Loading...
Login / Register

CompTIA Mobility+

The CompTIA Mobility+ certification exam certifies that the successful candidate has the knowledge and skills required to understand and research capabilities of mobile devices and features of over-the-air technologies. ... Show More
Course Prerequisites:
It is recommended that CompTIA Mobility+ candidates have a CompTIA Network+ certification or equivalent workin... Show More
Add to Cart Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Course Price (ILT)
R7,827.82

* incl. VAT

Duration
5 Days

Course Content

1.0 Over-the-Air Technologies

1.1 Compare and contrast different cellular technologies

    • CDMA
    • TDMA
    • GSM
    • Edge
    • GPRS
      • WiMAX
      • UMTS
      • CSD
      • EVDO
      • HSPA
      • HSPA+
      • LTE
      • Roaming & switching between network types

See fewer details

1.2 Given a scenario, configure and implement WiFi client technologies using appropriate options.

      • Bluetooth
      • PAN
      • 802.11a, b, g, n, ac
      • Relevant operating frequencies and channels
        • SSID
      • Broadcast/hidden system
        • Authentication methods
        • Portable hotspots

+ See more details

1.3 Compare and contrast RF principles and their functionality

      • RF characteristics
      • Frequencies
      • Modulation
      • Bandwidth
      • Wavelength
      • Amplitude
      • Phase
        • Propagation theory
      • Absorption
      • Refraction
      • Reflection
      • Attenuation
      • Interference
        • Antennas
      • Omni-directional
      • Semi-directional
      • Bi-directional
      • YAGI
      • Parabolic dish
        • Faraday cage

+ See more details

1.4 Interpret site survey to ensure over the air communication

      • Capacity
      • Coverage
      • Signal strength
      • Receive Signal Strength Indicator
      • Spectrum analysis
      • Frequency analysis
      • Site survey documentation / site map
      • Wireless vs. cellular site survey
        • Post-site survey

+ See more details

2.0 Network Infrastructure

2.1 Compare and contrast physical and logical infrastructure technologies and protocols

      • Topologies
      • Mesh
      • Point-to-point
      • Point-to-multipoint
      • Adhoc
        • Firewall settings
      • Port configuration
      • Protocols
      • Filtering
      • DMZ
        • Devices
      • Gateways
      • Proxies
      • VPN concentrator
      • Autonomous access points
      • Wireless LAN
      • Controller
      • Lightweight AP
        • Services and settings
      • ActiveSync
      • Dynamic VLAN
      • Subnetting

+ See more details

2.2 Explain the technologies used for traversing wireless to wired networks.

      • Bandwidth and user limitations
      • Backhauling traffic
      • QoS
      • Traffic shaping
        • Hardware differences
        • Traffic routing
        • IP addressing
      • TCP
      • UDP
      • NAT
      • DNS
      • DHCP
        • MAC address
        • SNMP
        • ICMP
        • PoE for APs to switches

+ See more details

2.3 Explain the layers of the OSI model.

      • Layer 1 –Physical
      • Layer 2 –Data link
      • Layer 3 –Network
      • Layer 4 –Transport
      • Layer 5 –Session
      • Layer 6 –Presentation
      • Layer 7 –Application

+ See more details

2.4 Explain disaster recovery principles and how it affects mobile devices.

      • Server backups
      • Device backups
      • Directory services server
      • Frequency of backups
      • High availability
      • DR locations

+ See more details

2.5 Compare and contrast common network ports and protocols for mobile devices

  • 20/21 –FTP
  • 22 –SFTP
  • 23 –Telnet
  • 25 –SMTP
  • 53 –DNS
  • 80 –HTTP
  • 110 –POP3
  • 135 –MAPI
  • 143 –IMAP
  • 389 –LDAP/AD
  • 443 –SSL
  • 465 –SSMTP
  • 587 –Alternate SMTP
  • 990 –ftps
  • 993 –IMAP over SSL
  • 2175 –Airsync
  • 2195 –APNS
  • 2196 –Feedback
  • 3389 –RDP
  • 4101 –SRP
  • 5223 –Jabber
  • 5228-5230 –GCM

