CompTIA Mobility+ (Exam MB0-001)

Request a Quote for this class

About this Course

The mobile age is upon us. More and more people are using tablets, smartphones, and other mobile devices to accomplish things in their personal and professional lives. As businesses embrace this trend, they need to support their employees in the use of mobile devices while protecting their own assets, such as intellectual property.

If you are already a traditional network support technician, you're well on the way to having the knowledge and skills needed to support the mobile workforce. This course builds on your existing knowledge and experience to provide you with critical concepts related to over-the-air technologies, wireless networking, and mobile devices.

Audience Profile

Students taking this course are IT support personnel or prospective support personnel who have at least one year of experience working with computer networks, and who want to further develop their IT skills to include mobile device and wireless support.

This course is also for students seeking the CompTIA® Mobility+® (Exam MB0-001) certification.

At Course Completion

Upon successful completion of this course, you will be able to support mobile cellular and wireless devices.

You will:

  • Configure over-the-air technologies.
  • Apply RF principles.
  • Implement a wireless network infrastructure.
  • Implement network infrastructure devices and services.
  • Implement mobile solutions.
  • Prepare the enterprise for a mobile network.
  • Deploy mobile devices.
  • Implement mobile device operations.
  • Maintain mobile device operations.
  • Deploy mobile applications and related technologies.
  • Implement mobile app protocols and services.
  • Implement mobile security.
  • Mitigate mobile network risk.
  • Implement incident response.
  • Troubleshoot mobile devices and networks.

Prerequisites

To ensure your success in this course, you should have experience working with computer hardware, networking, and Windows operating systems. You can obtain this level of skills and knowledge by taking the following Logical Operations courses:

  • CompTIA® A+® Certification: A Comprehensive Approach (Exams 220-801 and 220-802)
  • CompTIA® Network+® Certification (Exam N10-005)

Course-specific Technical Requirements

Hardware

For this course, you will need one computer for each student and one for the instructor, plus one extra computer to be shared as a testing station. Each computer will need the following minimum hardware configuration:

  • 2.4 GHz dual core CPU with 64-bit Intel Virtualization Technology (Intel VT) or Advanced Micro Devices Virtualization or (AMD-V) processor.
  • 2 GB RAM minimum, 8 GB recommended.
  • 120 GB hard disk, 7200 RPM Serial Advanced Technology Attachment (SATA) or better recommended.
  • Video card MUST support OpenGL 2.0 or later.
  • DVD-ROM drive.
  • Keyboard and mouse (or other pointing device).
  • 1,024 × 768 resolution 17" SVGA monitor recommended.
  • Network cards and cabling for local network access.
  • Internet access (contact your local network administrator).
  • Projection system to display the instructor's computer screen.
  • Sound card and speakers for the instructor computer.

In addition, you will need the following network hardware:

  • One Netgear N300 Wireless Router or equivalent. Note that the course activities were written using this Netgear wireless router, so if you use a different wireless router, some router configuration options and procedures might be different.
  • Internet connectivity.
  • At least one Wi-Fi-capable laptop and one Wi-Fi-capable mobile phone must be available in the classroom.
  • Optionally, you can also supply a spare Ethernet switch with sufficient ports and cables for the student computers to plug into the Netgear router's LAN.

Software

You will need the following software to run this course:

  • Microsoft® Windows® 8 Professional or Microsoft® Windows® 8 Enterprise.
  • A web browser.
  • Genymotion Android Emulator.
  • .NET Framework 3.5.
  • X.509 Digital Certificate Generator Demo from http://www.signfiles.com/apps/.
  • Microsoft® Office PowerPoint® Viewer.
  • A PDF reader such as Foxit® or Adobe® Acrobat® Reader.

Course Outline

1.0 Over-the-Air Technologies

1.1 Compare and contrast different cellular technologies

  • CDMA
  • TDMA
  • GSM
  • WiMAX
  • UMTS
  • CSD
  • EVDO
  • HSPA
  • HSPA+
  • LTE
  • Roaming & switching between network types

1.2 Given a scenario, configure and implement WiFi client technologies using appropriate options.

  • Bluetooth
  • PAN
  • 802.11a, b, g, n, ac
  • SSID
  • Authentication methods
  • Portable hotspots

1.3 Compare and contrast RF principles and their functionality

  • RF characteristics
  • Propagation theory
  • Antennas
  • Faraday cage

1.4 Interpret site survey to ensure over the air communication

  • Capacity
  • Coverage
  • Signal strength
  • Receive Signal Strength Indicator
  • Spectrum analysis
  • Frequency analysis
  • Site survey documentation / site map
  • Post-site survey

2.0 Network Infrastructure

2.1 Compare and contrast physical and logical infrastructure technologies and protocols

  • Topologies
  • Firewall settings
  • Devices
  • Services and settings

2.2 Explain the technologies used for traversing wireless to wired networks.

  • Bandwidth and user limitations
  • Hardware differences
  • Traffic routing
  • IP addressing
  • MAC address
  • SNMP
  • ICMP
  • PoE for APs to switches

2.3 Explain the layers of the OSI model.

  • Layer 1 - Physical
  • Layer 2 - Datalink
  • Layer 3 - Network
  • Layer 4 - Transport
  • Layer 5 - Session
  • Layer 6 - Presentation
  • Layer 7 - Application

