Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Mobile Devices, Security, and Operational Procedures

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course provides a thorough exploration of mobile devices, security practices, and essential operational procedures in IT. You will begin by understanding the key components of portable computing devices like laptops and mobile phones, learning how to maintain, troubleshoot, and optimize these devices for optimal performance. As you dive deeper, you'll explore the distinct operating systems of Android, iOS, and mobile security, focusing on how to safeguard personal and corporate data through multifactor authentication (MFA) and mobile device management (MDM). The course includes practical strategies for maintaining mobile devices, from synchronization to e-mail configuration, while also emphasizing how to detect and troubleshoot security issues on mobile platforms. You'll gain the technical expertise needed to handle security vulnerabilities like malware, social engineering attacks, and data breaches, as well as preventive measures for securing endpoint systems. Operational procedures such as data handling, change management, and incident response will also be covered, ensuring you are well-equipped to manage IT operations effectively and securely. This course is aimed at IT professionals, helpdesk technicians, and anyone interested in mobile device management and security best practices. Beginners will find it accessible, with no prior experience required, though a basic understanding of general IT concepts will be beneficial. The course provides an essential foundation for those looking to specialize in mobile device security or improve their general IT operational knowledge. By the end of the course, you will be able to troubleshoot mobile devices, secure them using modern authentication methods, handle endpoint security, and manage IT operations like backups, data destruction, and ticketing systems. You will also be equipped to work with mobile device synchronization, configuration, and recovery procedures in both personal and enterprise environments.

Syllabus

  • Portable Computing
    • In this module, we will focus on portable computing, covering laptop features, hardware troubleshooting, and power management. You’ll learn to identify and resolve common laptop issues, understand essential settings, and optimize power consumption for mobile devices.
  • Mobile Devices
    • In this module, we will explore mobile devices, focusing on Android and iOS. You’ll gain hands-on experience with customization options, app management, and settings unique to each platform, ensuring you can effectively work with both types of devices.
  • Maintaining and Securing Mobile Devices
    • In this module, we will cover the best practices for maintaining and securing mobile devices. You’ll learn how to keep devices in top shape through regular maintenance and troubleshooting, as well as how to implement robust security measures to protect sensitive data.
  • Printers and Multifuction Devices
    • In this module, we will delve into the installation and sharing of printers in networked environments. You will learn how to configure local and shared printers, as well as troubleshoot common problems to ensure efficient printer management in your IT environment.
  • Essential Security Practices
    • In this module, we will cover essential security practices, from identifying and mitigating threats to managing physical security measures. You’ll also explore password management and multi-factor authentication (MFA) to ensure the safety of systems and data.
  • Securing Endpoint Systems
    • In this module, we will explore how to secure endpoint systems from malware and other security threats. You will learn to recognize and respond to malicious attacks, manage licenses, and implement proper procedures for incident response and system security.
  • Operational Procedures
    • In this module, we will focus on operational procedures essential for IT professionals. You will learn about effective documentation practices, change management, backup strategies, and data destruction methods to maintain operational efficiency and security in your IT environment.

Taught by

Packt - Course Instructors

Reviews

Start your review of Mobile Devices, Security, and Operational Procedures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.