This curriculum spans the design and execution of mobile device support across eight technical and operational domains, equivalent in scope to an enterprise-wide mobility rollout supported by multi-phase workshops and integrated IT service management practices.
Module 1: Mobile Device Onboarding and Provisioning
- Configure and validate automated enrollment workflows using Apple Business Manager and Samsung Knox for company-owned devices.
- Implement zero-touch enrollment for Android Enterprise devices across multiple carriers and device models.
- Choose between user enrollment and device enrollment based on organizational security requirements and device ownership.
- Deploy configuration profiles to enforce Wi-Fi, email, and certificate settings during initial setup without user intervention.
- Integrate identity providers (e.g., Azure AD, Okta) with MDM solutions to authenticate users during device enrollment.
- Establish fallback procedures for devices that fail enrollment due to connectivity, certificate, or policy conflicts.
Module 2: Mobile Device Management (MDM) Policy Design
- Define passcode complexity requirements that balance usability with compliance for different user roles (e.g., executives vs. field technicians).
- Configure conditional access policies that require device compliance before granting access to Exchange Online or corporate apps.
- Implement app-level encryption and data loss prevention (DLP) for third-party business applications via app configuration policies.
- Decide whether to enforce full device encryption or allow scoped encryption for work profiles based on device type and OS version.
- Manage app distribution using private app catalogs and version control to prevent unauthorized or outdated app installations.
- Set device lock and remote wipe thresholds after failed login attempts, considering legal and privacy implications.
Module 3: Help Desk Troubleshooting and Diagnostics
- Use MDM remote diagnostics to retrieve device logs, connectivity status, and policy compliance without user interaction.
- Diagnose and resolve certificate trust issues affecting Wi-Fi or email connectivity on iOS and Android devices.
- Identify and remediate app-specific crashes by analyzing managed app logs and version compatibility with OS updates.
- Guide users through safe mode boot procedures on Android to isolate third-party app conflicts.
- Validate DNS and proxy settings on mobile devices when corporate resources are unreachable despite network connectivity.
- Escalate hardware-related issues (e.g., failing touchscreens, battery degradation) using OEM diagnostic tools and warranty tracking.
Module 4: Security and Compliance Enforcement
- Enforce jailbreak and root detection policies that block access to corporate data on compromised devices.
- Respond to lost or stolen device reports with targeted remote actions: lock, selective wipe, or full wipe based on ownership model.
- Conduct periodic compliance audits to verify encryption status, OS patch levels, and disabled developer options across the fleet.
- Configure containerization policies to separate work and personal data on BYOD devices using Android Work Profile or iOS Managed Apps.
- Integrate mobile threat defense (MTD) solutions with existing SIEM systems to detect anomalous network behavior or malicious apps.
- Document and report policy violations to compliance teams for regulated industries (e.g., HIPAA, GDPR) with timestamped audit trails.
Module 5: Over-the-Air Updates and Lifecycle Management
- Schedule OS update rollouts in phases to minimize disruption and monitor failure rates across device models.
- Test and approve firmware updates for ruggedized mobile devices used in warehouse or field operations.
- Configure deferral policies for OS updates to maintain compatibility with legacy line-of-business applications.
- Automate retirement workflows for end-of-life devices by disabling MDM enrollment and revoking access tokens.
- Manage app update policies to ensure critical security patches are deployed without blocking user productivity.
- Coordinate with procurement to align device refresh cycles with OS support timelines from manufacturers.
Module 6: BYOD and User Privacy Considerations
- Design acceptable use policies that clearly define the scope of IT monitoring and data access on personal devices.
- Implement managed browser and email client configurations that restrict data sharing without accessing personal apps.
- Configure selective wipe procedures that remove only corporate data while preserving personal photos, messages, and apps.
- Train help desk staff to handle privacy-related inquiries and escalate concerns to legal or data protection officers.
- Use privacy impact assessments (PIAs) to evaluate new MDM capabilities before deployment in BYOD environments.
- Disable location tracking and screen capture for managed apps on personal devices unless explicitly consented.
Module 7: Integration with Enterprise IT Services
- Sync mobile user accounts and group memberships from Active Directory or Azure AD to MDM platforms for policy targeting.
- Integrate MDM alerting with existing ITSM tools (e.g., ServiceNow, Jira) to auto-create incidents for non-compliant devices.
- Configure SSO for mobile apps using modern authentication and conditional access based on device compliance.
- Enable secure printing from mobile devices using on-premises or cloud print gateways with device authentication.
- Extend endpoint detection and response (EDR) coverage to mobile devices via MDM and MTD integrations.
- Coordinate with network teams to ensure adequate Wi-Fi capacity and VLAN segmentation for high-density mobile deployments.
Module 8: Help Desk Operations and Escalation Frameworks
- Develop tiered support playbooks for common mobile issues: email sync failures, certificate errors, and app crashes.
- Define escalation paths from L1 help desk to L2/L3 mobility specialists based on issue complexity and system access.
- Use remote viewing tools (where permitted) to troubleshoot iOS and Android UI issues with user consent.
- Standardize documentation templates for mobile incidents to ensure accurate knowledge base entries and trend analysis.
- Measure and report on mobile support KPIs: first call resolution rate, mean time to repair, and repeat incident frequency.
- Conduct quarterly training for help desk staff on new OS features, MDM capabilities, and emerging mobile threats.