2.4 Explain disaster recovery principles and how it affects mobile devices.

  • Server backups
  • Device backups
  • Directory services server
  • Frequency of backups
  • High availability
  • DR locations

2.5 Compare and contrast common network ports and protocols for mobile devices

  • 20/21 - FTP
  • 22 - SFTP
  • 25 - SMTP
  • 53 - DNS
  • 80 - HTTP
  • 110 - POP3
  • 135 - MAPI
  • 143 - IMAP
  • 443 - SSL
  • 465 - SSMTP
  • 587 - Alternate SMTP
  • 990 - ftps
  • 2175 - Airsync
  • 2195 - APNS
  • 2196 - Feedback
  • 3389 - RDP
  • 4101 - SRP
  • 4200 - UDP
  • 5223 - Jabber
  • 5228-5230 - GCM

3.0 Mobile Device Management

3.1 Explain policy required to certify device capabilities.

  • Adherence to IT policies and security policies
  • Differences between vendor default applications
  • OS modifications and customization
  • Backup, Restore and Recovery policies

3.2 Compare and contrast mobility solutions to enterprise requirements.

  • Mobile Device Management
  • Mobile application management
  • Pushing content
  • Device platform support
  • Infrastructure support
  • On-premise vs. SaaS
  • Administrative permissions
  • Multi-instance
  • High availability
  • Device groupings
  • Location-based services
  • Monitoring and reporting capabilities and features
  • Interoperability with other products/devices
  • Telecommunication expense management
  • Self-service portal
  • Captive portal

3.3 Install and configure mobile solutions based on given requirements.

  • Liaise with appropriate personnel to ensure infrastructure can accept solutions
  • Profile creation
  • Directory services setup
  • Initial certificate issuance
  • EULA
  • Group profiles based on given requirements
  • Initiate pilot, testing and evaluation
  • Create and update documentation
  • Report feedback post-pilot
  • SDLC
  • Approve, train and launch

3.4 Implement mobile device on-boarding and off-boarding procedures.

  • Device activation on cellular networks
  • Mobile hardware that facilitates OTA access
  • On-boarding and provision process
  • Off-boarding and de-provisioning

3.5 Implement mobile device operations and management procedures.

  • Centralized content and application distribution and content management system
  • Deployment best practices
  • Remote capabilities
  • Lifecycle operations
  • Change management
  • End of life

3.6 Execute best practice for mobile device backup, data recovery and data segregation.

  • Device backup for corporate data to corporate server
  • Device backup of personal data to vendor/third party server
  • Backup to local device: internal storage, SD card, SIM
  • Data recovery

3.7 Use best practices to maintain awareness of new technologies including changes that affect mobile devices.

  • OS vendors
  • OEMs (hardware)
  • Telecommunication vendors
  • Third party application vendors
  • New risks and threats

3.8 Configure and deploy mobile applications and associated technologies

  • Messaging standards
  • Vendor proxy and gateway server settings
  • Information traffic topology
  • Push notification technologies
  • In-house application requirements
  • Types of mobile applications

4.0 Security

4.1 Identify various encryption methods for securing mobile environments.

  • Data in-transit
  • Data at rest
  • Full disk encryption
  • Block level encryption
  • File level encryption
  • Folder level encryption
  • Removable media encryption

4.2 Configure access control on the mobile device using best practices.

  • Authentication concepts
  • PKI concepts
  • Certificate management
  • Software-based container access and data segregation

4.3 Explain monitoring and reporting techniques to address security requirements

  • Device compliance and report audit information
  • Third party device monitoring applications (SIEM)
  • Monitor appropriate logs pertaining to mobile device activity/traffic

4.4 Explain risks, threats and mitigation strategies affecting the mobile ecosystem.

  • Wireless risks
  • Software risks
  • Organizational risks
  • Hardware risks
  • Mitigation strategies

4.5 Given a scenario, execute appropriate incident response and remediation steps

  • Incident identification
  • Determine and perform policy-based response
  • Report incident

5.0 Troubleshooting

5.1 Given a scenario, implement the following troubleshooting methodology.

  • Identify the problem
  • Establish a theory of probable cause
  • Test the theory to determine cause
  • Establish a plan of action to resolve the problem and identify potential effects
  • Implement the solution or escalate as necessary
  • Verify full system functionality and if applicable implement preventative measures
  • Document findings, actions and outcomes

5.2 Given a scenario, troubleshoot common device problems.

  • Battery life
  • Sync issues
  • Power supply problems
  • Password reset
  • Device crash
  • Power outage

5.3 Given a scenario, troubleshoot common application problems.

  • Missing applications
  • Configuration changes
  • App store problems
  • Email issues
  • Location services problems
  • OS and application upgrade issues
  • Profile authentication and authorization issues

5.4 Given a scenario, troubleshoot common over-the-air connectivity problems.

  • Latency
  • No cellular signal
  • No network connectivity
  • Roaming issues
  • Cellular activation
  • Email issues
  • VPN issues
  • Certificate issues
  • APN issues
  • Port configuration issues
  • Network saturation

5.5 Given a scenario, troubleshoot common security problems.

  • Expired certificate
  • Authentication failure
  • Firewall misconfiguration
  • False positives
  • False negatives
  • Non-expiring passwords
  • Expired passwords
  • Content filtering misconfigured