Scroll to top button

Mobility+ Mobile Computing Deployment and Management (Course & Labs)

ISBN : 9781616917470

Gain hands-on expertise in CompTIA Mobility+ certification exam with Mobility+ Mobile Computing Deployment and Management course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. This course and labs focus on the objectives covered in Mobility+ exam and provide an understanding of how computer networking technology and radio frequency technology work together to create wireless networks.

The Mobility+ certification is geared toward candidates that have CompTIA Network+ certification or equivalent experience and working knowledge of and at least 18 months of work experience in the administration of mobile devices. The exam covers common networking protocols, standards-based wireless networking, cellular technology, mobility, mobile device management, security, device backup, and troubleshooting.

Lessons
Lessons
20+
Exercises
57+
Quizzes
100+
Flashcards
425+
Glossary of terms
425+
TestPrep
Pre Assessment Questions
36+
Full Length Tests
2+
Post Assessment Questions
50+
Lab
Performance lab
95+
Video tutorials
39+
Minutes
38+

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
48+
Hours
08:07+
  • Network Types
  • Network Topologies
  • The OSI Model
  • Device Addressing
  • Summary
  • Chapter Essentials
  • The Internet Protocol Suite
  • Request for Comments (RFC)
  • Common Network Protocols and Services
  • Understanding Ports, Protocols, and Sockets
  • Secure Sockets Layer (SSL)
  • Common Protocols for File Transfer
  • Common Protocols Used with Messaging
  • Other Common Protocols
  • Summary
  • Chapter Essentials
  • Radio Frequency Fundamentals
  • RF Regulatory Governing Bodies and Local Regulatory Authorities
  • Radio Frequency Characteristics
  • Bandwidth
  • Modulation
  • Radio Frequency Range and Speed
  • Measurement Units of Radio Frequency
  • Radio Frequency Antenna Concepts
  • Antenna Types
  • Minimizing the Effects of Multipath Using Antenna Diversity
  • Distributed Antenna System (DAS)
  • Radio Frequency Cables and Connectors
  • Antenna Installation Considerations
  • Summary
  • Chapter Essentials
  • The IEEE
  • IEEE Standards for Wireless Communication
  • Wireless Networking and Communications
  • Interoperability Certifications
  • Common IEEE 802.11 Deployment Scenarios
  • Building-to-Building Connectivity Using Wireless LAN Technology
  • Summary
  • Chapter Essentials
  • Wireless LAN Operating Frequencies and RF Channels
  • Wireless LAN Modes of Operation
  • IEEE 802.11 Physical Layer Technology Types
  • Wireless LAN Coverage and Capacity
  • Radio Frequency Signal Measurements
  • Connecting to an IEEE 802.11 Wireless Network
  • The Distribution System
  • Data Rates
  • Throughput
  • Dynamic Rate Switching
  • Wireless LAN Transition or Roaming
  • IEEE 802.11 Power Save Operations
  • IEEE 802.11 Protection Modes and Mechanisms
  • Summary
  • Chapter Essentials
  • The Wireless Access Point
  • Wireless Mesh
  • Wireless Bridges
  • Wireless Repeaters
  • Wireless LAN Controllers and Cloud-Managed Architectures
  • Power over Ethernet
  • Virtual Private Network (VPN) Concentrators
  • Network Gateways
  • Proxy Servers
  • Summary
  • Chapter Essentials
  • The Evolution of Cellular Communications
  • Channel Access Methods
  • Circuit Switching vs. Packet Switching Network Technology
  • Mobile Device Standards and Protocols
  • WiMAX
  • Roaming between Different Network Types
  • Summary
  • Chapter Essentials
  • Wireless Site Surveys
  • Gathering Business Requirements
  • Interviewing Stakeholders
  • Gathering Site-Specific Documentation
  • Identifying Infrastructure Connectivity and Power Requirements
  • Understanding Application Requirements
  • Understanding RF Coverage and Capacity Requirements
  • Client Connectivity Requirements
  • Antenna Use Considerations
  • The Physical Radio Frequency Site Survey Process
  • Radio Frequency Spectrum Analysis
  • Received Signal Strength
  • Performing a Manual Radio Frequency Wireless Site Survey
  • Performing a Predictive Modeling Site Survey
  • Performing a Post-Site Survey
  • Protocol Analysis
  • RF Coverage Planning
  • Infrastructure Hardware Selection and Placement
  • Testing Different Antennas
  • Wireless Channel Architectures
  • Wireless Device Installation Limitations
  • Site Survey Report
  • Summary
  • Chapter Essentials
  • Local Area Network and Wide Area Network Traffic Flow
  • Network Subnets
  • IP Subnetting
  • Network Traffic Shaping
  • Summary
  • Chapter Essentials
  • Mobile Device Management Solutions
  • Common Mobile Device Operating System Platforms
  • The Mobile Application Store
  • Pushing Content to Mobile Devices
  • MDM Administrative Permissions
  • Understanding MDM High Availability and Redundancy
  • MDM Device Groups
  • Location-Based Services
  • Mobile Device Telecommunications Expense Management
  • Captive and Self-Service Portals
  • Summary
  • Chapter Essentials
  • General Technology Network and Security Policy
  • Information Technology and Security Policy Implementation and Adherence
  • Backup, Restore, and Recovery Policies
  • Operating System Modifications and Customization
  • Technology Profiles
  • Understanding Group Profiles
  • Policy and Profile Pilot Testing
  • Summary
  • Chapter Essentials
  • System Development Life Cycle (SDLC)
  • Pilot Program Initiation, Testing, Evaluation, and Approval
  • Training and Technology Launch
  • Documentation Creation and Updates
  • Mobile Device Configuration and Activation
  • Wireless LAN, Cellular Data, and Secure Digital Adapters
  • Mobile Device Management Onboarding and Provisioning
  • Mobile Device Management Offboarding and Deprovisioning
  • Summary
  • Chapter Essentials
  • Centralized Content, Application Distribution, and Content Management Systems
  • Content Permissions, Data Encryption, and Version Control
  • Mobile Device Remote Management Capabilities
  • Life Cycle Operations
  • Information Technology Change Management
  • The Technology End-of-Life Model
  • Deployment Best Practices
  • Summary
  • Chapter Essentials
  • Maintaining Awareness of Mobile Technology Advancements
  • Configuration of Mobile Applications and Associated Technologies
  • In-House Application Requirements
  • Mobile Application Types
  • Configuring Messaging Protocols and Applications
  • Configuring Network Gateway and Proxy Server Settings
  • Push Notification Technology
  • Information Traffic Topology
  • Summary
  • Chapter Essentials
  • Understanding Risks with Wireless Technologies
  • Understanding Risks Associated with Software
  • Understanding Risks Associated with Mobile Device Hardware
  • Understanding Risks Affecting Organizations
  • Summary
  • Chapter Essentials
  • Access Control
  • Authentication Processes
  • Encryption Methods for Wireless Networking
  • Cipher Methods
  • Secure Tunneling
  • Public Key Infrastructure (PKI) Concepts
  • Physical Media Encryption
  • Summary
  • Chapter Essentials
  • Device Compliance and Report Audit Information
  • Third-Party Device Monitoring Applications (SIEM)
  • Understanding Mobile Device Log Files
  • Mitigation Strategies
  • Summary
  • Chapter Essentials
  • Network Server and Mobile Device Backup
  • Backing Up Server Data
  • Backing Up Client Device Data
  • Disaster Recovery Principles
  • Maintaining High Availability
  • Restoring Data
  • Summary
  • Chapter Essentials
  • The Troubleshooting Process
  • Understanding Radio Frequency Transmitters and Receivers
  • Troubleshooting Specific Problems
  • Common Over-the-Air Connectivity Problems
  • Troubleshooting Common Security Problems
  • Summary
  • Chapter Essentials
  • Introduction
  • Air Technologies
  • Network Infrastructure
  • Wireless Technology
  • Mobile Device Management
  • Wireless Device Management
  • Security
  • Encryption methods and Risks
  • Wireless Troubleshooting
  • Conclusion

