Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore threat mitigation strategies and configurations in various environments.
Learning Objectives
{"describe the requirements for establishing a mobile enterprise"}
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cybersecurity Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.