About this course
Device management is the process of managing the implementation, operation and maintenance of digital devices and its applications/software. It includes various administrative tools and processes for the maintenance and upkeep of a device.
Device management is broken down into three aspects: Device security, Device hygiene, and application security.
During this module, the participants will gain an understanding of the following key topics:
- Identifying and Interpreting device vitals warnings
- Troubleshooting and fixing
- Learn to keep their device software up-to-date
- Learn how to install and uninstall software
- Device security awareness
These tools will be necessary for the trainer
to prepare before conducting the training.
These tools will be necessary for the trainee
to have during the training.
•USB flash drive
•Colored electric tape
•Post-it notes (multiple colors)
•Markers (multiple colors)
Application (Software, App): Is a computer program designed to carry out a specific task typically to be used by end-users.
Patches (Software Updates): These are changes to a computer program/application/ software intended to fix, or improve it. This includes fixing security vulnerabilities and other bugs.
Vulnerabilities: weaknesses in the application which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
Anti-virus: These are programs created to help protect your device from malware. It mainly looks at data web pages, files, software, applications.
Bug, Glitch, (Software bugs): A digital footprint or digital shadow refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or digital devices.
An exploit: This is a piece of software that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on
computer software, hardware.
Piracy: This is the illegal copying, distribution, or use of software.
License software: is a document that provides legally binding guidelines for the use and distribution of software. There are 2 types of software license; proprietary or open source.
Malware: An umbrella term for Malicious Software, very likely containing a virus or an otherwise malicious software application.
Virus: Viruses are usually attached to a program or file. They are generally executable files and can only be run when ordered to do so by the user.
Trojan: This is malware which comes disguised as “legitimate” software – often in cracked versions of proprietary software. They are often designed to steal information and transmit it over the internet. This is one reason that genuine software is always preferable to pirated, cracked software.
Spyware: Malware which records users’ activities on a computer; a common example of this is a keylogger, but it can be far more advanced.
Worm: Worms are similar to trojans but have the unique characteristics of being able to copy and send themselves from computer to computer (or other devices). A well-known example was the I Love You worm.
Digital technology: Digital technology is any hardware or software that generates, stores and process data or content.
Digital FootPrints/Shadows: A digital footprint or digital shadow refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or digital devices.
Mobile device– A piece of portable electronic equipment that can connect to the internet, especially a smartphone or tablet computer.
Safety– A condition of being protected from or unlikely to cause danger, risk, or injury.
Mobile safety-is the protection of smartphones, tablets, and laptops from threats associated with wireless computing.