Reinvent your training with agile, tailor-made solutions.
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

AirWatch Device Management training covers the essential aspects of setting up, managing, and securing mobile devices in a business environment. It covers advanced AirWatch features to ensure effective device management.

Who is this training for ?

For whom ?

This training is aimed at system administrators, IT managers, network engineers and anyone responsible for managing mobile devices within an organization. It is also suitable for professionals wishing to strengthen their skills in the field of mobile device management and data security.

Prerequisites

  • Basic computer knowledge
  • Mobile device user experience

Training objectives

  • Configure, manage, and secure mobile devices using the AirWatch platform
  • Deploy security policies
  • Monitor and troubleshoot device issues
  • Manage applications
  • Ensure device compliance to company standards  
  • Training program

      • Introduction to AirWatch and its features
      • Initial configuration of the AirWatch portal
      • Managing users and groups
      • Assigning roles and permission
        Les principes de base et les capacités de Unified Endpoint Management avec la plate-forme Workspace ONE Résumer la mise en oeuvre de base de Workspace ONE UEM
        La gestion moderne de Windows avec Workspace ONE UEM
        s
      • Creating and configuring security profiles
      • Deploying compliance policies
      • Monitoring device compliance
      • Managing certificates and keys
      • Integration and management of internal and public applications
      • Application distribution and updating
      • License and version management
      • Configuration of applications application policies
      • Monitor device health
      • Detect and resolve connection issues
      • Manage alerts and notifications
      • Log analysis and reports
      • Integration with cloud services (Office 365, Google Apps, etc.)
      • Configuring single sign-on (SSO)
      • Integration with directories enterprise (Active Directory, LDAP, etc.)
      • Synchronizing users and groups
      • Advanced security strategies for mobile devices
      • Securing data and communications
      • Handling lost or stolen devices
      • Updates security and patches
    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • don’t have a program yet

    • 629
    • 35 h

    Submit your review

    Translated By Google Translate