• Online, Self-Paced
Course Description

Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.

Learning Objectives

{"describe BYOD containers for segregating data on BYOD devices"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management