AWR385 – 6.50 Hours

Schedule

EC AWR385 38 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought challenges and exercises as a framework, students will learn about: 

  • The purpose of Enterprise Mobile Management platforms 
  • Elements that make mobile networks and operating systems different
  • Mobile malware classifications and detection strategies
  • Mobile architecture data leakage detection and prevention strategies.

This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program.  

Prerequisites

  • Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us for more information on the approval process.
  • Internet access

One of the following web browsers:

  • Adobe Flash Player 9 or later
  • Internet Explorer (v7.0 or later)
  • Mozilla Firefox (v2.0.0.6 or later)
  • Opera (v9.23 or later)
  • Apple Safari (v3.0.3 or later for Windows, v2.0.4 or later for MacOS)
  • Google Chrome (v48.0.2564 or later)
  • Microsoft Edge (v27.11099 or later)

Course Completion Requirements

Students must earn a minimum score of 70% on all module post-tests to receive their certificate.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.

Recommended

  • Basic Windows user skills
  • A fundamental knowledge of computer networking concepts
  • A fundamental knowledge applications found on mobile devices

Topics

  • Describe the Enterprise Mobility Management (EMM) platform
  • Identify the components of the Enterprise Mobility Management platform
  • Explain the purpose of an effective Enterprise Mobility Management (EMM) strategy
  • Recognize the basic concepts of Bring Your Own Device (BYOD)
  • Describe the basic components of Mobile Application Management (MAM) systems
  • Describe the basic components of Mobile Device Management (MDM) systems
  • Describe the basic components of Mobile Content Management (MCM) systems
  • Explain the functional differences between wired and wireless networks

Suggested Audience

The target audience for this course is open to but not limited to anyone in Citizen/Community Volunteer, Emergency Management, Emergency Medical Services, Fire Service, Governmental Administrative, Healthcare, Information Technology, Law Enforcement and Public Safety Communications.

Government Programs

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]

Back to top