanaged devices
- configure security settings on unmanaged Android devices
- configure security settings on |INS |/INS unmanaged iPhone and iPad iOS devices
- configure security settings on |INS |/INS unmanaged Windows Phone devices
- describe requirements for secure cloud storage
- use Boxcryptor to encrypt and secure cloud data
- describe Microsoft Exchange ActiveSync functionality for managing mobile devices
- configure Office 365 Exchange ActiveSync to manage mobile devices
- describe challenges with transport layer security, and how they can be solved with short-lived session keys and perfect forward secrecy
- configure perfect forward secrecy in Internet Information Services
- describe virtual private networks for securing network connections
- connect a mobile device to a VPN server
- describe BYOD containers for segregating data on BYOD devices
- describe usage scenarios for BYOD containers
- configure BYOD containers using Good Work
- describe security functionality offered by app wrapper technologies for mobile devices
- describe methods to mitigate malicious functionality in mobile apps
- describe methods to mitigate code vulnerabilities in mobile apps
- describe Microsoft Azure Rights Management cloud-based rights management system
- configure Microsoft Azure Rights Management System to protect confidential documents
- describe mitigation strategies for BYOD and COD devices in the enterprise
-
Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
The final stage in moving toward a secure mobile enterprise requires the use of a mobile device management (MDM) platform. These management systems can lock down and govern all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. In this course, you will learn about a model for enterprise mobile security and two MDM systems from Microsoft – Intune and System Center Configuration Manager.
- start the course
- describe network architecture challenges for securing enterprise mobile devices
- describe a solution for enterprise mobile device security challenges based on Microsoft's product portfolio
- create an account for Microsoft Intune
- navigate the Microsoft Intune interface
- enroll devices in Microsoft Intune
- target devices in Microsoft Intune
- enforce configurations in Microsoft Intune
- handle certificates in Microsoft Intune
- deploy enterprise profiles in Microsoft Intune
- distribute apps in Microsoft Intune
- protect data in Microsoft Intune
- describe Microsoft System Center Configuration Manager and Intune interoperability
- configure the Microsoft Intune Connector Role
- prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager
- prepare for iOS device enrollment in Microsoft System Center Configuration Manager
- create an account on Microsoft Intune, enroll devices, and deploy enterprise profiles