+ See more details

3.0 Mobile Device Management

3.1 Explain policy required to certify device capabilities.

  • Adherence to IT policies and security policies
  • Balance security with usability
    • Differences between vendor default applications
    • OS modifications and customization
  • OS vendor
  • OEM
  • Telecommunication vendor
    • Backup, Restore and Recovery policies

+ See more details

3.2 Compare and contrast mobility solutions to enterprise requirements.

  • Mobile Device Management
  • Password strength
  • Remote wipe
  • Remote lock/unlock
  • Application store
    • Mobile application management
    • Application store
    • Pushing content
    • Device platform support
    • Infrastructure support
    • On-premise vs. SaaS
    • Administrative permissions
    • Multi-instance
    • High availability
    • Device groupings
    • Location-based services
  • Geo-location
  • Geo-fencing
    • Monitoring and reporting capabilities and features
    • Interoperability with other products/devices
    • Telecommunication expense management
    • Self-service portal
    • Captive portal

+ See more details

3.3 Install and configure mobile solutions based on given requirements.

    • Liaise with appropriate personnel to ensure infrastructure can accept solutions
    • Profile creation
    • Directory services setup
    • Initial certificate issuance
    • EULA
    • Sandboxing
    • Containerization
    • Group profiles based on given requirements
    • Corporate-owned
    • BYOD
    • Executive
    • Management
    • Consultant
    • B2B
      • Initiate pilot, testing and evaluation
      • Create and update documentation
      • Report feedback post-pilot
      • SDLC
      • Approve, train and launch

+ See more details

3.4 Implement mobile device on-boarding and off-boarding procedures.

      • Device activation on cellular networks
      • Mobile hardware that facilitates OTA access
      • Wireless cards, cellular cards, SD cards
        • On-boarding and provision process
      • Manual
      • Self-service
      • Batch
      • Remote
      • IMEI or ICCID
      • Device enrollment (SCEP)
      • Profile installations
        • Off-boarding and de-provisioning
      • Employee terminations
      • Migrations
      • Applications
      • Content
      • Recycle
      • Proper asset disposal
      • Deactivation

+ See more details

3.5 Implement mobile device operations and management procedures.

      • Centralized content and application distribution and content management system
      • Distribution methods
      • Server-based
      • Content updates/changes
      • Application changes
      • Permissions
      • Deployment best practices
      • Number of devices
      • Number of users
        • Remote capabilities
      • Lock/unlock
      • Remote wipe
      • Remote control
      • Location services
      • Reporting
        • Lifecycle operations
      • Certificate expiration/renewal
      • Updates
      • Upgrades
      • Patches
        • Change management
        • End of life
      • OSs
      • Devices
      • Applications

+ See more details

3.6 Execute best practice for mobile device backup, data recovery and data segregation.

      • Device backup for corporate data to corporate server
      • Device backup of personal data to vendor/third party server
      • Backup to local device: internal storage, SD card, SIM
      • Data recovery
      • Testing backups
      • Restoring corporate data
      • Restoring personal data

+ See more details

3.7 Use best practices to maintain awareness of new technologies including changes that affect mobile devices.

      • OS vendors
      • OEMs (hardware)
      • Telecommunication vendors
      • Third party application vendors
      • New risks and threats

+ See more details

3.8 Configure and deploy mobile applications and associated technologies

      • Messaging standards
      • MAPI
      • IMAP
      • POP
      • SMTP
        • Vendor proxy and gateway server settings
        • Information traffic topology
      • Third party NOC vs. on-premise vs. hosted
        • Push notification technologies
      • APNS
      • GCM
      • ActiveSync
      • In-house application requirements
      • App publishing
      • Platforms
      • Vendor requirements
      • Certificates
      • Data communication
        • Types of mobile applications
      • Native app
      • Web app
      • Hybrid app

+ See more details

4.0 Security

4.1 Identify various encryption methods for securing mobile environments.

      • Data in-transit
      • IPSEC
      • VPN
      • SSL
      • HTTPS
      • WPA/TKIP
      • WPA2
      • TLS
      • SRTP
      • RSA
      • WEP
      • SSH
      • RC4
      • CCMP
      • EAP methods
        • Data at rest
      • AES
      • DES
      • 3DES
      • Two-Fish
      • ECC
        • Full disk encryption
        • Block level encryption
        • File level encryption
        • Folder level encryption
        • Removable media encryption

