-
Application Hardening
After watching this video; you will be able to describe measures to harden services for mobile applications.
-
Application Wrapper Overview
After watching this video; you will be able to describe security functionality offered by app wrapper technologies for mobile devices.
-
Assessing Mobile Threats
After watching this video; you will be able to assess threats from OWASP top 10 and their impact on mobile systems.
-
Asymmetric Encryption Overview
After watching this video; you will be able to describe asymmetric encryption and its common uses.
-
Back-end Security Requirements
After watching this video; you will be able to describe requirements for back-end security for mobile applications.
-
Broken Cryptography
After watching this video; you will be able to describe how broken cryptography affects mobile device front-end and back-end systems.
-
Building a Demilitarized Zone
After watching this video; you will be able to describe the architecture of a demilitarized zone to protect mobile app services.
-
Business Impacts of Exploits
After watching this video; you will be able to describe the potential business impacts of mobile exploits.
-
BYOD Container Usage Scenarios
After watching this video; you will be able to describe usage scenarios for BYOD containers.
-
BYOD Containers
After watching this video; you will be able to describe BYOD containers for segregating data on BYOD devices.
-
Client-side Injection
After watching this video; you will be able to describe how client-side injection affects mobile device front-end systems.
-
Configuring BYOD Containers
After watching this video; you will be able to configure BYOD containers using Good Work.
-
Configuring Perfect Forward Secrecy
After watching this video; you will be able to configure perfect forward secrecy in Internet Information Services.
-
Configuring the Microsoft Intune Connector Role
After watching this video; you will be able to configure the Microsoft Intune connector role.
-
Configuring Unmanaged Android Devices
After watching this video; you will be able to configure security settings on-device for unmanaged Android devices.
-
Configuring Unmanaged iOS Devices
After watching this video; you will be able to configure security settings on-device for unmanaged iPhone and iPad iOS devices.
-
Configuring Unmanaged Windows Phone Devices
After watching this video; you will be able to configure security settings on-device for unmanaged Windows Phone devices.
-
Configuring Virtual Private Networks
After watching this video; you will be able to connect a mobile device to a VPN server.
-
Creating a Microsoft Intune Account
After watching this video; you will be able to create an account for Microsoft Intune.
-
Creating Certificates
After watching this video; you will be able to create a certificate in Visual Studio makecert.
-
Cryptography One-way Functions
After watching this video; you will be able to describe the theory of one-way cryptographic functions and hashes.
-
Cryptography Usage
After watching this video; you will be able to describe usage scenarios for cryptography.
-
Deploy Enterprise Profiles in Microsoft Intune
After watching this video; you will be able to deploy enterprise profiles in Microsoft Intune.
-
Device Authorization and Authentication Requirements
After watching this video; you will be able to describe requirements for secure device authorization and authentication.
-
Device Sensor; Jailbreak; & MDM System Requirements
After watching this video; you will be able to describe requirements for secure device sensors; jailbreaking; and mobile device management systems.
-
Digital Certificates Overview
After watching this video; you will be able to describe digital certificates and the process of issuing certificates in a CA system.
-
Digital Signing Overview
After watching this video; you will be able to describe digital signing.
-
Distribute Apps in Microsoft Intune
After watching this video; you will be able to distribute apps in Microsoft Intune.
-
Encrypting Cloud Data
After watching this video; you will be able to use Boxcryptor to encrypt and secure cloud data.
-
Enforcing Configurations in Microsoft Intune
After watching this video; you will be able to enforce configurations in Microsoft Intune.
-
Enrolling Devices in Microsoft Intune
After watching this video; you will be able to enroll devices in Microsoft Intune.
-
Enterprise Mobile Device Security Challenges
After watching this video; you will be able to describe network architecture challenges for securing enterprise mobile devices.
-
Enterprise Mobile Device Security Model Solution
After watching this video; you will be able to describe a solution for enterprise mobile device security challenges based on Microsoft's product portfolio.
-
Exchange ActiveSync Functionality
After watching this video; you will be able to describe Microsoft Exchange ActiveSync functionality for managing mobile devices.
-
Handling Certificates in Microsoft Intune
After watching this video; you will be able to handle certificates in Microsoft Intune.
-
Hashing Overview
After watching this video; you will be able to describe hashing and identify the main hashing algorithms.
-
Identifying Risks
After watching this video; you will be able to describe the process to determine risk in a mobile environment.
-
Improper Session Handling
After watching this video; you will be able to describe how improper session handling affects mobile device front-end systems.
-
Infrastructure Security Requirements
After watching this video; you will be able to describe infrastructure security requirements to support secure mobile apps.
-
Insecure Data Storage
After watching this video; you will be able to describe how insecure data storage affects mobile device front-end and back-end systems.
-
Insufficient Transport Layer Protection
After watching this video; you will be able to describe how insufficient transport layer protection affects mobile device front-end and back-end systems.
-
Key Distribution
After watching this video; you will be able to describe key distribution in cryptographic systems.
-
Lack of Binary Protections
After watching this video; you will be able to describe how lack of binary protections affects mobile device front-end systems.
-
Managing Devices with Exchange ActiveSync
After watching this video; you will be able to configure Office 365 Exchange ActiveSync to manage mobile devices.
-
Microsoft Azure Rights Management Overview
After watching this video; you will be able to describe Microsoft Azure Rights Management cloud-based rights management system.
