0% found this document useful (0 votes)
4K views

IT Essentials

The document outlines a course on IT Essentials covering topics such as personal computer hardware, assembly, advanced hardware, maintenance and troubleshooting. It includes 14 chapters that cover components, installation, configuration, networking, operating systems, security and the IT profession.

Uploaded by

Daniel Ergicho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4K views

IT Essentials

The document outlines a course on IT Essentials covering topics such as personal computer hardware, assembly, advanced hardware, maintenance and troubleshooting. It includes 14 chapters that cover components, installation, configuration, networking, operating systems, security and the IT profession.

Uploaded by

Daniel Ergicho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 56

IT Essentials

Chapter 1 Introduction to Personal Computer Hardware


Chapter 2 PC Assembly
Chapter 3 Advanced Computer Hardware
Chapter 4 Preventive Maintenance and Troubleshooting
Chapter 5 Networking Concepts
Chapter 6 Applied Networking
Chapter 7 Laptops and Other Mobile Devices
Chapter 8 Printers
Chapter 9 Virtualization and Cloud Computing
Chapter 10 Windows Installation
Chapter 11 Windows Configuration
Chapter 12 Mobile, Linux, and macOS Operating Systems
Chapter 13 Security
Chapter 14 The IT Professional

Section 1.0

Introduction to Personal Computers

Section 1.1

Personal Computers

Section 1.2

PC Components

Section 1.3
Computer Disassembly

Section 1.4

Summary

Course Index

Chapter 1
Introduction to Personal Computer
Hardware
1.0 Introduction to Personal Computers
1.0.1 Introduction

1.0.1.1 Welcome

1.1 Personal Computers


1.1.1 What is in a Computer?
1.1.1.1 Video Explanation - What's in a Computer?
1.1.2 Electrical and ESD Safety
1.1.2.1 Electrical Safety
1.1.2.2 ESD
1.1.2.3 Check Your Understanding - ESD Characteristics
1.2 PC Components
1.2.1 Case and power supplies
1.2.1.1 Cases
1.2.1.2 Power Supplies
1.2.1.3 Connectors
1.2.1.4 Power Supply Voltage
1.2.1.5 Check Your Understanding - Cases and Power Supplies
1.2.2 Motherboards
1.2.2.1 Motherboards
1.2.2.2 Motherboard Components
1.2.2.3 Motherboard Chipset
1.2.2.4 Motherboard Form Factors
1.2.2.5 Check Your Understanding - Motherboards
1.2.3 CPUs and Cooling Systems
1.2.3.1 What is a CPU?
1.2.3.2 Cooling Systems
1.2.3.3 Check Your Understanding - CPUs and Cooling Systems
1.2.4 Memory
1.2.4.1 Types of Memory
1.2.4.2 Types of ROM
1.2.4.3 Types of RAM
1.2.4.4 Memory Modules
1.2.4.5 Check Your Understanding - Memory
1.2.5 Adapter Cards and Expansion Slots
1.2.5.1 Adapter Cards
1.2.5.2 Check Your Understanding - Adapter Cards and Expansion Slots
1.2.6 Hard disk drives and SSDs
1.2.6.1 Types of Storage Devices
1.2.6.2 Storage Device Interfaces
1.2.6.3 Magnetic Media Storage
1.2.6.4 Semiconductor Storage
1.2.6.5 Check Your Understanding - Data Storage Devices
1.2.7 Optical Storage Devices
1.2.7.1 Types of Optical Storage Devices
1.2.7.2 Check Your Understanding - Types of Optical Media
1.2.8 Ports, Cables, and Adaptors
1.2.8.1 Video Ports and Cables
1.2.8.2 Other Ports and Cables
1.2.8.3 Adapters and Converters
1.2.8.4 Check Your Understanding - Cables and Connectors
1.2.9 Input Devices
1.2.9.1 The Original Input Devices
1.2.9.2 New Input Devices
1.2.9.3 More New Input Devices
1.2.9.4 Most Recent Input Devices
1.2.9.5 Check Your Understanding - Input Devices
1.2.10 Output Devices
1.2.10.1 What are Output Devices?
1.2.10.2 Monitors and Projectors
1.2.10.3 VR and AR Headsets
1.2.10.4 Printers
1.2.10.5 Speakers and Headphones
1.2.10.6 Check Your Understanding - Visual and Auditory Output Device Characteristics
1.3 Computer Disassembly
1.3.1 The Technician’s Toolkit
1.3.1.1 Video Explanation - Technician's Toolkit
1.3.1.2 Check Your Understanding - Technician’s Toolkit
1.3.2 Computer Disassembly
1.3.2.1 Video Demonstration – Computer Disassembly
1.3.2.2 Lab - Disassemble a Computer

1.4 Summary
1.4.1 Conclusion
1.4.1.1 Chapter 1: Introduction to Personal Computer Hardware

Chapter 2
PC Assembly
2.0 Introduction
2.0.1 Introduction

2.0.1.1 Welcome

2.1 Assemble the Computer


2.1.1 General and Fire Safety

2.1.1.1 Video Explanation - General and Fire Safety

2.1.2 Open the Case and Connect the Power Supply

2.1.2.1 Video Demonstration - Install the Power Supply

2.1.2.2 Check Your Understanding – Install the Power Supply

2.1.2.3 Select the Case and Fans

2.1.2.4 Select a Power Supply

2.1.2.5 Lab - Install the Power Supply

2.1.3 Install the Motherboard Components

2.1.3.1 Video Demonstration - Install the CPU


2.1.3.2 Check Your Understanding - Install the CPU

2.1.3.3 Video Demonstration - Install the RAM

2.1.3.4 Check Your Understanding - Install the RAM

2.1.3.5 Video Demonstration - Install the Motherboard

2.1.3.6 Check Your Understanding - Install the Motherboard

2.1.3.7 Select the Motherboard

2.1.3.8 Select the CPU and CPU Cooling

2.1.3.9 Select the RAM

2.1.3.10 Lab - Install the Motherboard in a Computer

2.1.4 Install Internal Drives

2.1.4.1 Video Demonstration - Install the Drives

2.1.4.2 Select Hard Drives

2.1.4.3 Select Optical Drives

2.1.4.4 Install the Hard Drive

2.1.4.5 Install the Optical Drive

2.1.4.6 Check Your Understanding - Installing Drives

2.1.4.7 Lab – Install the Drives

2.1.5 Install the Adapter Cards

2.1.5.1 Video Demonstration - Install the Adapter Cards

2.1.5.2 Select Adapter Cards

2.1.5.3 Other Factors for Adapter Card Selection

2.1.5.4 Install the Adapter Cards

2.1.5.5 Check Your Understanding - Installing Adapter Cards


2.1.5.6 Lab - Install Adapter Card

2.1.6 Select Additional Storage

2.1.6.1 Select a Media Reader

2.1.6.2 Select External Storage

2.1.6.3 Check Your Understanding – Media Cards

2.1.7 Install the Cables

2.1.7.1 Video Demonstration - Connect the Internal Power Cables

2.1.7.2 Check Your Understanding – Identify the Power Connectors

2.1.7.3 Video Demonstration - Connect the Internal Data Cables

2.1.7.4 Lab - Install Internal Cables

2.1.7.5 Video Demonstration - Install the Front Panel Cables

2.1.7.6 Install the Front Panel Cables

2.1.7.7 Checking Your Understanding – Identify the Front Panel Cables

2.1.7.8 Lab - Install the Front Panel Cables

2.1.7.9 Video Demonstration - Complete the Computer Assembly

2.1.7.10 Check Your Understanding – Identify the External Connectors

2.1.7.11 Lab – Complete the Computer Assembly

2.2 Summary
2.2.1 Conclusion

2.2.1.1 Chapter 2: PC Assembly

Chapter 3
Advanced Computer Hardware
3.0 Introduction to Advanced Computer Hardware
3.0.1 Introduction

3.0.1.1 Welcome

3.1 Boot the Computer


3.1.1 POST, BIOS, CMOS and UEFI

3.1.1.1 Video Demonstration - BIOS - UEFI Menus

3.1.1.2 POST

3.1.1.3 BIOS and CMOS

3.1.1.4 UEFI

3.1.1.5 Check Your Understanding - BIOS and UEFI Terminology

3.1.1.6 Lab - Investigate BIOS or UEFI Settings

3.1.2 BIOS/UEFI Configuration

3.1.2.1 Video Demonstration - Configure BIOS - UEFI Settings

3.1.2.2 BIOS and UEFI Security

3.1.2.3 Update the Firmware

3.1.2.4 Check Your Understanding - BIOS and UEFI Configuration Terminology

3.1.2.5 Lab - Search for BIOS or UEFI Firmware Updates

3.1.2.6 Lab - Install Windows

3.1.2.7 Lab - Install Third-Party Software in Windows

3.2 Electrical Power


3.2.1 Wattage and Voltage

3.2.1.1 Wattage and Voltage


3.2.1.2 Power Supply Voltage Setting

3.2.1.3 Lab – Ohm’s Law

3.2.2 Power Fluctuation and Protection

3.2.2.1 Power Fluctuation Types

3.2.2.2 Power Protection Devices

3.2.2.3 Check Your Understanding – Power Fluctuation Terms

3.3 Advanced Computer Functionality


3.3.1 CPU Architectures and Operation

3.3.1.1 CPU Architectures

3.3.1.2 Enhancing CPU Operation

3.3.1.3 Multicore Processors

3.3.1.4 CPU Cooling Mechanisms

3.3.1.5 Check Your Understanding - CPU Architectures and Operation

3.3.2 RAID

3.3.2.1 What Do You Already Know? - RAID

3.3.2.2 RAID Concepts

3.3.2.3 RAID Levels

3.3.2.4 Check Your Understanding – RAID Levels

3.3.3 Ports, Connectors, and Cables

3.3.3.1 Legacy Ports

3.3.3.2 Video and Graphic Ports

3.3.3.3 USB Cables and Connectors

3.3.3.4 SATA Cables and Connectors


3.3.3.5 Twisted Pair Cables and Connectors

3.3.3.6 Coax Cables and Connectors

3.3.3.7 SCSI and IDE Cables and Connectors

3.3.3.8 Check Your Understanding – Identify the External Connectors

3.3.4 Monitors

3.3.4.1 Monitor Characteristics

3.3.4.2 Monitor Terms

3.3.4.3 Display Standards

3.3.4.4 Using Multiple Monitors

3.3.4.5 Check Your Understanding - Monitor Terminology

3.4 Computer Configuration


3.4.1 Upgrade Computer Hardware

3.4.1.1 Motherboard Upgrade

3.4.1.2 Steps to Upgrade a Motherboard

3.4.1.3 CPU Upgrade

3.4.1.4 Storage Device Upgrade

3.4.1.5 Peripheral Upgrades

3.4.1.6 Power Supply Upgrade

3.4.1.7 Lab - Research a Hardware Upgrade

3.4.2 Configurations for Specialized Computers

3.4.2.1 What Do You Already Know? - Configure a CAx Workstation

3.4.2.2 What Do You Already Know? - Configure an Audio Video Editing Workstation

3.4.2.3 What Do You Already Know? - Configure a Virtualization Workstation


3.4.2.4 What Do You Already Know? - Configure a Gaming PC

3.4.2.5 Check Your Understanding - Specialized Computer Component Types

3.4.2.6 Thick and Thin Clients

3.4.2.7 NAS

3.5 Protecting the Environment


3.5.1 Safe Disposal of Equipment and Supplies

3.5.1.1 Safe Disposal Methods

3.5.1.2 Safety Data Sheets

3.5.1.3 Check Your Understanding - Safe Disposal

3.6 Summary
3.6.1 Conclusion

3.6.1.1 Chapter 3: Advanced Computer Hardware

Chapter 4
Preventive Maintenance and Troubleshooting
4.0 Introduction
4.0.1 Welcome

4.0.1.1 Chapter 4: Preventive Maintenance and Troubleshooting

4.1 Preventive Maintenance


4.1.1 PC Preventive Maintenance Overview

4.1.1.1 Benefits to Preventive Maintenance

4.1.1.2 Preventive Maintenance - Dust

4.1.1.3 Preventive Maintenance – Internal Components


4.1.1.4 Preventive Maintenance - Environmental Concerns

4.1.1.5 Preventive Maintenance - Software

4.1.1.6 Check Your Understanding - Preventive Maintenance

4.2 Troubleshooting Process


4.2.1 Troubleshooting Process Steps

4.2.1.1 Introduction to Troubleshooting

4.2.1.2 Troubleshooting Process Steps

4.2.1.3 Identify the Problem

4.2.1.4 Check Your Understanding – Identify the Problem

4.2.1.5 Establish a Theory of Probable Cause

4.2.1.6 Test the Theory to Determine the Cause

4.2.1.7 Establish a Plan of Action to Resolve the Problem and Implement the Solution

4.2.1.8 Verify Full Functionality and, If Applicable, Implement Preventive Measures

4.2.1.9 Document Findings, Actions, and Outcomes

4.2.1.10 Check Your Understanding - Number the Steps

4.2.2 Common Problems and Solutions for PCs

4.2.2.1 PC Common Problems and Solutions

4.2.2.2 Common Problems and Solutions for Storage Devices

4.2.2.3 Common Problems and Solutions for Motherboards and Internal Components

4.2.2.4 Common Problems and Solutions for Power Supplies

4.2.2.5 Common Problems and Solutions for CPUs and Memory

4.2.2.6 Common Problems and Solutions for Displays

4.2.3 Apply Troubleshooting Process to Computer Components and Peripherals


4.2.3.1 Personal Reference Tools

4.2.3.2 Internet Reference Tools

4.2.3.3 Check Your Understanding – Reference Tools

4.2.3.4 Advanced Problems and Solutions for Hardware

4.2.3.5 Lab – Use a Multimeter and a Power Supply Tester

4.2.3.6 Lab – Troubleshoot Hardware Problems

4.3 Summary
4.3.1 Conclusion

4.3.1.1 Chapter 4: Preventive Maintenance and Troubleshooting

Chapter 5
Networking Concepts
5.0 Introduction
5.0.1 Welcome

5.0.1.1 Chapter 5: Networking Concepts

5.1 Network Components and Types


5.1.1 Types of Networks

5.1.1.1 Network Icons

5.1.1.2 Network Topologies and Description

5.1.1.3 Check Your Understanding - Types of Networks

5.1.2 Internet Connection Types

5.1.2.1 Brief History of Connection Technologies

5.1.2.2 DSL, Cable, and Fiber


5.1.2.3 Line of Sight Wireless Internet Service

5.1.2.4 Satellite

5.1.2.5 Cellular

5.1.2.6 Mobile Hotspot and Tethering

5.1.2.7 Check Your Understanding - Internet Connection Types

5.2 Networking Protocols, Standards, and Services


5.2.1 Transport Layer Protocols

5.2.1.1 Video Explanation - Transport Layer Protocols

5.2.1.2 Activity - Transport Layer Protocols

5.2.1.3 The TCP/IP Model

5.2.1.4 TCP

5.2.1.5 UDP

5.2.1.6 Check Your Understanding - Transport Layer Protocols

5.2.2 Application Port Numbers

5.2.2.1 Video Explanation - Application Port Numbers

5.2.2.2 Classify Application Port Numbers

5.2.2.3 Check Your Understanding - Application Port Numbers

5.2.3 Wireless Protocols

5.2.3.1 WLAN Protocols

5.2.3.2 Bluetooth, NFC, and RFID

5.2.3.3 Zigbee and Z-Wave

5.2.3.4 Cellular Generations

5.2.3.5 Check Your Understanding - Wireless Protocols


5.2.4 Network Services

5.2.4.1 Video Explanation - Network Services

5.2.4.2 Client - Server Roles

5.2.4.3 DHCP Server

5.2.4.4 DNS Server

5.2.4.5 Print Server

5.2.4.6 File Server

5.2.4.7 Web Server

5.2.4.8 Mail Server

5.2.4.9 Proxy Server

5.2.4.10 Authentication Server

5.2.4.11 Syslog Server

5.2.4.12 Check Your Understanding - Network Services

5.3 Network Devices


5.3.1 Basic Network Devices

5.3.1.1 Video Explanation - Basic Network Devices

5.3.1.2 Network Interface Card

5.3.1.3 Repeaters, Bridges, and Hubs

5.3.1.4 Switches

5.3.1.5 Wireless Access Points

5.3.1.6 Routers

5.3.1.7 Check Your Understanding - Basic Network Devices

5.3.2 Security Devices


5.3.2.1 Video Explanation - Security Devices

5.3.2.2 Firewalls

5.3.2.3 IDS and IPS

5.3.2.4 UTMs

5.3.2.5 Endpoint Management Server

5.3.2.6 Check Your Understanding - Security Devices

5.3.3 Other Network Devices

5.3.3.1 Legacy and Embedded Systems

5.3.3.2 Patch Panel

5.3.3.3 Power over Ethernet and Ethernet over Power

5.3.3.4 Cloud-based Network Controller

5.3.3.5 Check Your Understanding - Other Network Devices

5.4 Network Cables


5.4.1 Network Tools

5.4.1.1 Video Explanation - Network Cable Tools

5.4.1.2 Network Tools and Descriptions

5.4.1.3 Check Your Understanding - Network Tools

5.4.2 Copper Cables and Connectors

5.4.2.1 Cable Types

5.4.2.2 Coaxial Cables

5.4.2.3 Twisted-Pair Cables

5.4.2.4 Twisted-Pair Category Ratings

5.4.2.5 Twisted-Pair Wire Schemes


5.4.2.6 Activity - Cable Pinouts

5.4.2.7 Video Demonstration - Build and Test a Network Cable

5.4.2.8 Lab - Build and Test a Network Cable

5.4.3 Fiber Cables and Connectors

5.4.3.1 Fiber-Optic Cables

5.4.3.2 Types of Fiber Media

5.4.3.3 Fiber-Optic Connectors

5.4.3.4 Check Your Understanding - Fiber Cables and Connectors

5.5 Summary
5.5.1 Conclusion

5.5.1.1 Chapter 5: Network Concepts

Chapter 6
Applied Networking
6.0 Introduction
6.0.1 Welcome

6.0.1.1 Chapter 6: Applied Networking

6.1 Device to Network Connection


6.1.1 Network Addressing

6.1.1.1 Video Explanation - MAC Addressing

6.1.1.2 Video Explanation - IPv4 Addressing

6.1.1.3 Video Explanation - IPv6 Addressing

6.1.1.4 Two Network Addresses


6.1.1.5 Displaying the Addresses

6.1.1.6 IPv4 Address Format

6.1.1.7 IPv6 Address Formats

6.1.1.8 Static Addressing

6.1.1.9 Dynamic Addressing

6.1.1.10 Link-local IPv4 and IPv6 Addresses

6.1.1.11 Check Your Understanding - Network Addressing

6.1.2 Configure a NIC

6.1.2.1 Packet Tracer - Add Computers to an Existing Network

6.1.2.2 Network Design

6.1.2.3 Selecting a NIC

6.1.2.4 Installing and Updating a NIC

6.1.2.5 Configure a NIC

6.1.2.6 ICMP

6.1.2.7 Lab - Configure a NIC to Use DHCP in Windows

6.1.3 Configure a Wired and Wireless Network

6.1.3.1 Video Explanation - Configure a Wired and Wireless Network

6.1.3.2 Connecting Wired Devices to the Internet

6.1.3.3 Logging in to the Router

6.1.3.4 Basic Network Setup

6.1.3.5 Basic Wireless Settings

6.1.3.6 Configure a Wireless Mesh Network

6.1.3.7 NAT for IPv4


6.1.3.8 Quality of Service

6.1.3.9 Packet Tracer - Connect to a Wireless Network

6.1.3.10 Lab - Configure a Wireless Network

6.1.4 Firewall Settings

6.1.4.1 Video Explanation - Firewall Settings

6.1.4.2 UPnP

6.1.4.3 DMZ

6.1.4.4 Port Forwarding

6.1.4.5 MAC Address Filtering

6.1.4.6 Whitelisting and Blacklisting

6.1.4.7 Packet Tracer - Configure Firewall Settings

6.1.4.8 Lab - Configure Firewall Settings

6.1.5 IoT Device Configuration

6.1.5.1 Internet of Things

6.1.5.2 IoT Devices in Packet Tracer

6.1.5.3 Packet Tracer - Control IoT Devices

6.2 Basic Troubleshooting Process for Networks


6.2.1 Applying the Troubleshooting Process to

6.2.1.1 The Six Steps of the Troubleshooting Process

6.2.1.2 Identify the Problem

6.2.1.3 Establish a Theory of Probable Cause

6.2.1.4 Test the Theory to Determine the Cause

6.2.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution
6.2.1.6 Verify Full Functionality and, If Applicable, Implement Preventive Measures

6.2.1.7 Document Findings, Actions, and Outcomes

6.2.1.8 Check Your Understanding - Network Troubleshooting Process

6.2.2 Network Problems and Solutions

6.2.2.1 Common Problems and Solutions for Networking

6.2.2.2 Advanced Problems and Solutions for Network Connections

6.2.2.3 Advanced Problems and Solutions for FTP and Secure Internet Connections

6.2.2.4 Advanced Problems and Solutions Using Network Tools

6.2.2.5 Lab - Troubleshoot Network Problems

6.3 Summary
6.3.1 Conclusion

6.3.1.1 Chapter 6: Applied Networking

Chapter 7
Laptops and Other Mobile Devices
7.0 Introduction
7.0.1 Welcome

7.0.1.1 Laptops and Other Mobile Devices

7.1 Characteristics of laptops and other mobile devices


7.1.1 Mobile Device Overview

7.1.1.1 What Do You Already Know? - Mobile Devices

7.1.1.2 Mobility

7.1.1.3 Laptops
7.1.1.4 Smartphone Characteristics

7.1.1.5 Smartphone Features

7.1.1.6 Tablets and E-Readers

7.1.1.7 Wearables: Smartwatches and Fitness Trackers

7.1.1.8 Wearables: Augmented and Virtual Realities

7.1.1.9 Check Your Understanding - Laptops and Other Mobile Devices

7.1.1.10 Lab – Mobile Device Information

7.1.2 Laptop Components

7.1.2.1 Video Explanation – External Features Unique to Laptops

7.1.2.2 Video Explanation - Common Input Devices and LEDs in Laptops

7.1.2.3 Motherboards

7.1.2.4 Internal Components

7.1.2.5 Check Your Understanding - External Laptop components

7.1.2.6 Special function keys

7.1.2.7 Video Explanation – Docking Station Versus Port Replicator

7.1.2.8 Lab - Research Docking Stations and Port Replicators

7.1.3 Laptop Display Components

7.1.3.1 LCD, LED, and OLED Displays

7.1.3.2 Laptop Display Features

7.1.3.3 Backlights and Inverters

7.1.3.4 Check Your Understanding – Laptop Display Components

7.1.3.5 Wi-Fi Antenna Connectors

7.1.3.6 Webcam and Microphone


7.2 Laptop Configuration
7.2.1 Power Settings Configuration

7.2.1.1 Power Management

7.2.1.2 Managing ACPI Settings in the BIOS

7.2.1.3 Check Your Understanding – Match ACPI Standards

7.2.1.4 Video Demonstration – Managing Laptop Power Options

7.2.2 Wireless Configuration

7.2.2.1 Bluetooth

7.2.2.2 Bluetooth Laptop Connections

7.2.2.3 Video Demonstration – Bluetooth Configuration

7.2.2.4 Cellular WAN

7.2.2.5 Wi-Fi

7.2.2.6 Video Demonstration – Wi-Fi Configuration

7.2.2.7 Check Your Understanding- Wireless Configuration

7.3 Laptop Hardware and Component Installation and


Configuration
7.3.1 Expansion Slots

7.3.1.1 Expansion Cards

7.3.1.2 Flash Memory

7.3.1.3 Smart Card Reader

7.3.1.4 SODIMM Memory

7.3.1.5 Video Demonstration - Install SODIMM

7.3.1.6 Check Your Understanding – Expansion Modules


7.3.2 Replacing Laptop Components

7.3.2.1 Overview of Hardware Replacement

7.3.2.2 Video Demonstration - Keyboard Replacement

7.3.2.3 Video Demonstration - Screen Replacement

7.3.2.4 Lab - Research Laptop Screens

7.3.2.5 Power

7.3.2.6 Video Demonstration - DC Jack Replacement

7.3.2.7 Lab - Research Laptop Batteries

7.3.2.8 Internal Storage and Optical Drive

7.3.2.9 Video Demonstration - Internal Storage and Optical Drive Replacement

7.3.2.10 Lab – Research Laptop Drives

7.3.2.11 Video Demonstration - Wireless Card Replacement

7.3.2.12 Video Demonstration - Speakers Replacement

7.3.2.13 Video Demonstration - CPU Replacement

7.3.2.14 Video Demonstration - Motherboard Replacement

7.3.2.15 Video Demonstration - Plastic Frames

7.3.2.16 Check Your Understanding - Replacing Laptop Components

7.4 Other Mobile Device Hardware Overview


7.4.1 Other Mobile Device Hardware

7.4.1.1 Cell Phone Parts

7.4.1.2 Wired connectivity

7.4.1.3 Wireless Connections and Shared Internet Connections

7.4.1.4 Check Your Understanding – Identify Connection Types


7.4.2 Specialty Mobile Devices

7.4.2.1 Wearable Devices

7.4.2.2 Specialty Devices

7.5 Network Connectivity and Email


7.5.1 Wireless and Cellular Data Networks

7.5.1.1 Wireless Data Networks

7.5.1.2 Lab - Mobile Wi-Fi

7.5.1.3 Cellular Communication Standards

7.5.1.4 Airplane Mode

7.5.1.5 Hotspot

7.5.1.6 Check Your Understanding - Wireless Technology

7.5.2 Bluetooth

7.5.2.1 Bluetooth for Mobile Devices

7.5.2.2 Bluetooth Pairing

7.5.3 Configuring Email

7.5.3.1 Introduction to Email

7.5.3.2 Activity - Matching Email Protocols

7.5.3.3 Android Email Configuration

7.5.3.4 iOS Email Configuration

7.5.3.5 Internet Email

7.5.4 Mobile Device Synchronization

7.5.4.1 Types of Data to Synchronize

7.5.4.2 Enabling Synchronization


7.5.4.3 Synchronization Connection Types

7.6 Preventive Maintenance for Laptops and other Mobile


Devices
7.6.1 Scheduled Maintenance for Laptops and other Mobile Devices

7.6.1.1 What Do You Already Know? - Preventive Maintenance

7.6.1.2 The Reason for Maintenance

7.6.1.3 Laptop Preventive Maintenance Program

7.6.1.4 Mobile Device Preventive Maintenance Program

7.7 Basic Troubleshooting Process for Laptops and other


Mobile Devices
7.7.1 Applying the Troubleshooting Process to Laptops and other Mobile Devices

7.7.1.1 The Six Steps of the Troubleshooting Process

7.7.1.2 Identify the problem

7.7.1.3 Establish a theory of probable cause

7.7.1.4 Test the Theory to Determine Cause

7.7.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution

7.7.1.6 Verify Full System Functionality and if Applicable, Implement Preventative


Measures

7.7.1.7 Document Findings, Actions, and Outcomes

7.7.2 Common Problems and Solutions for Laptops and Other Mobile Devices

7.7.2.1 Identify Common Problems and Solutions

7.7.2.2 Common Problems and Solutions for Laptops

7.7.2.3 Common Problems and Solutions for Other Mobile Devices

7.7.2.4 Lab - Research Laptop Specifications


7.7.2.5 Lab - Gather Information from the Customer

7.7.2.6 Lab - Investigate Support Websites

7.8 Summary
7.8.1 Conclusion

7.8.1.1 Chapter 7: Laptops and Other Mobile Devices

Chapter 8
Printers
8.0 Introduction
8.0.1 Welcome

8.0.1.1 Printers

8.1 Common Printer Features


8.1.1 Characteristics and Capabilities

8.1.1.1 Characteristics of Printers

8.1.1.2 Printer Speed, Quality, and Color

8.1.1.3 Reliability and Total Cost of Ownership

8.1.1.4 Automatic Document Feeder

8.1.1.5 Check Your Understanding - Printer Capabilities and Characteristics

8.1.2 Printer Connections

8.1.2.1 Printer Connection Types

8.1.2.2 Check Your Understanding - Printer Connections

8.2 Printer Type Comparison


8.2.1 Inkjet Printers
8.2.1.1 Inkjet Printer Characteristics

8.2.1.2 Inkjet Printer Parts

8.2.1.3 Check Your Understanding - Inkjet Printers

8.2.2 Laser Printers

8.2.2.1 Laser Printer Characteristics

8.2.2.2 Laser Printer Parts

8.2.2.3 Check Your Understanding - Laser Printers

8.2.3 Laser Printing Process

8.2.3.1 How Laser Printing Works

8.2.3.2 Check Your Understanding - The Laser Printing Process

8.2.4 Thermal Printers and Impact Printers

8.2.4.1 Thermal Printer Characteristics

8.2.4.2 Impact Printer Characteristics

8.2.4.3 Check Your Understanding - Thermal Printers and Impact Printers

8.2.5 Virtual Printers

8.2.5.1 Virtual Printer Characteristics

8.2.5.2 Cloud Printing

8.2.5.3 Check Your Understanding - Virtual Printers

8.2.6 3D Printers

8.2.6.1 3D Printer Characteristics

8.2.6.2 3D Printer Parts

8.2.6.3 Check Your Understanding - 3D Printers

8.3 Installing and Configuring Printers


8.3.1 Installing and Updating a Printer

8.3.1.1 Installing a Printer

8.3.1.2 Test Printer Functions

8.3.1.3 Lab - Install a Printer in Windows

8.3.2 Configuring Options and Default Settings

8.3.2.1 Common Configuration Settings

8.3.2.2 Check Your Understanding - Configuration Options

8.3.3 Optimizing Printer Performance

8.3.3.1 Software Optimization

8.3.3.2 Hardware Optimization

8.3.3.3 Check Your Understanding - Printer Optimization

8.4 Sharing Printers


8.4.1 Operating System Settings for Sharing Printers

8.4.1.1 Configuring Printer Sharing

8.4.1.2 Wireless Printer Connections

8.4.1.3 Lab - Share a Printer in Windows

8.4.2 Print Servers

8.4.2.1 Purposes of Print Servers

8.4.2.2 Software Print Servers

8.4.2.3 Hardware Print Servers

8.4.2.4 Dedicated Print Servers

8.4.2.5 Check Your Understanding - Print Servers

8.5 Maintaining and Troubleshooting Printers


8.5.1 Printer Preventive Maintenance

8.5.1.1 Vendor Guidelines

8.5.1.2 What Do You Already Know? Printer Operating Environment

8.5.2 Inkjet Printer Preventive Maintenance

8.5.2.1 Video Demonstration - Inkjet Printer Preventive Maintenance

8.5.2.2 Lab - Perform Preventive Maintenance on an Inkjet Printer

8.5.3 Laser Printer Preventive Maintenance

8.5.3.1 Video Demonstration - Laser Printer Preventive Maintenance

8.5.3.2 Lab - Perform Preventive Maintenance on a Laser Printer

8.5.4 Thermal Printer Preventive Maintenance

8.5.4.1 Preventive Maintenance on a Thermal Printer

8.5.4.2 Check Your Understanding - Thermal Printer Preventive Maintenance

8.5.5 Impact Printer Preventive Maintenance

8.5.5.1 Preventive Maintenance of an Impact Printer

8.5.5.2 Check Your Understanding - Impact Printer Preventive Maintenance

8.5.6 3D Printer Preventive Maintenance

8.5.6.1 Video Demonstration - 3D Printer Preventive Maintenance

8.5.6.2 Video Demonstration - 3D Printer Printing a Component

8.5.7 Applying the Troubleshooting Process to Printers

8.5.7.1 The Six Steps of the Troubleshooting Process

8.5.7.2 Identify the Problem

8.5.7.3 Establish a Theory of Probable Cause

8.5.7.4 Test the Theory to Determine Cause


8.5.7.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution

8.5.7.6 Verify Full System Functionality and, if Applicable, Implement Preventive


Measures

8.5.7.7 Document Findings, Actions, and Outcomes.

8.5.8 Problems and Solutions

8.5.8.1 Identify Printer Problems and Solutions

8.5.8.2 Common Problems and Solutions for Printers

8.5.8.3 Advanced Problems and Solutions for Printers

8.6 Chapter Summary


8.6.1 Conclusion

8.6.1.1 Chapter 8: Printers

Chapter 9
Virtualization and Cloud Computing
9.0 Introduction
9.0.1 Introduction

9.0.1.1 Welcome

9.1 Virtualization
9.1.1 Virtualization

9.1.1.1 Video Explanation - What is the Cloud?

9.1.1.2 Cloud Computing and Virtualization

9.1.1.3 Traditional Server Deployment

9.1.1.4 Server Virtualization


9.1.1.5 Advantages of Server Virtualization

9.1.1.6 Check Your Understanding - Match the Advantages of Virtualization

9.1.2 Client-Side Virtualization

9.1.2.1 Client-Side Virtualization

9.1.2.2 Type 1 and Type 2 Hypervisors

9.1.2.3 Virtual Machine Requirements

9.1.2.4 Check Your Understanding - Virtualization Terminology

9.1.2.5 Lab - Install Linux in a Virtual Machine and Explore the GUI

9.2 Cloud Computing


9.2.1 Cloud Computing Applications

9.2.1.1 How We Use the Cloud

9.2.2 Cloud Services

9.2.2.1 Cloud Services

9.2.2.2 What Do You Already Know? - Cloud Models

9.2.2.3 Check Your Understanding - Cloud Service and Cloud Model Terminology

9.2.2.4 Cloud Computing Characteristics

9.2.2.5 Check Your Understanding - Match the Cloud Characteristics

9.3 Summary
9.3.1 Conclusion

9.3.1.1 Chapter 9: Virtualization and Cloud Computing

Chapter 10
Windows Installation
10.0 Introduction
10.0.1 Welcome

10.0.1.1 Windows Installation

10.1 Modern Operating Systems


10.1.1 Operating System Features

10.1.1.1 Terms

10.1.1.2 Basic Functions of an Operating System

10.1.1.3 Windows Operating Systems

10.1.1.4 Check Your Understanding - Windows Terminology

10.1.2 Customer Requirements for an Operating System

10.1.2.1 Compatible System Software and Hardware Requirements

10.1.2.2 Minimum Hardware Requirements and Compatibility with OS

10.1.2.3 32-bit vs. 64-bit Processor Architecture

10.1.2.4 What Do You Already Know? Choosing a Windows Edition

10.1.2.5 Check Your Understanding – Choosing an Operating System

10.1.3 Operating System Upgrades

10.1.3.1 Checking OS Compatibility

10.1.3.2 Windows OS Upgrades

10.1.3.3 Data Migration

10.1.3.4 Check Your Understanding - OS Upgrades

10.2 Disk Management


10.2.1 Disk Management
10.2.1.1 Storage Device Types

10.2.1.2 Hard Drive Partitioning

10.2.1.3 Partitions and Logical Drives

10.2.1.4 Check Your Understanding - Disk Terminology

10.2.1.5 File Systems

10.2.1.6 Video Demonstration - Disk Management Utility and Disk Partitioning

10.2.1.7 Video Demonstration - Multiboot Procedures

10.2.1.8 Lab - Create a Partition in Windows

10.3 Installation and Boot Sequence


10.3.1 Basic Windows Installation

10.3.1.1 Lab - Windows Installation

10.3.1.2 Account Creation

10.3.1.3 Finalize the Installation

10.3.1.4 Lab - Finalize the Windows Installation

10.3.2 Custom Installation Options

10.3.2.1 Disk Cloning

10.3.2.2 Other Installation Methods

10.3.2.3 Remote Network Installation

10.3.2.4 Unattended Network Installation

10.3.2.5 Video Demonstration - Windows Restore and Recovery

10.3.2.6 Recovery Partition

10.3.2.7 Upgrade Methods

10.3.2.8 Check your Understanding– Identify OS Installation Terminology


10.3.3 Windows Boot Sequence

10.3.3.1 Windows Boot Sequence

10.3.3.2 Windows 7 Startup Modes

10.3.3.3 Windows 8 and10 Startup Modes

10.3.3.4 Check Your Understanding - Windows Boot Sequence

10.4 Summary
10.4.1 Conclusion

10.4.1.1 Chapter 10: Windows Installation

Chapter 11
Windows Configuration
11.0 Introduction
11.0.1 Welcome

11.0.1.1 Chapter 11: Windows Configuration

11.1 Windows Desktop and File Explorer


11.1.1 Comparing Windows Versions

11.1.1.1 Windows Versions

11.1.1.2 Windows 7

11.1.1.3 Windows 8

11.1.1.4 Windows 8.1

11.1.1.5 Windows 10

11.1.1.6 Check Your Understanding - Windows Versions

11.1.2 The Windows Desktop


11.1.2.1 The Windows 7 Desktop

11.1.2.2 The Windows 8 Desktop

11.1.2.3 The Windows 8.1 Desktop

11.1.2.4 Personalizing the Windows Desktop

11.1.2.5 Video Demonstration - The Windows 10 Desktop

11.1.2.6 The Windows 10 Start Menu

11.1.2.7 The Windows 8.1 and 8.0 Start Menu

11.1.2.8 The Windows 7 Start Menu

11.1.2.9 The Taskbar

11.1.2.10 Lab - Explore the Windows Desktop

11.1.2.11 Check Your Understanding - Identify Elements of the Windows Desktop

11.1.3 Windows Task Manager

11.1.3.1 Video Demonstration - Working With Task Manager

11.1.3.2 Windows 10 Task Manager Functions

11.1.3.3 Task Manager in Windows 7

11.1.3.4 Lab - Work with Task Manager

11.1.3.5 Check Your Understanding - Compare Task Manager in Windows 7 and 10

11.1.4 Windows File Explorer

11.1.4.1 File Explorer

11.1.4.2 Video Demonstration - Working with File Explorer

11.1.4.3 This PC

11.1.4.4 Run as Administrator

11.1.4.5 Windows Libraries


11.1.4.6 Directory Structures

11.1.4.7 User and System File Locations

11.1.4.8 File Extensions

11.1.4.9 File Attributes

11.1.4.10 Video Demonstration - File and Folder Properties

11.1.4.11 Lab - Working with File Explorer

11.1.4.12 Check Your Understanding - File Explorer

11.2 Configure Windows with Control Panels


11.2.1 Control Panel Utilities

11.2.1.1 Windows 10: Settings and Control Panels

11.2.1.2 Introduction to Control Panel

11.2.1.3 Control Panel Views

11.2.1.4 Define Control Panel Categories

11.2.1.5 Lab - Explore Control Panel Categories

11.2.1.6 Check Your Understanding - Control Panel Categories

11.2.2 User and Account Control Panel Items

11.2.2.1 User Accounts

11.2.2.2 User Account Control Settings

11.2.2.3 Lab - User Accounts

11.2.2.4 Credential Manager

11.2.2.5 Sync Center

11.2.2.6 Check Your Understanding - User and Account Control Panels

11.2.3 Network and Internet Control Panels


11.2.3.1 Network Settings

11.2.3.2 Internet Options

11.2.3.3 Network and Sharing Center

11.2.3.4 HomeGroup

11.2.3.5 Lab - Configure Browser Settings

11.2.3.6 Check Your Understanding - Network and Internet Control Panel

11.2.4 Display Settings and Control Panel

11.2.4.1 Display Settings and Configuration

11.2.4.2 Display Features

11.2.4.3 Check Your Understanding - Display Features

11.2.5 Power and System Control Panels

11.2.5.1 Power Options

11.2.5.2 Power Options Settings

11.2.5.3 Power Options Actions

11.2.5.4 Check Your Understanding - Power Options

11.2.5.5 System Control Panel Item

11.2.5.6 System Properties

11.2.5.7 Increasing Performance

11.2.5.8 Lab - Manage Virtual Memory

11.2.5.9 Check Your Understanding - Power Options and System Properties

11.2.6 Hardware and Sound Control Panels

11.2.6.1 Device Manager

11.2.6.2 Lab - Use Device Manager


11.2.6.3 Devices and Printers

11.2.6.4 Sound

11.2.6.5 Check Your Understanding - Device Manager Alerts

11.2.7 Clock, Region, and Language

11.2.7.1 Clock

11.2.7.2 Region

11.2.7.3 Language

11.2.7.4 Lab - Region and Language Options

11.2.7.5 Check Your Understanding - Clock, Region, and Language

11.2.8 Programs and Features Control Panels

11.2.8.1 Programs

11.2.8.2 Windows Features and Updates

11.2.8.3 Default Programs

11.2.8.4 Check Your Understanding - Programs and Features

11.2.9 Other Control Panels

11.2.9.1 Troubleshooting

11.2.9.2 BitLocker Drive Encryption

11.2.9.3 File Explorer and Folder Options

11.2.9.4 Check Your Understanding - Other Control Panels

11.3 System Administration


11.3.1 Administrative Tools

11.3.1.1 Administrative Tools Control Panel Item

11.3.1.2 Computer Management


11.3.1.3 Event Viewer

11.3.1.4 Local Users and Groups

11.3.1.5 Performance Monitor

11.3.1.6 Component Services and Data Sources

11.3.1.7 Services

11.3.1.8 Data Sources

11.3.1.9 Print Management

11.3.1.10 Windows Memory Diagnostics

11.3.1.11 Lab - Monitor and Manage System Resources

11.3.1.12 Check Your Understanding - Administrative Tools

11.3.2 System Utilities

11.3.2.1 System Information

11.3.2.2 System Configuration

11.3.2.3 The Registry

11.3.2.4 Regedit

11.3.2.5 Microsoft Management Console

11.3.2.6 DxDiag

11.3.2.7 Lab - System Utilities

11.3.2.8 Lab - Manage System Files

11.3.2.9 Check Your Understanding - System Utilities

11.3.3 Disk Management

11.3.3.1 What Do You Already Know? - Disk Operations

11.3.3.2 Disk Management Utility


11.3.3.3 Drive Status

11.3.3.4 Mounting a Drive

11.3.3.5 Adding Arrays

11.3.3.6 Disk Optimization

11.3.3.7 Disk Error - Checking

11.3.3.8 Lab - Hard Drive Maintenance

11.3.3.9 Check Your Understanding - Disk Management

11.3.4 Application Installation and Configuration

11.3.4.1 System Requirements

11.3.4.2 Installation Methods

11.3.4.3 Installing an Application

11.3.4.4 Compatibility Mode

11.3.4.5 Uninstalling or Changing a Program

11.3.4.6 Lab - Install Third-Party Software

11.3.4.7 Security Considerations

11.3.4.8 Check Your Understanding - Application Installation and Configuration

11.4 Command-Line Tools


11.4.1 Using Windows CLI

11.4.1.1 PowerShell

11.4.1.2 The Command Shell

11.4.1.3 Basic Commands

11.4.1.4 Video Demonstration - Managing CLI Sessions

11.4.1.5 Lab - Work in the Windows Command Shell


11.4.1.6 Check Your Understanding - Basic Command Line Commands

11.4.2 File System CLI Commands

11.4.2.1 Command Syntax Conventions

11.4.2.2 File System Navigation

11.4.2.3 File System Navigation - Commands

11.4.2.4 Video Demonstration - Working with Files and Folders

11.4.2.5 Manipulating Folders - Commands

11.4.2.6 Manipulating Files - Commands

11.4.2.7 Lab - File System Commands

11.4.2.8 Check Your Understanding - File System CLI Commands

11.4.3 Disk CLI Commands

11.4.3.1 Disk Operations - Commands

11.4.3.2 Lab - Disk CLI Commands

11.4.3.3 Check Your Understanding - Disk Operations Commands

11.4.4 Task and System CLI Commands

11.4.4.1 System CLI Commands

11.4.4.2 Lab - Task and System CLI Commands

11.4.4.3 Check Your Understanding - Task and System Commands

11.4.5 Other Useful CLI Commands

11.4.5.1 Other Useful Commands

11.4.5.2 Running System Utilities

11.4.5.3 Lab - Other Useful Commands

11.4.5.4 Check Your Understanding - Other Useful CLI Commands


11.5 Windows Networking
11.5.1 Network Sharing and Mapping Drives

11.5.1.1 Domain and Workgroup

11.5.1.2 Homegroup

11.5.1.3 Video Demonstration – Connecting to a Workgroup or Domain

11.5.1.4 Network Shares and Mapping Drives

11.5.1.5 Administrative Shares

11.5.2 Sharing Local Resources with Others

11.5.2.1 Sharing Local Resources

11.5.2.2 Printer Sharing vs. Network Printer Mapping

11.5.2.3 Video Demonstration – Sharing Files and Folders on a Local Network

11.5.2.4 Lab - Share Resources

11.5.3 Configure a Wired Network Connection

11.5.3.1 Configuring Wired Network Interfaces in Windows 10

11.5.3.2 Configuring a Wired NIC

11.5.3.3 Setting a Network Profile

11.5.3.4 Verify Connectivity with the Windows GUI

11.5.3.5 ipconfig Command

11.5.3.6 Network CLI Commands

11.5.3.7 Video Demonstration - Network Testing and Verification with CLI Commands

11.5.4 Configure a Wireless Network Interfaces in Windows

11.5.4.1 Wireless Settings

11.5.4.2 Lab - Connect and Test the Wireless Connection


11.5.5 Remote Access Protocols

11.5.5.1 VPN Access in Windows

11.5.5.2 Telnet and SSH

11.5.5.3 Packet Tracer - Use Telnet and SSH

11.5.6 Remote Desktop and Assistance

11.5.6.1 Video Demonstration – Remote Desktop and Remote Assistance

11.5.6.2 Lab - Windows Remote Desktop and Assistance

11.5.6.3 Check Your Understanding – Remote Desktop and Assistance

11.6 Common Preventive Maintenance Techniques for


Operating Systems
11.6.1 OS Preventive Maintenance Plan

11.6.1.1 Preventive Maintenance Plan Contents

11.6.1.2 Lab - Manage the Startup Folder

11.6.1.3 Windows Updates

11.6.1.4 Video Demonstration – Scheduling Tasks

11.6.1.5 Lab - Schedule a Task using the GUI and the Command Line

11.6.2 Backup and Restore

11.6.2.1 Restore Points

11.6.2.2 Hard Drive Backup

11.6.2.3 Video Demonstration – Back up and Restore

11.6.2.4 Lab - System Restore and Hard Drive Backup

11.7 Basic Troubleshooting Process for Windows Operating


Systems
11.7.1 Applying Troubleshooting Process to Windows Operating Systems

11.7.1.1 The Six Steps of the Troubleshooting Proce

11.7.1.2 Identify the Problem

11.7.1.3 Establish a Theory of Probable Cause

11.7.1.4 Test the Theory to Determine the Cause

11.7.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution

11.7.1.6 Verify Full System Functionality and if Applicable Implement Preventive


Measures

11.7.1.7 Document Findings, Actions, and Outcomes

11.7.2 Common Problems and Solutions for Windows Operating Systems

11.7.2.1 Common Problems and Solutions for Windows Operating Systems

11.7.3 Advanced Troubleshooting for Windows Operating Systems

11.7.3.1 Advanced Problems and Solutions for Windows Operating Systems

11.7.3.2 Lab - Troubleshoot Operating System Problems

11.8 Summary
11.8.1 Conclusion

11.8.1.1 Chapter 11: Windows Configuration

Chapter 12
Mobile, Linux, and macOS Operating
Systems
12.0 Introduction
12.0.1 Welcome

12.0.1.1 Chapter 12: Mobile, Linux, and OSX Operating Systems


12.1 Mobile Operating Systems
12.1.1 Android vs. iOS

12.1.1.1 Open Source vs. Closed Source

12.1.1.2 Applications and Content Sources

12.1.1.3 Check Your Understanding - Compare Android and iOS

12.1.2 Android Touch Interface

12.1.2.1 Home Screen Items

12.1.2.2 Lab - Working with Android

12.1.3 iOS Touch Interface

12.1.3.1 Home Screen Items

12.1.3.2 Lab - Working with iOS

12.1.4 Common Mobile Device Features

12.1.4.1 Screen Orientation

12.1.4.2 Screen Calibration

12.1.4.3 GPS

12.1.4.4 Lab - Mobile Device Features

12.1.4.5 Wi-Fi Calling

12.1.4.6 NFC Payment

12.1.4.7 Virtual Private Network

12.1.4.8 Virtual Assistants

12.2 Methods for Securing Mobile Devices


12.2.1 Screen Locks and Biometric Authentication

12.2.1.1 What Do You Already Know? – Locks


12.2.1.2 Lab – Passcode Locks

12.2.1.3 Restrictions on Failed Login Attempts

12.2.1.4 Check your Understanding - Screen Locks and Biometric Authentication

12.2.2 Cloud-Enabled Services for Mobile Devices

12.2.2.1 Remote Backup

12.2.2.2 Locator Applications

12.2.2.3 Remote Lock and Remote Wipe

12.2.2.4 Check Your Understanding – Cloud-Enabled Services for Mobile Devices

12.2.3 Software Security

12.2.3.1 Antivirus

12.2.3.2 Rooting and Jailbreaking

12.2.3.3 Patching and Updating Operating Systems

12.2.3.4 Check Your Understanding – Mobile Security Features

12.3 Linux and macOS Operating Systems


12.3.1 Linux and macOS tools and features

12.3.1.1 Introduction to Linux and macOS Operating Systems

12.3.1.2 Overview of Linux GUI

12.3.1.3 Overview macOS GUI

12.3.1.4 Overview of Linux and macOS CLI

12.3.1.5 Linux Backup and Recovery

12.3.1.6 macOS Backup and Recovery

12.3.1.7 Overview of Disk Utilities

12.3.1.8 Check your understanding – Linux and macOS Operating Systems


12.3.2 Linux and macOS Best Practices

12.3.2.1 Scheduled Tasks

12.3.2.2 Operating System Updates

12.3.2.3 Security

12.3.2.4 Check Your Understanding – Linux and macOS Best Practices

12.3.3 Basic CLI Commands

12.3.3.1 Syntax Checker - File and Directory Commands

12.3.3.2 Check Your Understanding - File and Directory commands

12.3.3.3 The ls -l command output

12.3.3.4 Basic Unix File and Directory Permissions

12.3.3.5 Syntax Checker: File and Directory Permissions

12.3.3.6 Check Your Understanding - File and Directory Permission

12.3.3.7 Linux Administrative Commands

12.3.3.8 Linux Administrative Commands Requiring Root Access

12.3.3.9 Check Your Understanding: -Administrative Commands

12.3.3.10 Syntax Checker - File Ownership and Permission

12.4 Basic Troubleshooting Process for Mobile, Linux, and


macOS Operating Systems
12.4.1 Applying the Troubleshooting Process to Mobile, Linux, and macOS
Operating Systems

12.4.1.1 The Six Steps of the Troubleshooting Process

12.4.1.2 Identify the Problem

12.4.1.3 Establish a theory of Probable Cause

12.4.1.4 Test the Theory to Determine the Cause


12.4.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution

12.4.1.6 Verify Full System Functionality and if Applicable, Implement Preventive


Measures

12.4.1.7 Document Findings, Actions, and Outcomes.

12.4.2 Common Problems and Solutions for Other Operating Systems

12.4.2.1 Common Problems and Solutions for Mobile Operating Systems

12.4.2.2 Common Problems and Solutions for Mobile OS Security

12.4.2.3 Common Problems and Solutions for Linux and macOS Operating Systems

12.4.2.4 Lab - Troubleshoot Mobile Devices

12.5 Summary
12.5.1 Conclusion

12.5.1.1 Chapter 12: Mobile, Linux, and macOS

Chapter 13
Security
13.0 Introduction
13.0.1 Welcome

13.0.1.1 Chapter 13: Security

13.1 Security Threats


13.1.1 Malware

13.1.1.1 Malware

13.1.1.2 What Do You Already Know? - Malware

13.1.1.3 Viruses and Trojan Horses


13.1.1.4 Types of Malware

13.1.1.5 Check Your Understanding - Malware

13.1.2 Preventing Malware

13.1.2.1 Anti-Malware Programs

13.1.2.2 Signature File Updates

13.1.2.3 Video Explanation – Protecting Against Malware

13.1.2.4 Remediating Infected Systems

13.1.2.5 Video Explanation - Remediating an Infected System

13.1.2.6 Check Your Understanding - Preventing Malware

13.1.3 Network Attacks

13.1.3.1 Networks Are Targets

13.1.3.2 Types of TCP/IP Attacks

13.1.3.3 Check Your Understanding – Identify the TCP/IP Attack

13.1.3.4 Zero-Day

13.1.3.5 Protecting Against Network Attacks

13.1.4 Social Engineering Attacks

13.1.4.1 Social Engineering

13.1.4.2 What Do You Already Know? - Social Engineering Techniques

13.1.4.3 Social Engineering Techniques

13.1.4.4 Protecting Against Social Engineering

13.1.4.5 Check Your Understanding - Personal and Corporate Social Engineering


Techniques

13.2 Security Procedures


13.2.1 Security Policy

13.2.1.1 What is a Security Policy

13.2.1.2 Security Policy Category

13.2.1.3 Securing Devices and Data

13.2.2 Protecting Physical Equipment

13.2.2.1 Physical Security

13.2.2.2 Types of Secure Locks

13.2.2.3 Mantraps

13.2.2.4 Securing Computers and Network Hardware

13.2.2.5 Check Your Understanding - Locking Mechanisms

13.2.3 Protecting Data

13.2.3.1 Data - Your Greatest Asset

13.2.3.2 Data Backups

13.2.3.3 File and Folder Permissions

13.2.3.4 File and Folder Encryption

13.2.3.5 Windows BitLocker and BitLocker To Go

13.2.3.6 Video Demonstration - Bitlocker and Bitlocker To Go

13.2.3.7 Lab - Bitlocker and Bitlocker To Go

13.2.4 Data Destruction

13.2.4.1 Data Wiping Magnetic Media

13.2.4.2 Data Wiping Other Media

13.2.4.3 Hard Drive Recycling and Destruction

13.2.4.4 Check Your Understanding - Data Protection


13.3 Securing Windows Workstations
13.3.1 Securing a Workstation

13.3.1.1 Securing a Computer

13.3.1.2 Securing BIOS

13.3.1.3 Securing Windows Login

13.3.1.4 Local Password Management

13.3.1.5 Usernames and Passwords

13.3.1.6 Check your Understanding - Secure a Workstation

13.3.2 Windows Local Security Policy

13.3.2.1 The Windows Local Security Policy

13.3.2.2 Account Policies Security Settings

13.3.2.3 Local Policies Security Settings

13.3.2.4 Exporting the Local Security Policy

13.3.2.5 Lab - Configure Windows Local Security Policy

13.3.2.6 Check Your Understanding- Local Security Policy

13.3.3 Managing Users and Groups

13.3.3.1 Maintaining Accounts

13.3.3.2 Managing Users Account Tools and User Account Tasks

13.3.3.3 Local Users and Groups Manager

13.3.3.4 Managing Groups

13.3.3.5 Active Directory Users and Computers

13.3.3.6 Lab - Configure Users and Groups in Windows

13.3.3.7 Check your Understanding - User Account Tools and User Account Tasks
13.3.4 Windows Firewall

13.3.4.1 Firewalls

13.3.4.2 Software Firewalls

13.3.4.3 Windows Firewall

13.3.4.4 Configuring Exceptions in Windows Firewall

13.3.4.5 Windows Firewall with Advanced Security

13.3.4.6 Lab - Configure Windows Firewall

13.3.4.7 Check your Understanding - Windows Firewall

13.3.5 Web Security

13.3.5.1 Web Security

13.3.5.2 InPrivate Browsing

13.3.5.3 Pop-up Blocker

13.3.5.4 SmartScreen Filter

13.3.5.5 ActiveX Filtering

13.3.5.6 Check Your Understanding – Web Security

13.3.6 Security Maintenance

13.3.6.1 Restrictive Settings

13.3.6.2 Disable Auto-Play

13.3.6.3 Operating System Service Packs and Security Patches

13.3.6.4 Check your Understanding - Security Maintenance

13.4 Wireless Security


13.4.1 Configure Wireless Security

13.4.1.1 What Do You Already Know? - Wireless Security


13.4.1.2 Common Communication Encryption Types

13.4.1.3 Wi-Fi Configuration Best Practices

13.4.1.4 Authentication Methods

13.4.1.5 Wireless Security Modes

13.4.1.6 Firmware Updates

13.4.1.7 Firewalls

13.4.1.8 Port Forwarding and Port Triggering

13.4.1.9 Universal Plug and Play

13.4.1.10 Packet Tracer - Configure Wireless Security

13.5 Basic Troubleshooting Process for Security


13.5.1 Applying the Troubleshooting Process to Security

13.5.1.1 The Six Steps of the Troubleshooting Process

13.5.1.2 Identify the Problem

13.5.1.3 Establish a Theory of Probable Cause

13.5.1.4 Test the Theory to Determine Cause

13.5.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution

13.5.1.6 Verify Full System Functionality and, If Applicable Implement Preventive


Measures

13.5.1.7 Document Findings, Actions, and Outcomes

13.5.2 Common Problems and Solutions for Security

13.5.2.1 Common Problems and Solutions for Security

13.5.2.2 Lab - Document Customer Information in a Work Order

13.6 Summary
13.6.1 Conclusion

13.6.1.1 Chapter 13: Security

Chapter 14
The IT Professional
14.0 Introduction
14.0.1 Welcome

14.0.1.1 Chapter 14: The IT Professional

14.1 Communication Skills and the IT Professional


14.1.1 Communication Skills, Troubleshooting, and Professional Behavior

14.1.1.1 Relationship Between Communication Skills and Troubleshooting

14.1.1.2 Lab - Technician Resources

14.1.1.3 Relationship Between Communication Skills and Professional Behavior

14.1.2 Working with a Customer

14.1.2.1 Know, Relate, and Understand

14.1.2.2 Active Listening

14.1.2.3 Check Your Understanding - Closed-Ended and Open-Ended Questions

14.1.2.4 Video Demonstration - Active Listening and Summarizing

14.1.3 Professional Behavior

14.1.3.1 Using Professional Behavior with the Customer

14.1.3.2 Tips for Hold and Transfer

14.1.3.3 Video Demonstration - Hold and Transfer

14.1.3.4 What Do You Already Know? - Netiquette


14.1.4 The Customer Call

14.1.4.1 Keeping the Customer Call Focused

14.1.4.2 Video Demonstration - The Talkative Customer

14.1.4.3 Video Demonstration – The Rude Customer

14.1.4.4 Video Demonstration – The Knowledgeable Customer

14.1.4.5 Video Demonstration – The Angry Customer

14.1.4.6 Video Demonstration – The Inexperienced Customer

14.2 Operational Procedures


14.2.1 Documentation

14.2.1.1 Documentation Overview

14.2.1.2 IT Department Documentation

14.2.1.3 Regulatory Compliance Requirements

14.2.1.4 Check Your Understanding - Documentation

14.2.2 Change Management

14.2.2.1 Change Control Process

14.2.3 Disaster Prevention and Recovery

14.2.3.1 Disaster Recovery Overview

14.2.3.2 Preventing Downtime and Data Loss

14.2.3.3 Elements of a Disaster Recovery Plan

14.2.3.4 Check Your Understanding – Disaster Recovery

14.3 Ethical and Legal Considerations


14.3.1 Ethical and Legal Considerations in the IT Profession

14.3.1.1 Ethical and Legal Considerations in IT


14.3.1.2 Personal Identifiable Information (PII)

14.3.1.3 Payment Card Industry (PCI)

14.3.1.4 Protected Health Information (PHI)

14.3.1.5 Lab - Investigate Breaches of PII, PHI, PCI

14.3.1.6 Legal Considerations in IT

14.3.1.7 Licensing

14.3.1.8 Check Your Understanding - Licensing

14.3.2 Legal Procedures Overview

14.3.2.1 Computer Forensics

14.3.2.2 Data Collected in Computer Forensics

14.3.2.3 Cyber Law

14.3.2.4 First Response

14.3.2.5 Documentation

14.3.2.6 Chain of Custody

14.3.2.7 Check Your Understanding - Legal Procedures Overview

14.4 Call Center Technicians


14.4.1 Call Centers, Level One and Level Two Technicians

14.4.1.1 Call Centers

14.4.1.2 Level One Technician Responsibilities

14.4.1.3 Level Two Technician Responsibilities

14.4.1.4 Lab - Remote Technician - Fix a Hardware Problem

14.4.1.5 Lab - Remote Technician - Fix an Operating System Problem

14.4.1.6 Lab - Remote Technician - Fix a Network Problem


14.4.1.7 Lab - Remote Technician - Fix a Security Problem

14.4.2 Basic Scripting and the IT Professional

14.4.2.1 Script Examples

14.4.2.2 Scripting Languages

14.4.2.3 Basic Script Commands

14.4.2.4 Variables / Environmental Variables

14.4.2.5 Conditional Statements

14.4.2.6 Loops

14.4.2.7 Lab - Write Basic Scripts in Windows and Linux

14.5 Summary
14.5.1 Conclusion

14.5.1.1 Chapter 14: The IT Professional

You might also like