Mobile Device Management Fundamentals
What you'll learn
- Learn Mobile Device Management principles
- Understanding Mobile Device Management Users and Administration
- Learn Concepts of Security for Mobile Devices
- Understand the Layers of Security for Mobile Devices
- Define the functionality of a Mobile Device Management System
- Define how to secure devices with Encryption, Email, Content Management to protect information leaks
Requirements
- Basic computer knowledge like windows
- Any PC user
Description
Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices. Though closely related to Enterprise Mobility Management and Unified Endpoint Management, MDM differs slightly from both: unlike MDM, EMM includes mobile information management, BYOD, mobile application management and mobile content management, whereas UEM provides device management for endpoints like desktops, printers, IoT devices, and wearables as well.
With a Mobile Device Management System you will learn how a comprehensive enterprise mobility management (EMM) platform will enable apps and content with trust on any device, at anytime and from anywhere by delivering mobile security for the way people work.
No one can monitor your browsing history using MDM. That's because all apps on iOS are sandboxed. Unless your device is jailbroken, there's no way to see that data.
With an Mobile Device Management System you will learn how to detect a geographically-based or wifi-based location and apply a policy to a device within 30 minutes depending on the network connection and the status of the MDM app on the device. For Android devices, MDM immediately detects a wifi-based location for a device.
Who this course is for:
- Any computer user
Instructor
J.S Garcia “Juan Sebastian Garcia” is an Engineer and an Author. His Family moved to Brooklyn, NY, in 1992 where he grew up. He’s the youngest of four children. After he graduated as a Computer Forensics Investigator from the Electronic Commerce Council University in NM, he is also certified as an Avaya Certified Expert, CEH, CHFI, CCNA, ENA, Oracle DBA.
Over 20 Years of experience in IT Infrastructure Teams and management, Specialized in Telecomunications, Contact Centers, Cloud, Virtualization, Security. Motivated, adaptable, customer focused, results driven, and hard working Information Technology Professional With proven ability to work under any pressure and deliver desired outcome of high quality requirements and customer deadlines. Worked at top companies, including Harry and David, Amerigroup Corp, IDT Corp, RFA Corp, Cable and Wireless Business and many more. Strong communication and interpersonal skills demonstrated in working with colleagues and customers across the global. Implemented more that 120.000 users worldwide and 32.000 Call Center Agents in 20+ Countries from design to implementation and customer satisfaction.