End User Mobile Security

This course should give you basic ideas on importance of mobile device security, what needs to be protected on mobile device, who should be responsible for mobile device security and what are basic thing you need to do in order to reach that goal.

Course Content



End User Mobile Security
Importance of Mobile Security


End User Mobile Security


End User Mobile Security
Course Description

Many organizations have begun allowing employees to use their personal devices for work purposes. Although convenient for users, the concept of Bring your Own Device (BYOD) has opened companies up to many security issues.

Therefore, users must know the risks of having personal mobile devices in the office and the best practices for mitigating those risks. This course is designed with the end-user in mind, and serves as the ideal starting point for anyone looking to enter the cyber security field and ultimately raise their threat awareness.

Through this curriculum, you will learn the differences between the security considerations for personal and work devices and the importance of following company policy when using personal devices at work. You will also gain a thorough understanding of what device permissions are and how/when to use them to keep your mobile device free of malware. The course also explores rooting and jailbreaking testing methods and how these methods should not be used for personal devices.


For this course you need no special previous knowledge.

Course Goals

By the end of this course, students should be able to:

  • The importance of mobile device security?
  • What kind of threats are directed towards mobile devices?
  • Points where you should apply security measures on mobile devices?
  • * How should mobile device security be organized?

    This course is part of a Career Path:
    No items found.

    Instructed by

    Milan Cetic

    I am seasoned IT professional with more than two decades of experience. I have been working as IT journalist, reviewing and testing hardware and software. I have worked as a pre-sales consultant for 15 years. I worked on small to very large projects in various industries and countries. At one point I was sole pre-sales contact for almost 20 countries and over 500 customers. I have been working in Hewlett Packard and HP Inc. as a specialist for printers and printing solutions as well as for PCs and PC solutions. I have substantial experience in solution selling. I also worked as an HP Supplies Trainer. I help customers and channel partners understand the benefits in using original supplies.

    I am known for finding ways to teach complex concepts and technological solutions for people that do not have an IT background. I am rather famous for my car metaphors, which I have chosen as something that almost everybody understands.

    After 15 years of working for a large company, I have decided to go independent and pursue my professional interests as independent consultant, with emphasis on security consulting.

    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a End User Mobile Security Certificate of Completion