Apple Device Security From Silicon to Cloud - Complete Security Stack Explained

Apple Device Security From Silicon to Cloud - Complete Security Stack Explained

Jamf via YouTube Direct link

22:41 Inventory Methods: MDM Queries and Declarative Status Updates

9 of 18

9 of 18

22:41 Inventory Methods: MDM Queries and Declarative Status Updates

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Apple Device Security From Silicon to Cloud - Complete Security Stack Explained

Automatically move to the next video in the Classroom when playback concludes

  1. 1 0:00 Introduction: Device Security From the Silicon Up
  2. 2 3:50 System-on-Chip SOC and Secure Enclave Overview
  3. 3 4:53 Boot ROM and Cryptographic Chain of Trust
  4. 4 8:57 System Integrity Protection SIP for macOS
  5. 5 9:43 File Vault and Data Protection Encryption
  6. 6 10:41 Runtime Security: Gatekeeper, XProtect, and Notarization
  7. 7 18:37 Review: Apple Platform Security Foundation
  8. 8 20:40 Management Enrollment: Supervised vs User Enrollment
  9. 9 22:41 Inventory Methods: MDM Queries and Declarative Status Updates
  10. 10 23:23 Managed Device Attestation for Hardware Verification
  11. 11 25:31 Legacy MDM vs Declarative Device Management DDM
  12. 12 29:05 Jamf App Catalog for Third-Party Application Patching
  13. 13 31:00 Platform SSO: Passwordless Provisioning and Authentication
  14. 14 32:48 Layer 8: The Human Element in Security
  15. 15 37:10 Jamf Network Relay Service for Zero-Trust Remote Access
  16. 16 38:10 Executive Threat Protection for High-Profile Mobile Users
  17. 17 42:53 Big Hammers: Lockdown Mode and Executive Threat Protection
  18. 18 43:43 AI Assistant for Holistic Risk Reporting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.