Imate žicu za učenje?

Overview/Description Mobile devices have unique on-boarding and off-boarding strategies, due to their diverse nature and BYOD issues. This course covers issues of policy relating to mobile device on-boarding, management and off-boarding, and looks ahead to new mobile technologies emerging, and the opportunities and risks they pose. This course is one of a series of courses that cover the objectives for CompTIA Mobility+ (MB0-001). Target Audience IT support personnel, mobility architects, network and security administrators, and anyone looking to gain technical skills for managing mobile...
Overview/Description The chief concern for organizations entering the world of BYOD and mobile device is security. With greater flexibility, the mobile nature of devices, and the ownership issues of BYOD, the potential for security issues has never been greater. This course covers security concepts and risks, and strategies for mitigating those risks in a connected, mobile world. This course is one of a series of courses that cover the objectives for CompTIA Mobility+ (MB0-001). Target Audience IT support personnel, mobility architects, network and security administrators, and anyone...
Overview/Description Troubleshooting methodology for mobile devices follows well understood best practices and a logical flow, with some amendments to take into account the unique nature of mobile devices. Having a good understanding of troubleshooting principles will make any problem of configuration or operation surmountable. This course covers basic troubleshooting methodology, and how to apply it to mobile devices and applications. This course is one of a series of courses that cover the objectives for CompTIA Mobility+ (MB0-001). Target Audience IT support personnel, mobility...
Overview/Description Two areas that make mobile devices unique are their connectivity capabilities and requirements, and the unique security challenges they pose. This course takes systematic troubleshooting methods and applies them to these two areas of mobile computing to attempt to solve OTA connectivity and security issues. This course is one of a series of courses that cover the objectives for CompTIA Mobility+ (MB0-001). Target Audience IT support personnel, mobility architects, network and security administrators, and anyone looking to gain technical skills for managing mobile...
Overview/Description Mobile devices rely on different forms of wireless communication for connectivity and functionality. From cellular technologies for Internet connectivity anywhere in the world, to WiFi networks in the home or office, or personal networks of peripherals using Bluetooth, all these technologies are underpinned by the same set of fundamental principles of radio frequency signaling. This course covers wireless technology from the radio wave up, encompassing all types of wireless connectivity that wireless devices rely on. This course is one of a series of courses that cover...
Overview/Description Networking provides a way for devices and users within a network to be able to communicate and share data. In order to understand how networks function, you need to start at the beginning and learn the fundamental building blocks of networks and how data travels from one point to another. In this course, you'll learn about the fundamental protocols, IP addressing, and network settings for devices to communicate. You'll also learn how to configure and setup network cards, routers and firewalls, as well as how to configure a wireless network. Target Audience Network...
Overview/Description The sharing of files and folders over wired and wireless networks is a big part of how users access information throughout different types of networks. Ensuring these networks are running properly will allow the information to be accessed quickly. In this course, you'll learn how to configure different Windows networks and how to create and manage network shares. You'll also learn how to monitor the network connections and remotely access computers. You'll also explore how to configure networking on a Mac OSX 10.8. Target Audience Network administrators, network...
Overview/Description Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the...
Overview/Description Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy...
Overview/Description In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide. Target...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?