+ See more details

4.2 Configure access control on the mobile device using best practices.

      • Authentication concepts
      • Multifactor
        • Biometric
        • Credentials
        • Tokens
        • Pin
      • Device access
      • Wireless networks
        • Enterprise vs. personal
      • Application access
        • PKI concepts
        • Certificate management
        • Software-based container access and data segregation

+ See more details

4.3 Explain monitoring and reporting techniques to address security requirements

      • Device compliance and report audit information
      • Third party device monitoring applications (SIEM)
      • Monitor appropriate logs pertaining to mobile device activity/traffic

+ See more details

4.4 Explain risks, threats and mitigation strategies affecting the mobile ecosystem.

      • Wireless risks
      • Rogue access points
      • DoS
      • Tower spoofing
      • Jamming
      • Warpathing
      • Man-in-the-middle
      • Weak keys
        • Software risks
      • App store usage
      • Virus
      • Trojans
      • Worm
      • Malware
      • Spyware
      • Jailbreak
      • Rooting
      • Keylogging
      • Unsupported OS
        • Organizational risks
      • BYOD ramifications
      • Securing personal devices
      • Removable media
      • Wiping personal data
      • Unknown devices on network/server
        • Hardware risks
      • Device cloning
      • Device theft
      • Device loss
        • Mitigation strategies
      • Antivirus
      • Software firewalls
      • Access levels
      • Permissions
      • Host-based and network-based IDS/IPS
      • Anti-malware
      • Application sandboxing
      • Trusted platform modules
      • Data containers
      • Content filtering
      • DLP
      • Device hardening
      • Physical port disabling

+ See more details

4.5 Given a scenario, execute appropriate incident response and remediation steps

      • Incident identification
      • Determine and perform policy-based response
      • Report incident
      • Escalate
      • Document
      • Capture logs

+ See more details

5.0 Troubleshooting

5.1 Given a scenario, implement the following troubleshooting methodology.

      • Identify the problem
      • Information gathering
      • Identify symptoms
      • Question users
      • Determine if anything has changed
        • Establish a theory of probable cause
      • Question the obvious
        • Test the theory to determine cause
      • Once theory is confirmed determine next steps to resolve problem
      • If theory is not confirmed re-establish new theory or escalate
        • Establish a plan of action to resolve the problem and identify potential effects
        • Implement the solution or escalate as necessary
        • Verify full system functionality and if applicable implement preventative measures
        • Document findings, actions and outcomes

+ See more details

5.2 Given a scenario, troubleshoot common device problems.

      • Battery life
      • Sync issues
      • Power supply problems
      • Password reset
      • Device crash
      • Power outage

+ See more details

5.3 Given a scenario, troubleshoot common application problems.

      • Missing applications
      • Configuration changes
      • App store problems
      • Email issues
      • Location services problems
      • OS and application upgrade issues
      • Profile authentication and authorization issues

+ See more details

5.4 Given a scenario, troubleshoot common over-the-air connectivity problems.

      • Latency
      • No cellular signal
      • No network connectivity
      • Roaming issues
      • Cellular activation
      • Email issues
      • VPN issues
      • Certificate issues
      • APN issues
      • Port configuration issues
      • Network saturation

+ See more details

5.5 Given a scenario, troubleshoot common security problems.

    • Expired certificate
    • Authentication failure
    • Firewall misconfiguration
    • False positives
    • False negatives
    • Non-expiring passwords
    • Expired passwords
    • Content filtering misconfigured

+ See more details

CTU Training Solutions , Updated: May 8th, 2018

Share with friends

Request a Quote



Your Name

Your Surname

Contact Number

Your Email

Company

Which campus would you like to study at?

Your job title

Will your training be sponsored?

Message

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
Logo
0861 100 395
[email protected]
www.ctutraining.ac.za

X

Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:


Contact Number:

Choose a campus