About this course
The proliferation of consumer devices and ubiquitous information access is driving the enterprise away from a device-centric model centered on corporate-owned and provisioned devices to a bring-your-own-device (BYOD) model in which employees use their own devices to access corporate applications and data. Workers expect consistent access to corporate tools and data regardless of the type of device they’re using. They also want their corporate-issued technology and resources to look and behave like their personal technology—always on and always available from any device, from virtually anywhere.
An enterprise model that supports the use of consumer devices in the workplace and the ability to work from virtually anywhere and anytime must move from a device-focused view of IT management to one that’s people centric. In reality it is not the device that is mobile, it is the users.
It is important that the IT challenges of BYOD, Mobile device management, cloud computing, and hybrid identities be understood before one can understand how Windows 10 helps address those issues.
What you'll learn
- Define the challenges of enabling mobility
- Compare the design options to enable a mobile workforce
- Use the new Windows 10 features to support secure mobile access and hybrid identity
Study the enterprise model that supports the use of consumer devices in the workplace and the ability to work from virtually anywhere and anytime must move from a device focused view of IT management to one that’s people centric. In reality it is not the device that is mobile, it is the users.
Week 2: Moving Your Identity to Azure
Regardless of the specific technologies that organizations use to implement cloud computing solutions, we will look at the essential characteristics that are part of a cloud computing solution.
Week 3: Building a Strategy to Enable a Mobile Workforce
In this module we look at the elements needing to be addressed for building enterprise strategy, i.e. Users, Devices, Data, and Apps. As well as the new business threats introduced in this mobile first world.
Week 4: Data Access and Protection
Here we look at various services and tools to allow secure access to corporate data.
Pursue a Verified Certificate to highlight the knowledge and skills you gain $99.00
Official and Verified
Receive an instructor-signed certificate with the institution's logo to verify your achievement and increase your job prospects
Add the certificate to your CV or resume, or post it directly on LinkedIn
Give yourself an additional incentive to complete the course
Support our Mission
EdX, a non-profit, relies on verified certificates to help fund free education for everyone globally