5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Operating Systems and Server Technologies Solution Area     CompTIA A+     CompTIA A+ (220-1102)
As mobile technology evolves, so does the need for mobile device security. Mobile device security features protect data, including sensitive and private information, on mobile devices such as smartphones, tablets, and laptops.
Learn about screen lock security features such as facial recognition, PIN codes, fingerprint, pattern, and swipe devices. Discover the benefits of remote wiping features, locator applications, and device encryption. Next, explore how operating system updates can help secure devices and patch vulnerabilities. Then discover features of remote backup applications, firewalls, and mobile anti-virus and anti-malware solutions. Lastly, you'll get an overview of policies and procedures as they relate to BYOD, profile security requirements, and Internet of Things (IoT) security.
Upon completion of this course, you'll be able to outline common methods for securing mobile and embedded devices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

Objectives

CompTIA A+ (220-1102): Mobile & Embedded Device Security

  • discover the key concepts covered in this course
  • identify when and how to use mobile remote wiping features
  • demonstrate how mobile operating system updates can patch and secure mobile and embedded devices
  • recognize the benefits of mobile device encryption features
  • recognize how to implement restrictions for failed login attempts on mobile devices
  • recognize the importance of mobile policies and procedures documentation
  • provide an overview of Internet of Things (IoT) security as it relates to mobiles and embedded devices
  • illustrate physical destruction techniques including drilling, shredding, degaussing, and incinerating
  • list common recycling and repurposing best practices including erasing and formatting
  • identify outsourcing concepts including third party vendors and certification of destruction
  • summarize the key concepts covered in this course