-
Mitigating Code Vulnerabilities in Apps
After watching this video; you will be able to describe methods to mitigate code vulnerabilities in mobile apps.
-
Mitigating Malicious App Functionality
After watching this video; you will be able to describe methods to mitigate malicious functionality in mobile apps.
-
Mobile Device Management Systems
After watching this video; you will be able to describe the use of mobile device management systems to fully manage secure mobile devices.
-
Mobile Device Overview
After watching this video; you will be able to describe current mobile devices and form factors.
-
Mobile Device Ownership Models
After watching this video; you will be able to describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy.
-
Navigating Microsoft Intune
After watching this video; you will be able to navigate the Microsoft Intune interface.
-
Overview of Security
After watching this video; you will be able to describe mobile security considerations.
-
Performing Digital Signing
After watching this video; you will be able to perform digital signing using OpenSSL.
-
Performing Encryption
After watching this video; you will be able to encrypt and decrypt a message using OpenSSL.
-
Performing Hashing
After watching this video; you will be able to perform hashing using Windows PowerShell.
-
Poor Authorization and Authentication
After watching this video; you will be able to describe how poor authorization and authentication affects mobile device front-end and back-end systems.
-
Preparing for iOS Mobile Device Enrollment
After watching this video; you will be able to prepare for iOS device enrollment in Microsoft System Center Configuration Manager.
-
Preparing for Windows Mobile Device Enrollment
After watching this video; you will be able to prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager.
-
Protect Data in Microsoft Intune
After watching this video; you will be able to protect data in Microsoft Intune.
-
Protecting Content with Microsoft Azure RMS
After watching this video; you will be able to configure Microsoft Azure Rights Management System to protect confidential documents.
-
Protecting Data at Rest and in Transit
After watching this video; you will be able to describe measures to protect data in transit and at rest.
-
Protecting the Transport Layer
After watching this video; you will be able to describe measures to protect mobile apps at the transport layer.
-
Requirements for the Mobile Enterprise
After watching this video; you will be able to describe the requirements for establishing a Mobile Enterprise.
-
Reverse Proxy Features
After watching this video; you will be able to describe the use of a reverse proxy in protecting mobile app back-end services.
-
Rights Management Systems
After watching this video; you will be able to describe the use of rights management systems to secure document content.
-
Secure App Deployment
After watching this video; you will be able to describe requirements for securing mobile app deployment.
-
Secure Cloud Storage
After watching this video; you will be able to describe requirements for secure cloud storage.
-
Secure Device Connectivity and App Requirements
After watching this video; you will be able to describe requirements for secure device connectivity and apps.
-
Secure Device Data-handling Requirements
After watching this video; you will be able to describe requirements for secure device data handling.
-
Secure Device User Requirements
After watching this video; you will be able to describe requirements for users of secure devices.
-
Securing Directory Services and CA
After watching this video; you will be able to describe processes for securing directory services and certificate authorities used in mobile app back-end systems.
-
Securing E-mail Services
After watching this video; you will be able to describe the use of S/MIME to secure e-mail in the enterprise.
-
Security Decisions via Untrusted Inputs
After watching this video; you will be able to describe how security decisions via untrusted inputs affect mobile device back-end systems.
-
Sensitive Data Storage and Transport
After watching this video; you will be able to describe how mobile data is stored and transported.
-
Sensitive Mobile Assets
After watching this video; you will be able to describe sensitive mobile assets.
-
Sensitive Usage of Mobile Devices
After watching this video; you will be able to describe sensitive usage scenarios for mobile devices.
-
Short-lived Session Keys
After watching this video; you will be able to describe challenges with transport layer security; and how they can be solved with short-lived session keys and perfect forward secrecy.
-
Symmetric Encryption Overview
After watching this video; you will be able to describe symmetric encryption.
-
System Center Configuration Manager Overview
After watching this video; you will be able to describe Microsoft System Center Configuration Manager and Intune interoperability.
-
Targeting Devices in Microsoft Intune
After watching this video; you will be able to target devices in Microsoft Intune.
-
Technical Impacts of Exploits
After watching this video; you will be able to describe the potential technical impacts of mobile exploits.
-
The Mobile Security Landscape
After watching this video; you will be able to describe the current state of mobile device security.
-
Unintended Data Leakage
After watching this video; you will be able to describe how unintended data leakage affects mobile device front-end and back-end systems.
-
Unmanaged Company-owned Devices
After watching this video; you will be able to describe mitigation strategies for unmanaged company-owned devices.
-
Unmanaged Device User Policies
After watching this video; you will be able to describe appropriate user policies for risk mitigation with unmanaged devices.
-
Unmanaged Devices in a Small Organization
After watching this video; you will be able to describe mitigation strategies for unmanaged devices in a small organization.
-
Virtual Private Networking Overview
After watching this video; you will be able to describe virtual private networks for securing network connections.
-
Weak Server-side Controls
After watching this video; you will be able to list the OWASP top ten mobile risks; and describe how weak server-side controls affect mobile device back-end systems.
-
Configuring Intune
After watching this video; you will be able to create an account on Microsoft Intune; enroll devices; and deploy enterprise profiles.
-
Securing Back-end Systems
After watching this video; you will be able to describe threats to back-end systems; and strategies to mitigate them.
-
Mitigating Threat for BYOD and COD Devices
After watching this video; you will be able to describe mitigation strategies for BYOD and COD devices in the enterprise.