We may earn an affiliate commission when you visit our partners.
Pluralsight logo

You're Compromising Your Company's Security. Here's How.

Dale Meredith

Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices.

Read more

Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices.

You love your mobile device, and so does everyone else at your company. But, without an up-to-date approach to mobile security, you're exposing your company to attacks. Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices. He'll cover: What you’re exposing and how it’s exposed, tte top 8 mobile security risks and how to mitigate them, who the biggest offenders in your organization are and why (and no, it's not who you think), how everyone at your company can stay protected, and more!

Enroll now

What's inside

Syllabus

You're Compromising Your Company's Security. Here's How.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches basic cybersecurity strategies for protecting mobile devices in business settings
Appropriate for business owners, IT professionals, and employees
Focuses on mobile device security threats and preventive measures in a business context
Taught by cybersecurity expert Dale Meredith
Provides actionable advice and practical tips for improving mobile security strategies
Requires no prior knowledge or experience in cybersecurity

Save this course

Save You're Compromising Your Company's Security. Here's How. to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for You're Compromising Your Company's Security. Here's How.. These are activities you can do either before, during, or after a course.

Career center

Learners who complete You're Compromising Your Company's Security. Here's How. will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts are responsible for a wide range of security-related duties, including developing and implementing security policies, managing firewalls and intrusion detection systems, and responding to security incidents. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Security Consultant
Security Consultants provide advice to organizations on how to improve their security posture. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your clients from emerging threats.
Security Architect
Security Architects design and implement security solutions for an organization's information systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Security Engineer
Security Engineers design, implement, and manage security systems for an organization's information systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Data Security Analyst
Data Security Analysts protect an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Network Security Engineer
Network Security Engineers design, implement, and manage security systems for an organization's network infrastructure. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage security systems for an organization's cloud infrastructure. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Forensics Analyst
Forensics Analysts investigate and analyze evidence of cybercrimes. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Compliance Analyst
Compliance Analysts ensure that an organization's information systems comply with applicable laws and regulations. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Penetration Tester
Penetration Testers assess the security of an organization's information systems by simulating attacks. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization's information systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Incident Responder
Incident Responders investigate and respond to security incidents. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
Security Program Manager
Security Program Managers oversee an organization's security program. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.
IT Auditor
IT Auditors evaluate the effectiveness of an organization's information systems controls. This course may be useful to you in this role by providing you with a comprehensive overview of mobile security risks and how to mitigate them. You will also learn about the latest cybersecurity trends and best practices, which will help you stay ahead of the curve and protect your company from emerging threats.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in You're Compromising Your Company's Security. Here's How..
Provides a comprehensive overview of security engineering principles and practices, including topics such as risk assessment, threat modeling, and security controls. It valuable resource for anyone looking to improve their understanding of how to build secure systems.
Provides insights into the human element of security, exploring how attackers exploit human vulnerabilities to compromise systems. It valuable resource for anyone looking to improve their understanding of social engineering and other human-based attacks.
Provides a practical guide to hacking techniques, covering topics such as buffer overflows, SQL injection, and web application vulnerabilities. It valuable resource for anyone looking to learn more about how attackers exploit system vulnerabilities.
Classic in the field of cybersecurity, providing a firsthand account of the author's experience tracking down a hacker who infiltrated a government computer system. It valuable resource for anyone looking to learn more about the history of cybersecurity and the techniques used by attackers.
Provides a comprehensive overview of computer security principles and practices, covering topics such as cryptography, network security, and operating system security. It valuable resource for anyone looking to get started with cybersecurity or to refresh their knowledge of the basics.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and network protocols. It valuable resource for anyone looking to learn more about the principles and practices of cryptography and network security.
Provides a practical guide to penetration testing, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone looking to learn more about the techniques used by penetration testers.
Provides a comprehensive guide to web application security, covering topics such as web application vulnerabilities, attack techniques, and mitigation strategies. It valuable resource for anyone looking to learn more about the threats to web applications and how to protect them.
Provides a comprehensive guide to malware analysis, covering topics such as malware classification, reverse engineering, and analysis techniques. It valuable resource for anyone looking to learn more about the techniques used by malware analysts.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to You're Compromising Your Company's Security. Here's How..
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser