The Art of Cyber War: Mobile Device Security
Securing Mobile Devices (Without TOC)
Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions. This module will inform learners on the differences between mobile devices and traditional desktop computers in the context of information security, and teach learners how to use mobile devices safely.
Mobile Wi-Fi Security Assessment
Don't Be a Target: Your Virtual Assistant
They may pose a security risk by allowing unauthorized access to your accounts while you are not present.