Scroll to top button

Mobility+ Mobile Computing Deployment and Management (Course & Labs)

ISBN : 9781616917470

Gain hands-on expertise in CompTIA Mobility+ certification exam with Mobility+ Mobile Computing Deployment and Management course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. This course and labs focus on the objectives covered in Mobility+ exam and provide an understanding of how computer networking technology and radio frequency technology work together to create wireless networks.

The Mobility+ certification is geared toward candidates that have CompTIA Network+ certification or equivalent experience and working knowledge of and at least 18 months of work experience in the administration of mobile devices. The exam covers common networking protocols, standards-based wireless networking, cellular technology, mobility, mobile device management, security, device backup, and troubleshooting.

Glossary of terms
Pre Assessment Questions
Post Assessment Questions
Performance lab
Video tutorials

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Exam related FAQs
What are the prerequisites for this exam? There are no prerequisites for the exam, but both CompTIA and uCertify recommend individuals have 18 months experience in a mobile environment. CompTIA Network+ certification and 12 months networking experience is strongly encouraged.
What is the exam registration fee? USD 269
Where do I take the exam? Pearson VUE 
What is the format of the exam? The exam consists of multiple-choice questions.
How many questions are asked in the exam? The exam contains 100 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 720

(on a scale of 0-900)

What is the exam's retake policy?

Mobility+(MB0-001) examination, CompTIA's retake policy is:

  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
What is the validity of the certification? CompTIA Mobility+ certification expires after three years from the date of issue, after which the certification holders will need to renew their certification via CompTIA's Continuing Education Program.
Where can I find more information about this exam? To know more about the MB0-001-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Mobility engineer
  • Network administrator
  • Mobility architect
  • Security administrator
  • Network Types
  • Network Topologies
  • The OSI Model
  • Device Addressing
  • Summary
  • Chapter Essentials
  • The Internet Protocol Suite
  • Request for Comments (RFC)
  • Common Network Protocols and Services
  • Understanding Ports, Protocols, and Sockets
  • Secure Sockets Layer (SSL)
  • Common Protocols for File Transfer
  • Common Protocols Used with Messaging
  • Other Common Protocols
  • Summary
  • Chapter Essentials
  • Radio Frequency Fundamentals
  • RF Regulatory Governing Bodies and Local Regulatory Authorities
  • Radio Frequency Characteristics
  • Bandwidth
  • Modulation
  • Radio Frequency Range and Speed
  • Measurement Units of Radio Frequency
  • Radio Frequency Antenna Concepts
  • Antenna Types
  • Minimizing the Effects of Multipath Using Antenna Diversity
  • Distributed Antenna System (DAS)
  • Radio Frequency Cables and Connectors
  • Antenna Installation Considerations
  • Summary
  • Chapter Essentials
  • The IEEE
  • IEEE Standards for Wireless Communication
  • Wireless Networking and Communications
  • Interoperability Certifications
  • Common IEEE 802.11 Deployment Scenarios
  • Building-to-Building Connectivity Using Wireless LAN Technology
  • Summary
  • Chapter Essentials
  • Wireless LAN Operating Frequencies and RF Channels
  • Wireless LAN Modes of Operation
  • IEEE 802.11 Physical Layer Technology Types
  • Wireless LAN Coverage and Capacity
  • Radio Frequency Signal Measurements
  • Connecting to an IEEE 802.11 Wireless Network
  • The Distribution System
  • Data Rates
  • Throughput
  • Dynamic Rate Switching
  • Wireless LAN Transition or Roaming
  • IEEE 802.11 Power Save Operations
  • IEEE 802.11 Protection Modes and Mechanisms
  • Summary
  • Chapter Essentials
  • The Wireless Access Point
  • Wireless Mesh
  • Wireless Bridges
  • Wireless Repeaters
  • Wireless LAN Controllers and Cloud-Managed Architectures
  • Power over Ethernet
  • Virtual Private Network (VPN) Concentrators
  • Network Gateways
  • Proxy Servers
  • Summary
  • Chapter Essentials
  • The Evolution of Cellular Communications
  • Channel Access Methods
  • Circuit Switching vs. Packet Switching Network Technology
  • Mobile Device Standards and Protocols
  • WiMAX
  • Roaming between Different Network Types
  • Summary
  • Chapter Essentials
  • Wireless Site Surveys
  • Gathering Business Requirements
  • Interviewing Stakeholders
  • Gathering Site-Specific Documentation
  • Identifying Infrastructure Connectivity and Power Requirements
  • Understanding Application Requirements
  • Understanding RF Coverage and Capacity Requirements
  • Client Connectivity Requirements
  • Antenna Use Considerations
  • The Physical Radio Frequency Site Survey Process
  • Radio Frequency Spectrum Analysis
  • Received Signal Strength
  • Performing a Manual Radio Frequency Wireless Site Survey
  • Performing a Predictive Modeling Site Survey
  • Performing a Post-Site Survey
  • Protocol Analysis
  • RF Coverage Planning
  • Infrastructure Hardware Selection and Placement
  • Testing Different Antennas
  • Wireless Channel Architectures
  • Wireless Device Installation Limitations
  • Site Survey Report
  • Summary
  • Chapter Essentials
  • Local Area Network and Wide Area Network Traffic Flow
  • Network Subnets
  • IP Subnetting
  • Network Traffic Shaping
  • Summary
  • Chapter Essentials
  • Mobile Device Management Solutions
  • Common Mobile Device Operating System Platforms
  • The Mobile Application Store
  • Pushing Content to Mobile Devices
  • MDM Administrative Permissions
  • Understanding MDM High Availability and Redundancy
  • MDM Device Groups
  • Location-Based Services
  • Mobile Device Telecommunications Expense Management
  • Captive and Self-Service Portals
  • Summary
  • Chapter Essentials
  • General Technology Network and Security Policy
  • Information Technology and Security Policy Implementation and Adherence
  • Backup, Restore, and Recovery Policies
  • Operating System Modifications and Customization
  • Technology Profiles
  • Understanding Group Profiles
  • Policy and Profile Pilot Testing
  • Summary
  • Chapter Essentials
  • System Development Life Cycle (SDLC)
  • Pilot Program Initiation, Testing, Evaluation, and Approval
  • Training and Technology Launch
  • Documentation Creation and Updates
  • Mobile Device Configuration and Activation
  • Wireless LAN, Cellular Data, and Secure Digital Adapters
  • Mobile Device Management Onboarding and Provisioning
  • Mobile Device Management Offboarding and Deprovisioning
  • Summary
  • Chapter Essentials
  • Centralized Content, Application Distribution, and Content Management Systems
  • Content Permissions, Data Encryption, and Version Control
  • Mobile Device Remote Management Capabilities
  • Life Cycle Operations
  • Information Technology Change Management
  • The Technology End-of-Life Model
  • Deployment Best Practices
  • Summary
  • Chapter Essentials
  • Maintaining Awareness of Mobile Technology Advancements
  • Configuration of Mobile Applications and Associated Technologies
  • In-House Application Requirements
  • Mobile Application Types
  • Configuring Messaging Protocols and Applications
  • Configuring Network Gateway and Proxy Server Settings
  • Push Notification Technology
  • Information Traffic Topology
  • Summary
  • Chapter Essentials
  • Understanding Risks with Wireless Technologies
  • Understanding Risks Associated with Software
  • Understanding Risks Associated with Mobile Device Hardware
  • Understanding Risks Affecting Organizations
  • Summary
  • Chapter Essentials
  • Access Control
  • Authentication Processes
  • Encryption Methods for Wireless Networking
  • Cipher Methods
  • Secure Tunneling
  • Public Key Infrastructure (PKI) Concepts
  • Physical Media Encryption
  • Summary
  • Chapter Essentials
  • Device Compliance and Report Audit Information
  • Third-Party Device Monitoring Applications (SIEM)
  • Understanding Mobile Device Log Files
  • Mitigation Strategies
  • Summary
  • Chapter Essentials
  • Network Server and Mobile Device Backup
  • Backing Up Server Data
  • Backing Up Client Device Data
  • Disaster Recovery Principles
  • Maintaining High Availability
  • Restoring Data
  • Summary
  • Chapter Essentials
  • The Troubleshooting Process
  • Understanding Radio Frequency Transmitters and Receivers
  • Troubleshooting Specific Problems
  • Common Over-the-Air Connectivity Problems
  • Troubleshooting Common Security Problems
  • Summary
  • Chapter Essentials
  • Introduction
  • Air Technologies
  • Network Infrastructure
  • Wireless Technology
  • Mobile Device Management
  • Wireless Device Management
  • Security
  • Encryption methods and Risks
  • Wireless Troubleshooting
  • Conclusion

