Course

Portable and mobile devices

In this course, you will learn how portable and mobile devices are different than their desktop counterparts, and how they are assembled and maintained.

    Syllabus

  • Laptop features Video — 00:07:57
    • Portable computers use the function key (Fn) to activate alternative features. These include screen sharing, power settings, audio options, and more. The Settings app in Windows enables you to adjust a host of laptop settings (which mirror desktop setting

  • Laptop hardware troubleshooting – the tools Video — 00:04:45
    • Laptops have many technician-replaceable parts. Check for online documentation before starting and proceed with caution. Mike explores laptop dissection in this video.

  • Laptop hardware – core hardware Video — 00:03:31
    • Laptops have many technician-replaceable parts. Check for online documentation before starting and proceed with caution. Mike explores laptop dissection in this video.

  • Laptop hardware – CPU and motherboard Video — 00:06:48
    • Laptops have many technician-replaceable parts. Check for online documentation before starting and proceed with caution. Mike explores laptop dissection in this video.

  • Touring your laptop display Video — 00:03:58
    • Replacing a laptop monitor requires careful connectivity for the many internal components. Aside from the display, the laptop monitor can have a Wi-Fi antenna, webcam, touch screen sensors, and more.

  • Power management Video — 00:10:59
    • Saving power is important, especially on mobile devices and laptops. Every CPU has a built-in feature to shut down different parts of a computer to reduce power needs. It’s up to the techs to make sure the power management settings are optimal for the use

  • What is a mobile device? Video — 00:08:37
    • Mobile devices come in a variety of sealed forms and run mobile-specific operating systems. Devices include smartphones, tablets, wearables, e-readers, and more. OSes are Android, iOS, and a few others to a lesser extent. This video tours the common mobil

  • Mobile connections Video — 00:09:30
    • Mobile devices connect to other devices via wired or wireless. Wired connections are used for power and data transfer. Wireless options include NFC, Bluetooth, infrared, or 802.11 (Wi-Fi). These connections are used for a variety of purposes, including fi

  • Touring Android Video — 00:10:02
    • Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This video explores features specific to Android devices.

  • Touring iOS Video — 00:07:28
    • iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enables you to change application permissions, account information, location services, and more.

  • Virtual reality Video — 00:02:27
    • Virtual reality enables you to experience remote or fanciful locations via computer. Augmented reality layers virtual elements onto a camera feed of the real world, making it easier to follow navigation instructions or chase fanciful monsters.

  • Maintaining mobile devices Video — 00:10:33
    • Mobile devices are surprisingly self-maintaining these days, but there are a few issues that come up occasionally. A big part of this is understanding the names and functions of certain settings unique to smartphones.

  • Mobile devices and email Video — 00:09:23
    • Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts set up with a simple username and pas

  • Mobile synchronization Video — 00:07:25
    • Synchronization keeps data up-to-date on each of your mobile devices and other connected devices. This video explores syncing to the desktop, automobile, cloud, and more.

  • Mobile device security Video — 00:07:37
    • Mobile device security starts with a lock screen but goes beyond with multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile devices.

  • Mobile security troubleshooting Video — 00:05:39
    • A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as leaked personal fil

  • Mobile device troubleshooting Video — 00:09:26
    • Mobile devices can encounter problems ranging from unresponsive touchscreens to complete system lockout. This video explores common symptoms, such as slow performance (caused by excessive apps running) or overheating, and their solutions.

Syllabus

Course description

You’ll also get a tour of the main mobile operating systems: Android and Apple’s iOS. Finally, you’ll learn how to secure and update your mobile devices, as well as how to troubleshoot them when any issue arises.

Meet the author

Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library