CompTIA Mobility+ Certification Online Courses

CompTIA Mobility+ Certification in South Africa

 

 

The CompTIA Mobility+ exam covers mobile device management, troubleshooting, security, and network infrastructure. It identifies IT professionals who can deploy, integrate, support and manage a mobile environment while ensuring proper security measures are maintained for devices and platforms to mitigate risks and threats. 2KO Africa is a network of companies that offers a substantial series of computer courses across the entire African region, and is a leading provider of internationally recognised online IT training, online, IT training.

 

Module 1: Over-The-Air Technologies

1.1 Introduction

1.2 Over-The-Air-Technologies

1.3 WIMAX

1.4 802.11 Wireless Technologies - Part 1

1.5 802.11 Wireless Technologies - Part 2

1.6 Radio Frequency

1.7 RF Power Fun

1.8 Antenna's

1.9 Issues With RF

1.10 NON 802.11 Wireless

1.11 Governing Bodies And Regulations

 

Module 2: Network Infrastructure

2.1 Network Foundations - Part 1

2.2 Network Foundations - Part 2

2.3 Network Foundations - Part 3

2.4 Network Foundations - Part 4

2.5 OSI Model Review

2.6 Wireless Terms And Terminology - Part 1

2.7 Wireless Terms And Terminology - Part 2

2.8 Wireless Media And Communication

2.9 Unified Wireless Architecture

2.10 SSID'S And VLAN'S

 

Module 3: Mobile Device Manager

3.1 Mobile Device Management - Part 1

3.2 Mobile Device Management - Part 2

3.3 Profiles And Polices - Part 1

3.4 Profiles And Polices - Part 2

3.5 Enterprise Mail And Messaging

3.6 Wireless Site Surveys - Part 1

3.7 Wireless Site Surveys - Part 2

3.8 Wireless Site Surveys - Part 3

3.9 Wireless Site Surveys - Part 4

3.10 802.11Wireless Device Management - Part 1

3.11 802.11Wireless Device Management - Part 2

 

Module 4: Security

4.1 Mobile Device Security

4.2 Network Security 101

4.3 Security Protocols - Part 1

4.4 Security Protocols - Part 2

4.5 Security Protocols - Part 3

4.6 EAP Overview

4.7 Encryption Overview - Part 1

4.8 Encryption Overview - Part 2

4.9 Common Security Troubleshooting

4.10 Wireless Risks - Part 1

4.11 Wireless Risks - Part 2

4.12 Other Risks

 

Module 5: Troubleshooting

5.1 Wireless Troubleshooting - Part 1

5.2 Wireless Troubleshooting - Part 2

5.3 Wireless Troubleshooting - Part 3

5.4 Conclusion