Hands on Activities (Labs)

  • Identifying network categories
  • Creating a wireless ad hoc network
  • Identifying a network topology
  • Identifying network topologies
  • Identifying peer-to-peer network
  • Identifying OSI layer functions
  • Identifying OSI layers
  • Identifying connectionless communication
  • Understanding data encapsulation
  • Identifying TCP/IP protocol layers
  • Understanding RFC
  • Identifying network protocols
  • Viewing DHCP Information
  • Understanding Ports
  • Understanding SSL
  • Installing FTP client software
  • Installing FTP server software
  • Understanding POP3 process
  • Identifying port numbers
  • Understanding GCM
  • Identifying steps in SMTP process
  • Allowing RDP connections
  • Understanding radio transmission
  • Identifying ITU-R administrative regions and geographic locations
  • Understanding frequency
  • Understanding radio frequency range
  • Understanding power measurement units
  • Performing a wireless site survey
  • Understanding sector antennas
  • Understanding passive DAS
  • Understanding Impedance
  • Identifying IEEE 802.11n amendment details
  • Understanding wide area network
  • Understanding IEEE 802.11 standard
  • Connecting computers on a SOHO network to the Internet
  • Understanding point to point connections
  • Configuring SSID
  • Identifying service set configurations
  • Configuring network adapter property
  • Connecting to hidden wireless networks
  • Understanding spread spectrum technology
  • Understanding open system authentication
  • Understanding shared-key authentication
  • Connecting a distribution system
  • Viewing data rate
  • Understanding IEEE 802.11n
  • Setting power save mode
  • Configuring a wireless access point
  • Identifying mesh access point connection
  • Understanding wireless bridge
  • Understanding wireless repeater
  • Examining advanced Windows Firewall settings
  • Configuring NPS to provide RADIUS authentication
  • Understanding PoE
  • Identifying VPN protocols
  • Configuring the VPN client
  • Identifying 2G cellular features
  • Understanding CDMA
  • Creating packet switching network
  • Identifying mobile device protocols
  • Identifying wireless network design factors
  • Using spectrum analysis tool
  • Using Ekahau HeatMapper
  • Installing RF3D WiFiPlanner2
  • Converting decimal number to binary
  • Generating subnets
  • Identifying areas in an Information Technology and Security Policy
  • Identifying steps to reset the default applications
  • Connecting an iPhone to the Wi-Fi network
  • Identifying primary phases of SDLC
  • Establishing a Bluetooth connection
  • Connecting a digital camera to a computer
  • Connecting a USB printer to a computer
  • Identifying a PCI-bus slot
  • Installing PCIe Cards on the Motherboard
  • Identifying and installing a PCI sound card
  • Installing SDIO wireless LAN card
  • Installing a wireless LAN adapter
  • Turning on location services
  • Verifying software update
  • Identifying advantages of native apps
  • Identifying network protocols
  • Enabling APNS on an Apple iPhone
  • Identifying risk types
  • Understanding android rooting
  • Resetting the content in an iPhone
  • Identifying types of authentication services
  • Identifying VPN protocols
  • Creating and encrypting a folder
  • Identifying data loss prevention types
  • Viewing the archive attribute
  • Installing a backup program
  • Replacing the power supply
  • Opening the built-in network troubleshooting feature