Hands on Activities (Labs)

  • Identifying network categories
  • Creating a wireless ad hoc network
  • Identifying a network topology
  • Identifying network topologies
  • Identifying peer-to-peer network
  • Identifying OSI layer functions
  • Identifying OSI layers
  • Identifying connectionless communication
  • Understanding data encapsulation
  • Identifying TCP/IP protocol layers
  • Understanding RFC
  • Identifying network protocols
  • Viewing DHCP Information
  • Understanding Ports
  • Understanding SSL
  • Installing FTP client software
  • Installing FTP server software
  • Understanding POP3 process
  • Identifying port numbers
  • Understanding GCM
  • Identifying steps in SMTP process
  • Allowing RDP connections
  • Understanding radio transmission
  • Identifying ITU-R administrative regions and geographic locations
  • Understanding frequency
  • Understanding radio frequency range
  • Understanding power measurement units
  • Performing a wireless site survey
  • Understanding sector antennas
  • Understanding passive DAS
  • Understanding Impedance
  • Identifying IEEE 802.11n amendment details
  • Understanding wide area network
  • Understanding IEEE 802.11 standard
  • Connecting computers on a SOHO network to the Internet
  • Understanding point to point connections
  • Configuring SSID
  • Identifying service set configurations
  • Configuring network adapter property
  • Connecting to hidden wireless networks
  • Understanding spread spectrum technology
  • Understanding open system authentication
  • Understanding shared-key authentication
  • Connecting a distribution system
  • Viewing data rate
  • Understanding IEEE 802.11n
  • Setting power save mode
  • Configuring a wireless access point
  • Identifying mesh access point connection
  • Understanding wireless bridge
  • Understanding wireless repeater
  • Examining advanced Windows Firewall settings
  • Configuring NPS to provide RADIUS authentication
  • Understanding PoE
  • Identifying VPN protocols
  • Configuring the VPN client
  • Identifying 2G cellular features
  • Understanding CDMA
  • Creating packet switching network
  • Identifying mobile device protocols
  • Identifying wireless network design factors
  • Using spectrum analysis tool
  • Using Ekahau HeatMapper
  • Installing RF3D WiFiPlanner2
  • Converting decimal number to binary
  • Generating subnets
  • Identifying areas in an Information Technology and Security Policy
  • Identifying steps to reset the default applications
  • Connecting an iPhone to the Wi-Fi network
  • Identifying primary phases of SDLC
  • Establishing a Bluetooth connection
  • Connecting a digital camera to a computer
  • Connecting a USB printer to a computer
  • Identifying a PCI-bus slot
  • Installing PCIe cards on the motherboard
  • Identifying and installing a PCI sound card
  • Installing SDIO wireless LAN card
  • Installing a wireless LAN adapter
  • Turning on location services
  • Verifying software update
  • Identifying advantages of native apps
  • Identifying network protocols
  • Enabling APNS on an Apple iPhone
  • Identifying risk types
  • Understanding android rooting
  • Resetting the content in an iPhone
  • Identifying types of authentication services
  • Identifying VPN protocols
  • Creating and encrypting a folder
  • Identifying data loss prevention types
  • Viewing the archive attribute
  • Installing a backup program
  • Replacing the power supply
  • Opening the built-in network troubleshooting feature
×