We may earn an affiliate commission when you visit our partners.
Dale Meredith

Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices.

Read more

Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices.

You love your mobile device, and so does everyone else at your company. But, without an up-to-date approach to mobile security, you're exposing your company to attacks. Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices. He'll cover: What you’re exposing and how it’s exposed, tte top 8 mobile security risks and how to mitigate them, who the biggest offenders in your organization are and why (and no, it's not who you think), how everyone at your company can stay protected, and more!

Enroll now

What's inside

Syllabus

You're Compromising Your Company's Security. Here's How.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches basic cybersecurity strategies for protecting mobile devices in business settings
Appropriate for business owners, IT professionals, and employees
Focuses on mobile device security threats and preventive measures in a business context
Taught by cybersecurity expert Dale Meredith
Provides actionable advice and practical tips for improving mobile security strategies
Requires no prior knowledge or experience in cybersecurity

Save this course

Save You're Compromising Your Company's Security. Here's How. to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in You're Compromising Your Company's Security. Here's How. with these activities:
Review the course syllabus and materials
To ensure that you are well-prepared for the course, take some time to review the course syllabus, readings, and any other materials provided by the instructor.
Browse courses on Course Syllabus
Show steps
  • Read the course syllabus thoroughly.
  • Review the required and recommended reading materials.
  • Familiarize yourself with the course schedule and deadlines.
Review the OSI security model
Start this course by brushing up on the OSI security model. This will provide a solid foundation for understanding the concepts that will be covered in the course.
Show steps
  • Read articles and resources on the OSI security model.
  • Take a quiz or practice questions on the OSI security model.
Join a study group or online discussion forum
To enhance your understanding of the course material, join a study group or participate in online discussion forums where you can engage with fellow students and discuss concepts.
Browse courses on Knowledge Sharing
Show steps
  • Find a study group or online discussion forum that aligns with your learning style.
  • Actively participate in discussions and ask questions.
  • Collaborate with other students to solve problems and share insights.
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Explore OWASP Top 10 Mobile Risks
Help you better understand the specific security risks associated with mobile devices and how to mitigate them
Show steps
  • Read the OWASP Top 10 Mobile Risks document
  • Identify the risks that are most relevant to your organization
  • Develop a plan to mitigate these risks
Explore best practices for mobile device management
To expand your knowledge of best practices for mobile device management, explore online tutorials and resources that provide guidance on implementing and maintaining effective mobile device security measures.
Browse courses on Mobile Device Management
Show steps
  • Identify reputable sources for mobile device management best practices.
  • Follow tutorials and guides to learn about best practices.
  • Apply the best practices in your own mobile device management strategies.
Identify and mitigate mobile security risks
To improve your understanding of how to mitigate mobile security risks, practice identifying and mitigating these risks using a simulated environment or online exercises.
Show steps
  • Use an online tool or platform to simulate mobile security risks.
  • Identify and mitigate the risks identified in the simulation.
  • Review the results and identify areas for improvement.
Design a Mobile Security Policy
Allow you to create a comprehensive security policy that addresses the specific risks associated with mobile devices within your organization
Show steps
  • Identify the scope of your policy
  • Define the roles and responsibilities of employees
  • Establish security standards and procedures
  • Implement and enforce your policy
Develop a Mobile Security Awareness Program
Help you create a program that will educate employees about the importance of mobile security and how to protect their devices
Show steps
  • Identify the target audience for your program
  • Develop training materials
  • Deliver training to employees
  • Evaluate the effectiveness of your program
Conduct Mobile Security Penetration Tests
Provide you with hands-on experience in identifying and exploiting mobile security vulnerabilities
Show steps
  • Set up a mobile security lab
  • Use a variety of tools and techniques to identify vulnerabilities
  • Exploit vulnerabilities to gain access to sensitive data or systems
  • Make recommendations to improve mobile security
Design a security strategy for a mobile device deployment
To solidify your understanding of mobile security strategy, create a detailed plan that outlines the steps you would take to secure a mobile device deployment.
Browse courses on Security Management
Show steps
  • Identify the scope of the mobile device deployment.
  • Conduct a risk assessment to identify potential threats and vulnerabilities.
  • Develop a security strategy that addresses the identified risks and vulnerabilities.
  • Create a plan for implementing and monitoring the security strategy.
Participate in a mobile security hackathon
To challenge yourself and test your skills, participate in a mobile security hackathon where you can work on real-world security problems and collaborate with other professionals.
Browse courses on Vulnerability Assessment
Show steps
  • Find a mobile security hackathon that aligns with your interests.
  • Form a team or participate individually in the hackathon.
  • Work on a project that addresses a mobile security challenge.
  • Present your project and findings to the judges.

Career center

Learners who complete You're Compromising Your Company's Security. Here's How. will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts are responsible for a wide range of security-related duties, including developing and implementing security policies, managing firewalls and intrusion detection systems, and responding to security incidents. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Security Consultant
Security Consultants provide advice to organizations on how to improve their security posture. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your clients from emerging threats.
Security Architect
Security Architects design and implement security solutions for an organization's information systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Security Engineer
Security Engineers design, implement, and manage security systems for an organization's information systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Data Security Analyst
Data Security Analysts protect an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Network Security Engineer
Network Security Engineers design, implement, and manage security systems for an organization's network infrastructure. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage security systems for an organization's cloud infrastructure. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Forensics Analyst
Forensics Analysts investigate and analyze evidence of cybercrimes. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Compliance Analyst
Compliance Analysts ensure that an organization's information systems comply with applicable laws and regulations. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Penetration Tester
Penetration Testers assess the security of an organization's information systems by simulating attacks. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization's information systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Incident Responder
Incident Responders investigate and respond to security incidents. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Security Program Manager
Security Program Managers oversee an organization's security program. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
IT Auditor
IT Auditors evaluate the effectiveness of an organization's information systems controls. This course may be useful to you in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in You're Compromising Your Company's Security. Here's How..
Provides a comprehensive overview of security engineering principles and practices, including topics such as risk assessment, threat modeling, and security controls. It valuable resource for anyone looking to improve their understanding of how to build secure systems.
Provides insights into the human element of security, exploring how attackers exploit human vulnerabilities to compromise systems. It valuable resource for anyone looking to improve their understanding of social engineering and other human-based attacks.
Provides a practical guide to hacking techniques, covering topics such as buffer overflows, SQL injection, and web application vulnerabilities. It valuable resource for anyone looking to learn more about how attackers exploit system vulnerabilities.
Classic in the field of cybersecurity, providing a firsthand account of the author's experience tracking down a hacker who infiltrated a government computer system. It valuable resource for anyone looking to learn more about the history of cybersecurity and the techniques used by attackers.
Provides a comprehensive overview of computer security principles and practices, covering topics such as cryptography, network security, and operating system security. It valuable resource for anyone looking to get started with cybersecurity or to refresh their knowledge of the basics.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and network protocols. It valuable resource for anyone looking to learn more about the principles and practices of cryptography and network security.
Provides a practical guide to penetration testing, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone looking to learn more about the techniques used by penetration testers.
Provides a comprehensive guide to web application security, covering topics such as web application vulnerabilities, attack techniques, and mitigation strategies. It valuable resource for anyone looking to learn more about the threats to web applications and how to protect them.
Provides a comprehensive guide to malware analysis, covering topics such as malware classification, reverse engineering, and analysis techniques. It valuable resource for anyone looking to learn more about the techniques used by malware analysts.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to You're Compromising Your Company's Security. Here's How..
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser