Mobile Security

Mobile Security involves protecting both personal and business information stored on and transmitted from smartphones, tablets, laptops, and other mobile devices. Coursera's Mobile Security catalogue teaches you about safeguarding mobile devices against various types of threats such as malware, data leakage, and unauthorized access. You'll learn about mobile encryption methods, secure coding techniques for mobile application development, and how to conduct mobile device audits. Furthermore, you'll gain insights into the latest mobile security technologies and protocols, how to create and implement mobile security policies, and how to respond to and mitigate mobile security breaches. This skill is essential for anyone involved in mobile device management, application development, IT security, or anyone interested in protecting their own mobile data.
24credentials
69courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "mobile security"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Malware Protection, Network Security, Information Systems Security, Security Controls, Cybersecurity, Data Security, Mobile Security, Computer Security Awareness Training, Wireless Networks, Authentications, Human Factors (Security), Threat Detection, Encryption, User Accounts

  • Status: New
    Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Status: New

    Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Network Security, Personally Identifiable Information, Authentications, Data Security, Mobile Security, Identity and Access Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Hardware Troubleshooting, Network Troubleshooting, Desktop Support, Test Equipment, Networking Hardware, Computer Hardware, Mobile Security, Technical Support, Data Maintenance, Peripheral Devices, Computer Displays, Data Storage, Wireless Networks

  • Status: New
    Status: Free Trial

    Skills you'll gain: Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Threat Detection, Data Integrity, Graphical Tools, Digital Communications, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Mobile Development Tools, Data Storage, Real Time Data, Disaster Recovery, Network Analysis, Regulation and Legal Compliance

  • Status: Free Trial

    Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security

  • Status: Free Trial

    Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Encryption, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines

  • Status: New
    Status: Free Trial

    Skills you'll gain: Google Workspace, Gmail, Lightweight Directory Access Protocols, Authorization (Computing), Active Directory, System Monitoring, User Accounts, Email Security, Network Monitoring, Data Governance, Cloud Security, Endpoint Security, Continuous Monitoring, Mobile Security, Compliance Auditing, Data Security, Configuration Management, Incident Management, Application Deployment, Annual Reports

  • Status: Free Trial

    Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity

  • Status: New
    Status: Free Trial

    Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Investigation, Security Controls, Security Strategy, Risk Analysis

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk