Chapter 0 Course Introduction |
|
1 | (6) |
|
0.0 Welcome to IT Essentials |
|
|
1 | (6) |
|
0.0.1 Message to the Student |
|
|
1 | (1) |
|
0.0.1.2 More than Just Information |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (5) |
|
0.0.2.1 Education and Certifications |
|
|
2 | (1) |
|
0.0.2.2 CompTIA A+ Certification |
|
|
3 | (1) |
|
0.0.2.3 Field, Remote, and Bench Technicians |
|
|
4 | (1) |
|
0.0.2.4 Cisco Networking Academy and NetAcad Advantage |
|
|
4 | (3) |
Chapter 1 Introduction to the Personal Computer System |
|
7 | (30) |
|
|
7 | (1) |
|
1.1 Personal Computer Systems |
|
|
7 | (16) |
|
1.1.1 Cases and Power Supplies |
|
|
7 | (3) |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.1.1.3 Power Supply Wattage |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.1.2 Internal PC Components |
|
|
10 | (7) |
|
|
10 | (1) |
|
1.1.2.2 CPU Architectures |
|
|
11 | (1) |
|
1.1.2.3 Enhancing CPU Operation |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
1.1.2.8 Adapter Cards and Expansion Slots |
|
|
15 | (1) |
|
|
15 | (1) |
|
1.1.2.10 Storage Device Interfaces and RAID |
|
|
16 | (1) |
|
1.1.3 External Ports and Cables |
|
|
17 | (3) |
|
1.1.3.1 Video Ports and Cables |
|
|
17 | (1) |
|
1.1.3.2 Other Ports and Cables |
|
|
18 | (1) |
|
1.1.3.3 Adapters and Converters |
|
|
19 | (1) |
|
1.1.4 Input and Output Devices |
|
|
20 | (3) |
|
|
20 | (1) |
|
|
21 | (1) |
|
1.1.4.3 Monitor Characteristics |
|
|
22 | (1) |
|
1.2 Select Computer Components |
|
|
23 | (6) |
|
1.2.1 Select PC Components |
|
|
23 | (6) |
|
1.2.1.1 Building a Computer |
|
|
23 | (1) |
|
1.2.1.2 Select the Motherboard |
|
|
24 | (1) |
|
1.2.1.3 Select the Case and Fans |
|
|
24 | (1) |
|
1.2.1.4 Select the Power Supply |
|
|
25 | (1) |
|
1.2.1.5 Select the CPU and CPU Cooling System |
|
|
25 | (1) |
|
|
26 | (1) |
|
1.2.1.7 Select Adapter Cards |
|
|
26 | (1) |
|
1.2.1.8 Select Hard Drives |
|
|
27 | (1) |
|
1.2.1.9 Select a Media Reader |
|
|
28 | (1) |
|
1.2.1.10 Select Optical Drives |
|
|
28 | (1) |
|
1.2.1.11 Select External Storage |
|
|
29 | (1) |
|
1.2.1.12 Select Input and Output Devices |
|
|
29 | (1) |
|
1.2.1.13 Lab - Research Computer Components |
|
|
29 | (1) |
|
1.3 Configurations for Specialized Computer Systems |
|
|
29 | (5) |
|
1.3.1 Specialized Computer Systems |
|
|
29 | (8) |
|
1.3.1.1 Thick and Thin Clients |
|
|
29 | (1) |
|
|
30 | (1) |
|
1.3.1.3 Audio and Video Editing Workstations |
|
|
30 | (1) |
|
1.3.1.4 Virtualization Workstations |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
1.3.1.7 Lab - Build a Specialized Computer System |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (2) |
Chapter 2 Introduction to Lab Procedures and Tool Use |
|
37 | (16) |
|
|
37 | (1) |
|
|
37 | (6) |
|
2.1.1 Procedures to Protect People |
|
|
37 | (2) |
|
|
37 | (1) |
|
2.1.1.2 Electrical Safety |
|
|
38 | (1) |
|
|
38 | (1) |
|
2.1.2 Procedures to Protect Equipment and Data |
|
|
39 | (2) |
|
|
39 | (1) |
|
2.1.2.2 Power Fluctuation Types |
|
|
40 | (1) |
|
2.1.2.3 Power Protection Devices |
|
|
40 | (1) |
|
2.1.3 Procedures to Protect the Environment |
|
|
41 | (2) |
|
2.1.3.1 Safety Data Sheet |
|
|
41 | (1) |
|
2.1.3.2 Equipment Disposal |
|
|
42 | (1) |
|
|
43 | (7) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
2.2.2.1 Disk Management Tools |
|
|
44 | (1) |
|
2.2.2.2 Protection Software Tools |
|
|
45 | (1) |
|
2.2.2.3 Lab - Diagnostic Software |
|
|
45 | (1) |
|
2.2.3 Organizational Tools |
|
|
45 | (1) |
|
|
45 | (1) |
|
2.2.3.2 Miscellaneous Tools |
|
|
46 | (1) |
|
2.2.4 Demonstrate Proper Tool Use |
|
|
46 | (7) |
|
2.2.4.1 Antistatic Wrist Strap |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
2.2.4.4 Lab - Using a Multimeter and a Power Supply Tester |
|
|
49 | (1) |
|
2.2.4.5 Cleaning Materials |
|
|
49 | (1) |
|
2.2.4.6 Video - Computer Disassembly |
|
|
50 | (1) |
|
2.2.4.7 Lab - Computer Disassembly |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
Chapter 3 Computer Assembly |
|
53 | (24) |
|
|
53 | (1) |
|
3.1 Assemble the Computer |
|
|
53 | (11) |
|
3.1.1 Open the Case and Connect the Power Supply |
|
|
53 | (1) |
|
|
53 | (1) |
|
3.1.1.2 Install the Power Supply |
|
|
54 | (1) |
|
3.1.1.3 Lab - Install the Power Supply |
|
|
54 | (1) |
|
3.1.2 Install the Motherboard |
|
|
54 | (3) |
|
3.1.2.1 Install the CPU, Heat Sink and Fan Assembly |
|
|
54 | (1) |
|
3.1.2.2 Activity - Installing the CPU |
|
|
55 | (1) |
|
|
55 | (1) |
|
3.1.2.4 Install Motherboard |
|
|
56 | (1) |
|
3.1.2.5 Activity - Installing the Motherboard |
|
|
57 | (1) |
|
3.1.2.6 Lab - Install the Motherboard |
|
|
57 | (1) |
|
|
57 | (1) |
|
3.1.3.1 Install the Hard Drive |
|
|
57 | (1) |
|
3.1.3.2 Install the Optical Drive |
|
|
57 | (1) |
|
3.1.3.3 Lab - Install the Drives |
|
|
58 | (1) |
|
3.1.4 Install the Adapter Cards |
|
|
58 | (1) |
|
3.1.4.1 Types of Adapter Cards |
|
|
58 | (1) |
|
3.1.4.2 Install a Wireless NIC |
|
|
58 | (1) |
|
3.1.4.3 Install a Video Adapter Card |
|
|
58 | (1) |
|
3.1.4.4 Lab - Install Adapter Cards |
|
|
59 | (1) |
|
|
59 | (5) |
|
3.1.5.1 Connect Power to the Motherboard |
|
|
59 | (1) |
|
3.1.5.2 Connect Power to the Internal Drive and Case Fans |
|
|
60 | (1) |
|
3.1.5.3 Activity - Identify the Power Connectors |
|
|
60 | (1) |
|
3.1.5.4 Connect the Internal Data Cables |
|
|
60 | (1) |
|
3.1.5.5 Lab - Install Internal Cables |
|
|
61 | (1) |
|
3.1.5.6 Install the Front Panel Cables |
|
|
61 | (2) |
|
3.1.5.7 Activity - Identify the Front Panel Connectors |
|
|
63 | (1) |
|
3.1.5.8 Lab - Install Front Panel Cables |
|
|
63 | (1) |
|
3.1.5.9 Reassemble the Case Assembly |
|
|
63 | (1) |
|
3.1.5.10 Install the External Cables |
|
|
63 | (1) |
|
3.1.5.11 Activity - Identify the External Connectors |
|
|
64 | (1) |
|
3.1.5.12 Lab - Complete the Computer Assembly |
|
|
64 | (1) |
|
|
64 | (6) |
|
|
64 | (2) |
|
3.2.1.1 BIOS Beep Codes and Setup |
|
|
64 | (1) |
|
|
64 | (1) |
|
3.2.1.3 BIOS Setup Program |
|
|
65 | (1) |
|
3.2.1.4 UEFI Setup Program |
|
|
66 | (1) |
|
3.2.2 BIOS and UEFI Configuration |
|
|
66 | (4) |
|
3.2.2.1 BIOS Component Information |
|
|
66 | (1) |
|
3.2.2.2 BIOS Configurations |
|
|
66 | (1) |
|
3.2.2.3 BIOS Security Configurations |
|
|
67 | (1) |
|
3.2.2.4 BIOS Hardware Diagnostics and Monitoring |
|
|
68 | (1) |
|
|
69 | (1) |
|
3.2.2.6 UEFI Advanced Mode |
|
|
69 | (1) |
|
3.2.2.7 Activity - Identify Terms |
|
|
70 | (1) |
|
3.2.2.8 Lab - Boot the Computer |
|
|
70 | (1) |
|
3.3 Upgrade and Configure a Computer |
|
|
70 | (5) |
|
3.3.1 Motherboard and Related Components |
|
|
70 | (3) |
|
3.3.1.1 Motherboard Component Upgrades |
|
|
70 | (1) |
|
3.3.1.2 Upgrade the Motherboard |
|
|
71 | (1) |
|
|
72 | (1) |
|
3.3.1.4 Upgrade CPU and Heat Sink and Fan Assembly |
|
|
72 | (1) |
|
|
73 | (1) |
|
3.3.1.6 Lab - BIOS File Search |
|
|
73 | (1) |
|
|
73 | (1) |
|
3.3.2.1 Upgrade Hard Drives |
|
|
73 | (1) |
|
|
74 | (3) |
|
3.3.3.1 Upgrade Input and Output Devices |
|
|
74 | (1) |
|
3.3.3.2 Lab - Upgrade Hardware |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
Chapter 4 Overview of Preventive Maintenance |
|
77 | (12) |
|
|
77 | (1) |
|
4.1 Preventive Maintenance |
|
|
77 | (4) |
|
4.1.1 PC Preventive Maintenance Overview |
|
|
77 | (4) |
|
4.1.1.1 Benefits of Preventive Maintenance |
|
|
77 | (1) |
|
4.1.1.2 Preventive Maintenance Tasks |
|
|
78 | (1) |
|
4.1.1.3 Clean the Case and Internal Components |
|
|
78 | (1) |
|
4.1.1.4 Inspect Internal Components |
|
|
79 | (1) |
|
4.1.1.5 Environmental Concerns |
|
|
80 | (1) |
|
4.2 Troubleshooting Process |
|
|
81 | (4) |
|
4.2.1 Troubleshooting Process Steps |
|
|
81 | (4) |
|
4.2.1.1 Introduction to Troubleshooting |
|
|
81 | (1) |
|
4.2.1.2 Identify the Problem |
|
|
82 | (1) |
|
4.2.1.3 Activity - Identify the Problem |
|
|
83 | (1) |
|
4.2.1.4 Establish a Theory of Probable Cause |
|
|
83 | (1) |
|
4.2.1.5 Test the Theory to Determine Cause |
|
|
84 | (1) |
|
4.2.1.6 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
84 | (1) |
|
4.2.1.7 Verify Full System Functionality and, If Applicable, Implement Preventive Measures |
|
|
84 | (1) |
|
4.2.1.8 Document Findings, Actions, and Outcomes |
|
|
84 | (1) |
|
4.2.2 Common Problems and Solutions |
|
|
85 | (4) |
|
4.2.2.1 PC Common Problems and Solutions |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (2) |
Chapter 5 Windows Installation |
|
89 | (30) |
|
|
89 | (1) |
|
5.1 Modern Operating Systems |
|
|
89 | (7) |
|
5.1.1 Operating System Terms and Characteristics |
|
|
89 | (2) |
|
|
89 | (1) |
|
5.1.1.2 Basic Functions of an Operating System |
|
|
90 | (1) |
|
5.1.1.3 Processor Architecture |
|
|
91 | (1) |
|
5.1.2 Types of Operating Systems |
|
|
91 | (1) |
|
5.1.2.1 Desktop Operating Systems |
|
|
91 | (1) |
|
5.1.2.2 Network Operating Systems |
|
|
92 | (1) |
|
5.1.2.3 Lab - Search NOC Certifications and Jobs |
|
|
92 | (1) |
|
5.1.3 Customer Requirements for an Operating System |
|
|
92 | (2) |
|
5.1.3.1 OS Compatible Applications and Environments |
|
|
92 | (1) |
|
5.1.3.2 Minimum Hardware Requirements and Compatibility with OS Platform |
|
|
93 | (1) |
|
5.1.4 Operating Systems Upgrade |
|
|
94 | (2) |
|
5.1.4.1 Checking OS Compatibility |
|
|
94 | (1) |
|
5.1.4.2 Windows OS Upgrades |
|
|
94 | (1) |
|
|
95 | (1) |
|
5.1.4.4 Lab - Data Migration in Windows |
|
|
96 | (1) |
|
5.2 Operating System Installation |
|
|
96 | (21) |
|
5.2.1 Storage Device Setup Procedures |
|
|
96 | (8) |
|
5.2.1.1 Storage Device Types |
|
|
96 | (1) |
|
5.2.1.2 Hard Drive Partitioning |
|
|
97 | (2) |
|
5.2.1.3 Activity - Identify Disk Terminology |
|
|
99 | (1) |
|
|
99 | (1) |
|
5.2.1.5 Video - Disk Management |
|
|
100 | (1) |
|
5.2.1.6 OS Installation with Default Settings |
|
|
100 | (2) |
|
5.2.1.7 Lab - Install Windows |
|
|
102 | (1) |
|
|
102 | (1) |
|
5.2.1.9 Finalize the Installation |
|
|
103 | (1) |
|
5.2.1.10 Lab - Check for Updates in Windows |
|
|
104 | (1) |
|
5.2.2 Custom Installation Options |
|
|
104 | (4) |
|
|
104 | (1) |
|
5.2.2.2 Other Installation Methods |
|
|
104 | (1) |
|
5.2.2.3 Network Installation |
|
|
105 | (1) |
|
5.2.2.4 Restore, Refresh, and Recover |
|
|
106 | (1) |
|
5.2.2.5 System Recovery Options |
|
|
107 | (1) |
|
5.2.2.6 Identify OS Installation Terminology |
|
|
108 | (1) |
|
5.2.3 Boot Sequence and Registry Files |
|
|
108 | (2) |
|
5.2.3.1 Windows Boot Process |
|
|
108 | (1) |
|
5.2.3.2 Identify the BIOS Boot Process Order |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (4) |
|
5.2.4.1 Multiboot Procedures |
|
|
110 | (1) |
|
5.2.4.2 Disk Management Utility |
|
|
111 | (1) |
|
|
112 | (1) |
|
5.2.4.4 Drive Mapping or Drive Letter Assignment |
|
|
112 | (1) |
|
5.2.4.5 Video - Disk Partitioning |
|
|
113 | (1) |
|
5.2.4.6 Video - Drive Mirroring |
|
|
113 | (1) |
|
5.2.4.7 Lab - Create a Partition in Windows |
|
|
114 | (1) |
|
|
114 | (5) |
|
5.2.5.1 Directory Structures |
|
|
114 | (1) |
|
5.2.5.2 User and System File Locations |
|
|
115 | (1) |
|
5.2.5.3 File Extension and Attributes |
|
|
116 | (1) |
|
5.2.5.4 Application, File and Folder Properties |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
Chapter 6 Windows Configuration and Management |
|
119 | (32) |
|
|
119 | (1) |
|
6.1 The Windows GUI and Control Panel |
|
|
119 | (23) |
|
6.1.1 Windows Desktop, Tools and Applications |
|
|
119 | (6) |
|
|
119 | (1) |
|
6.1.1.2 Desktop Properties |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
6.1.1.5 Lab - Task Manager |
|
|
123 | (1) |
|
6.1.1.6 Computer and Windows Explorer |
|
|
123 | (1) |
|
6.1.1.7 Windows Libraries |
|
|
124 | (1) |
|
6.1.1.8 Install and Uninstall Applications |
|
|
124 | (1) |
|
6.1.1.9 Lab - Install Third-Party Software |
|
|
125 | (1) |
|
6.1.2 Control Panel Utilities |
|
|
125 | (10) |
|
6.1.2.1 Introduction to Control Panel Utilities |
|
|
125 | (1) |
|
|
126 | (1) |
|
6.1.2.3 Lab - Create User Accounts |
|
|
127 | (1) |
|
|
127 | (1) |
|
6.1.2.5 Lab - Configure Browser Settings |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
6.1.2.12 Lab - Manage Virtual Memory |
|
|
132 | (1) |
|
6.1.2.13 Device Manager, Devices and Printers, and Sound |
|
|
132 | (1) |
|
6.1.2.14 Lab - Device Manager |
|
|
133 | (1) |
|
6.1.2.15 Region, Programs and Features, and Troubleshooting |
|
|
133 | (1) |
|
6.1.2.16 Lab - Region and Language Options |
|
|
134 | (1) |
|
6.1.2.17 HomeGroup and Network and Sharing Center |
|
|
134 | (1) |
|
6.1.3 Administrative Tools |
|
|
135 | (3) |
|
6.1.3.1 Computer Management |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
6.1.3.4 System Configuration |
|
|
137 | (1) |
|
6.1.3.5 Performance Monitor and Windows Memory Diagnostics |
|
|
137 | (1) |
|
6.1.3.6 Programming Tools |
|
|
138 | (1) |
|
6.1.3.7 Lab - Monitor and manage System Resources |
|
|
138 | (1) |
|
6.1.4 Disk Defragmenter and Disk Error-Checking Tool |
|
|
138 | (2) |
|
6.1.4.1 Disk Defragmenter and Disk Error-Checking Tool |
|
|
138 | (1) |
|
6.1.4.2 Lab - Hard Drive Maintenance |
|
|
139 | (1) |
|
6.1.4.3 System Information |
|
|
139 | (1) |
|
6.1.4.4 Lab - Manage System Files in Windows |
|
|
140 | (1) |
|
|
140 | (2) |
|
6.1.5.1 Windows CLI Commands |
|
|
140 | (1) |
|
6.1.5.2 Video - Common Windows CLI Commands |
|
|
140 | (1) |
|
6.1.5.3 Video - Log User Access |
|
|
140 | (1) |
|
6.1.5.4 Lab - Common Windows CLI Commands |
|
|
141 | (1) |
|
|
141 | (1) |
|
6.1.5.6 Lab - System Utilities |
|
|
141 | (1) |
|
6.2 Client-Side Virtualization |
|
|
142 | (2) |
|
6.2.1 Purpose and Requirements of Virtualization |
|
|
142 | (2) |
|
6.2.1.1 Purpose of Virtual Machines |
|
|
142 | (1) |
|
6.2.1.2 Hypervisor: Virtual Machine Manager |
|
|
142 | (1) |
|
6.2.1.3 Virtual Machine Requirements |
|
|
143 | (1) |
|
6.3 Common Preventive Maintenance Techniques for Operating Systems |
|
|
144 | (4) |
|
6.3.1 OS Preventive Maintenance Plan |
|
|
144 | (4) |
|
6.3.1.1 Preventive Maintenance Plan Contents |
|
|
144 | (1) |
|
6.3.1.2 Lab - Manage the Startup Folder |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
6.3.1.5 Lab - Task Scheduler |
|
|
146 | (1) |
|
|
146 | (1) |
|
6.3.1.7 Lab - System Restore |
|
|
147 | (1) |
|
6.3.1.8 Hard Drive Backup |
|
|
147 | (1) |
|
6.3.1.9 Video - Backup Tool |
|
|
147 | (1) |
|
6.3.1.10 Video - Restore Points |
|
|
148 | (1) |
|
6.4 Basic Troubleshooting Process for Operating Systems |
|
|
148 | (1) |
|
6.4.1 Applying the Troubleshooting Process for Operating Systems |
|
|
148 | (1) |
|
6.4.1.1 Identify the Problem |
|
|
148 | (1) |
|
6.4.1.2 Establish a Theory of Probable Cause |
|
|
148 | (1) |
|
6.4.1.3 Test the Theory to Determine Cause |
|
|
148 | (1) |
|
6.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
148 | (1) |
|
6.4.1.5 Verify Full System Functionality and Implement Preventive Measures |
|
|
148 | (1) |
|
6.4.1.6 Document Findings, Actions and Outcomes |
|
|
149 | (1) |
|
6.4.2 Common Problems and Solutions for Operating Systems |
|
|
149 | (2) |
|
6.4.2.1 Common Problems and Solutions |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
Chapter 7 Networking Concepts |
|
151 | (24) |
|
|
151 | (1) |
|
7.1 Principles of Networking |
|
|
151 | (5) |
|
|
151 | (3) |
|
7.1.1.1 Network Definition |
|
|
151 | (1) |
|
|
152 | (1) |
|
7.1.1.3 Intermediary Devices |
|
|
152 | (1) |
|
|
152 | (1) |
|
7.1.1.5 Activity - Identify Network Devices and Media Representations |
|
|
153 | (1) |
|
7.1.1.6 Bandwidth and Latency |
|
|
153 | (1) |
|
7.1.1.7 Data Transmission |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
7.1.2.6 Peer-to-Peer Networks |
|
|
155 | (1) |
|
7.1.2.7 Client-Server Networks |
|
|
156 | (1) |
|
7.1.2.8 Activity - Matching Network Types |
|
|
156 | (1) |
|
|
156 | (4) |
|
|
156 | (2) |
|
|
156 | (1) |
|
|
157 | (1) |
|
7.2.1.3 OSI Reference Model |
|
|
157 | (1) |
|
|
157 | (1) |
|
7.2.1.5 Protocol Data Units |
|
|
157 | (1) |
|
7.2.1.6 Encapsulation Example |
|
|
158 | (1) |
|
7.2.1.7 De-Encapsulation Example |
|
|
158 | (1) |
|
7.2.1.8 Comparing the OSI and TCP/IP Models |
|
|
158 | (1) |
|
7.2.1.9 Activity - Place the OSI and TCP/IP Model Layers |
|
|
158 | (1) |
|
7.2.2 Wired and Wireless Ethernet Standards |
|
|
158 | (2) |
|
|
158 | (1) |
|
7.2.2.2 Ethernet Cable Standards |
|
|
159 | (1) |
|
|
159 | (1) |
|
7.2.2.4 Wireless Standards |
|
|
159 | (1) |
|
7.2.2.5 Wireless Security |
|
|
160 | (1) |
|
7.3 Physical Components of a Network |
|
|
160 | (6) |
|
|
160 | (3) |
|
|
160 | (1) |
|
7.3.1.2 Hubs, Bridges, and Switches |
|
|
160 | (1) |
|
7.3.1.3 Wireless Access Points and Routers |
|
|
161 | (1) |
|
7.3.1.4 Hardware Firewalls |
|
|
162 | (1) |
|
|
162 | (1) |
|
7.3.1.6 Activity - Identify Network Devices |
|
|
163 | (1) |
|
7.3.2 Cables and Connectors |
|
|
163 | (3) |
|
|
163 | (1) |
|
7.3.2.2 Twisted-Pair Cables |
|
|
163 | (1) |
|
7.3.2.3 Twisted-Pair Category Ratings |
|
|
164 | (1) |
|
7.3.2.4 Twisted-Pair Wire Schemes |
|
|
164 | (1) |
|
7.3.2.5 Activity - Cable Pinouts |
|
|
165 | (1) |
|
7.3.2.6 Lab - Build and Test Network Cables |
|
|
165 | (1) |
|
7.3.2.7 Packet Tracer - Cabling a Simple Network |
|
|
165 | (1) |
|
7.3.2.8 Fiber-Optic Cables |
|
|
165 | (1) |
|
7.3.2.9 Types of Fiber Media |
|
|
165 | (1) |
|
7.3.2.10 Fiber-Optic Connectors |
|
|
166 | (1) |
|
7.4 Basic Networking Concepts and Technologies |
|
|
166 | (7) |
|
7.4.1 Networked Equipment Addressing |
|
|
166 | (5) |
|
7.4.1.1 Network Addressing |
|
|
166 | (1) |
|
|
166 | (1) |
|
7.4.1.3 IPv4 Address Format |
|
|
167 | (1) |
|
7.4.1.4 Glassful and Classless IPv4 Addressing |
|
|
167 | (1) |
|
7.4.1.5 Number of IPv6 Addresses |
|
|
168 | (1) |
|
7.4.1.6 IPv6 Address Formats |
|
|
168 | (1) |
|
7.4.1.7 Video - IPv4 vs. IPv6 |
|
|
168 | (1) |
|
7.4.1.8 Static Addressing |
|
|
169 | (1) |
|
7.4.1.9 Dynamic Addressing |
|
|
169 | (1) |
|
|
170 | (1) |
|
7.4.1.11 Lab - Configure a NIC to Use DHCP in Windows |
|
|
171 | (1) |
|
7.4.1.12 Packet Tracer - Adding Computers to an Existing Network |
|
|
171 | (1) |
|
7.4.2 Transport Layer Protocols |
|
|
171 | (4) |
|
7.4.2.1 Role of the Transport Layer |
|
|
171 | (1) |
|
7.4.2.2 Transport Layer Features |
|
|
171 | (1) |
|
7.4.2.3 Transport Layer Protocol |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
7.4.2.7 Activity - TCP vs. UDP |
|
|
173 | (1) |
|
7.4.2.8 Activity - Protocol Definitions and Ports |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
Chapter 8 Applied Networking |
|
175 | (28) |
|
|
175 | (1) |
|
8.1 Computer to Network Connection |
|
|
175 | (15) |
|
|
175 | (3) |
|
8.1.1.1 Network Installation Completion List |
|
|
175 | (1) |
|
|
176 | (1) |
|
8.1.1.3 Installing and Updating a NIC |
|
|
176 | (1) |
|
8.1.1.4 Configuring a NIC |
|
|
177 | (1) |
|
8.1.1.5 Advanced NIC Settings |
|
|
177 | (1) |
|
8.1.2 Wireless and Wired Router Configurations |
|
|
178 | (6) |
|
8.1.2.1 Connecting the NIC |
|
|
178 | (1) |
|
8.1.2.2 Connecting the Router to the Internet |
|
|
179 | (1) |
|
8.1.2.3 Setting the Network Location |
|
|
179 | (1) |
|
8.1.2.4 Logging in to the Router |
|
|
180 | (1) |
|
8.1.2.5 Basic Network Setup |
|
|
180 | (1) |
|
8.1.2.6 Basic Wireless Settings |
|
|
181 | (1) |
|
8.1.2.7 Testing Connectivity with the Windows GUI |
|
|
182 | (1) |
|
8.1.2.8 Testing Connectivity with the Windows CLI |
|
|
182 | (1) |
|
8.1.2.9 Video - Network CLI Commands |
|
|
183 | (1) |
|
8.1.2.10 Lab - Connect to a Router for the First Time |
|
|
183 | (1) |
|
8.1.2.11 Packet Tracer - Connect to a Wireless Router and Configure Basic Settings |
|
|
183 | (1) |
|
8.1.2.12 Lab - Configure Wireless Router in Windows |
|
|
183 | (1) |
|
8.1.2.13 Packet Tracer - Connect Wireless Computers to a Wireless Router |
|
|
184 | (1) |
|
8.1.2.14 Lab - Test the Wireless NIC in Windows |
|
|
184 | (1) |
|
8.1.2.15 Packet Tracer - Test a Wireless Connection |
|
|
184 | (1) |
|
|
184 | (4) |
|
8.1.3.1 Domain and Workgroup |
|
|
184 | (1) |
|
8.1.3.2 Connecting to a Workgroup or Domain |
|
|
184 | (1) |
|
8.1.3.3 Windows Homegroup |
|
|
185 | (1) |
|
8.1.3.4 Sharing Resources in Windows Vista |
|
|
186 | (1) |
|
8.1.3.5 Network Shares and Mapping Drives |
|
|
186 | (1) |
|
8.1.3.6 Administrative Shares |
|
|
187 | (1) |
|
8.1.3.7 Network Drive Mapping |
|
|
187 | (1) |
|
8.1.3.8 Video - Share a Folder |
|
|
188 | (1) |
|
8.1.3.9 Lab - Share Resources in Windows |
|
|
188 | (1) |
|
|
188 | (2) |
|
|
188 | (1) |
|
8.1.4.2 Remote Desktop and Remote Assistance |
|
|
189 | (1) |
|
8.1.4.3 Lab - Remote Assistance in Windows |
|
|
189 | (1) |
|
8.1.4.4 Lab - Remote Desktop in Windows |
|
|
190 | (1) |
|
8.2 ISP Connection Technologies |
|
|
190 | (4) |
|
8.2.1 Broadband Technologies |
|
|
190 | (4) |
|
8.2.1.1 Brief History of Connection Technologies |
|
|
190 | (1) |
|
|
190 | (1) |
|
8.2.1.3 Line of Sight Wireless Internet Service |
|
|
191 | (1) |
|
|
191 | (1) |
|
8.2.1.5 Other Broadband Technologies |
|
|
191 | (2) |
|
8.2.1.6 Selecting an ISP for the Customer |
|
|
193 | (1) |
|
8.2.1.7 Activity - ISP Connection Types |
|
|
194 | (1) |
|
8.3 Internet Technologies |
|
|
194 | (5) |
|
8.3.1 Data Centers and Cloud Computing |
|
|
194 | (2) |
|
|
194 | (1) |
|
8.3.1.2 Cloud Computing versus Data Center |
|
|
195 | (1) |
|
8.3.1.3 Characteristics of Cloud Computing |
|
|
195 | (1) |
|
8.3.1.4 SaaS, IaaS and PaaS |
|
|
195 | (1) |
|
|
196 | (1) |
|
8.3.1.6 Activity - Identify Cloud Terminology |
|
|
196 | (1) |
|
8.3.2 Networked Host Services |
|
|
196 | (3) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
8.3.2.8 Authentication Services |
|
|
198 | (1) |
|
8.3.2.9 Intrusion Detection and Prevention Services |
|
|
198 | (1) |
|
8.3.2.10 Universal Threat Management |
|
|
199 | (1) |
|
8.3.2.11 Activity - Identify the Networked Host Service |
|
|
199 | (1) |
|
8.4 Common Preventive Maintenance Techniques Used for Networks |
|
|
199 | (1) |
|
8.4.1 Network Maintenance |
|
|
199 | (1) |
|
8.4.1.1 Preventive Maintenance Procedures |
|
|
199 | (1) |
|
8.5 Basic Troubleshooting Process for Networks |
|
|
200 | (1) |
|
8.5.1 Applying the Troubleshooting Process to Networks |
|
|
200 | (1) |
|
8.5.1.1 Identify the Problem |
|
|
200 | (1) |
|
8.5.1.2 Establish a Theory of Probable Cause |
|
|
201 | (1) |
|
8.5.1.3 Test the Theory to Determine Cause |
|
|
201 | (1) |
|
8.5.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
201 | (1) |
|
8.5.1.5 Verify Full System Functionality and Implement Preventive Measures |
|
|
201 | (1) |
|
8.5.1.6 Document Findings, Actions, and Outcomes |
|
|
201 | (1) |
|
8.5.2 Common Problems and Solutions for Networks |
|
|
201 | (2) |
|
8.5.2.1 Identify Common Problems and Solutions |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
Chapter 9 Laptops and Mobile Devices |
|
203 | (32) |
|
|
203 | (1) |
|
|
203 | (5) |
|
9.1.1 Features of Laptop Components |
|
|
203 | (4) |
|
9.1.1.1 External Features Unique to Laptops |
|
|
203 | (1) |
|
9.1.1.2 Common Input Devices and LEDs in Laptops |
|
|
204 | (1) |
|
9.1.1.3 Internal Components |
|
|
204 | (1) |
|
9.1.1.4 Special Function Keys |
|
|
205 | (1) |
|
9.1.1.5 Docking Station Versus Port Replicator |
|
|
206 | (1) |
|
9.1.1.6 Lab - Research Docking Stations |
|
|
207 | (1) |
|
|
207 | (1) |
|
9.1.2.1 LCD, LED, and OLED Displays |
|
|
207 | (1) |
|
9.1.2.2 Backlights and Inverters |
|
|
208 | (1) |
|
9.1.2.3 Wi-Fi Antenna Connectors |
|
|
208 | (1) |
|
9.1.2.4 Webcam and Microphone |
|
|
208 | (1) |
|
|
208 | (4) |
|
9.2.1 Power Settings Configuration |
|
|
208 | (2) |
|
|
208 | (1) |
|
9.2.1.2 Managing ACPI Settings in the BIOS |
|
|
209 | (1) |
|
9.2.1.3 Activity - Match ACPI Standards |
|
|
209 | (1) |
|
9.2.1.4 Managing Laptop Power Options |
|
|
209 | (1) |
|
9.2.2 Wireless Configuration |
|
|
210 | (2) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
9.3 Laptop Hardware and Component Installation and Configuration |
|
|
212 | (11) |
|
|
212 | (3) |
|
|
212 | (1) |
|
|
213 | (1) |
|
9.3.1.3 Smart Card Reader |
|
|
213 | (1) |
|
|
214 | (1) |
|
9.3.1.5 Lab - Research Laptop RAM |
|
|
215 | (1) |
|
9.3.2 Replacing Hardware Devices |
|
|
215 | (8) |
|
9.3.2.1 Overview of Hardware Replacement |
|
|
215 | (1) |
|
|
216 | (1) |
|
9.3.2.3 Lab - Research Laptop Batteries |
|
|
217 | (1) |
|
9.3.2.4 Keyboard, Touchpad, and Screen |
|
|
217 | (2) |
|
9.3.2.5 Lab - Research Laptop Screens |
|
|
219 | (1) |
|
9.3.2.6 Internal Storage Drive and Optical Drive |
|
|
219 | (1) |
|
9.3.2.7 Lab - Research Laptop Hard Drives |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
9.3.2.13 Video - Replace Laptop Components |
|
|
223 | (1) |
|
9.3.2.14 Lab - Research Building a Specialized Laptop |
|
|
223 | (1) |
|
9.4 Mobile Device Hardware Overview |
|
|
223 | (6) |
|
9.4.1 Mobile Device Hardware |
|
|
223 | (4) |
|
9.4.1.1 Mobile Device Parts |
|
|
223 | (1) |
|
9.4.1.2 Non-Upgradeable Hardware |
|
|
224 | (1) |
|
|
224 | (1) |
|
9.4.1.4 Solid State Drives |
|
|
225 | (1) |
|
|
226 | (1) |
|
9.4.1.6 Activity - Identify Connection Types |
|
|
226 | (1) |
|
|
226 | (1) |
|
9.4.2 Other Mobile Devices |
|
|
227 | (2) |
|
|
227 | (1) |
|
9.4.2.2 Specialty Devices |
|
|
228 | (1) |
|
9.5 Common Preventive Maintenance Techniques for Laptops and Mobile Devices |
|
|
229 | (2) |
|
9.5.1 Scheduled Maintenance for Laptops and Mobile Devices |
|
|
229 | (2) |
|
9.5.1.1 Scheduling Maintenance |
|
|
229 | (2) |
|
9.6 Basic Troubleshooting Process for Laptops and Mobile Devices |
|
|
231 | (1) |
|
|
231 | (1) |
|
9.6.1.1 Identify the Problem |
|
|
231 | (1) |
|
9.6.1.2 Establish a Theory of Probable Cause |
|
|
231 | (1) |
|
9.6.1.3 Test the Theory to Determine Cause |
|
|
231 | (1) |
|
9.6.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
231 | (1) |
|
9.6.1.5 Verify Full System Functionality and Implement Preventive Measures |
|
|
231 | (1) |
|
9.6.1.6 Document Findings, Actions, and Outcomes |
|
|
231 | (1) |
|
9.6.2 Common Problems and Solutions for Laptops and Mobile Devices |
|
|
232 | (3) |
|
9.6.2.1 Identify Common Problems and Solutions |
|
|
232 | (1) |
|
9.6.2.2 Lab - Research Laptop Problems |
|
|
232 | (1) |
|
9.6.2.3 Lab - Gather Information from the Customer |
|
|
232 | (1) |
|
9.6.2.4 Lab - Investigating Support Websites |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
Chapter 10 Mobile, Linux, and OS X Operating Systems |
|
235 | (46) |
|
|
235 | (1) |
|
10.1 Mobile Operating Systems |
|
|
235 | (15) |
|
|
235 | (3) |
|
10.1.1.1 Open Source versus Closed Source |
|
|
235 | (1) |
|
10.1.1.2 Mobile Application Development |
|
|
236 | (1) |
|
10.1.1.3 Application and Content Sources |
|
|
236 | (2) |
|
10.1.2 Android Touch Interface |
|
|
238 | (3) |
|
10.1.2.1 Home Screen Items |
|
|
238 | (1) |
|
10.1.2.2 Managing Apps, Widgets, and Folders |
|
|
239 | (2) |
|
10.1.2.3 Lab - Working with Android |
|
|
241 | (1) |
|
10.1.3 iOS Touch Interface |
|
|
241 | (3) |
|
10.1.3.1 Home Screen Items |
|
|
241 | (1) |
|
10.1.3.2 Managing Apps and Folders |
|
|
242 | (2) |
|
10.1.3.3 Lab - Working with iOS |
|
|
244 | (1) |
|
10.1.4 Windows Phone Touch Interface |
|
|
244 | (1) |
|
10.1.4.1 Start Screen Items |
|
|
244 | (1) |
|
10.1.4.2 Managing Apps and Folders |
|
|
245 | (1) |
|
10.1.5 Common Mobile Device Features |
|
|
245 | (5) |
|
10.1.5.1 Screen Orientation and Calibration |
|
|
245 | (1) |
|
|
246 | (1) |
|
10.1.5.3 Lab - Mobile Device Features |
|
|
247 | (1) |
|
10.1.5.4 Lab - Mobile Device Information |
|
|
247 | (1) |
|
10.1.5.5 Convenience Features |
|
|
247 | (2) |
|
10.1.5.6 Information Features |
|
|
249 | (1) |
|
10.2 Methods for Securing Mobile Devices |
|
|
250 | (7) |
|
|
250 | (3) |
|
10.2.1.1 Overview of Passcode Locks |
|
|
250 | (2) |
|
10.2.1.2 Lab - Passcode Locks |
|
|
252 | (1) |
|
10.2.1.3 Restrictions on Failed Login Attempts |
|
|
252 | (1) |
|
10.2.2 Cloud-Enabled Services for Mobile Devices |
|
|
253 | (2) |
|
|
253 | (1) |
|
10.2.2.2 Locator Applications |
|
|
254 | (1) |
|
10.2.2.3 Remote Lock and Remote Wipe |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
255 | (1) |
|
10.2.3.2 Patching and Updating Operating Systems |
|
|
256 | (1) |
|
10.3 Network Connectivity and Email |
|
|
257 | (11) |
|
10.3.1 Wireless and Cellular Data Network |
|
|
257 | (3) |
|
10.3.1.1 Wireless Data Network |
|
|
257 | (2) |
|
10.3.1.2 Lab - Mobile Wi-Fi |
|
|
259 | (1) |
|
10.3.1.3 Cellular Communications |
|
|
259 | (1) |
|
|
260 | (2) |
|
10.3.2.1 Bluetooth for Mobile Devices |
|
|
260 | (1) |
|
10.3.2.2 Bluetooth Pairing |
|
|
261 | (1) |
|
|
262 | (3) |
|
10.3.3.1 Introduction to Email |
|
|
262 | (2) |
|
10.3.3.2 Activity - Matching Email Protocols |
|
|
264 | (1) |
|
10.3.3.3 Android Email Configuration |
|
|
264 | (1) |
|
10.3.3.4 iOS Email Configuration |
|
|
264 | (1) |
|
|
265 | (1) |
|
10.3.4 Mobile Device Synchronization |
|
|
265 | (3) |
|
10.3.4.1 Types of Data to Synchronize |
|
|
265 | (2) |
|
10.3.4.2 Synchronization Connection Types |
|
|
267 | (1) |
|
10.4 Linux and OS X Operating Systems |
|
|
268 | (8) |
|
10.4.1 Linux and OS X Tools and Features |
|
|
268 | (4) |
|
10.4.1.1 Introduction to Linux and OS X Operating Systems |
|
|
268 | (1) |
|
10.4.1.2 Overview of Linux and OS X GUI |
|
|
268 | (1) |
|
10.4.1.3 Overview of Linux and OS X CLI |
|
|
269 | (1) |
|
10.4.1.4 Lab - Install Linux in a Virtual Machine and Explore the GUI |
|
|
270 | (1) |
|
10.4.1.5 Overview of Backup and Recovery |
|
|
270 | (1) |
|
10.4.1.6 Overview of Disk Utilities |
|
|
271 | (1) |
|
10.4.1.7 Video - Multiboot |
|
|
272 | (1) |
|
10.4.2 Linux and OS X Best Practices |
|
|
272 | (2) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (2) |
|
10.4.3.1 File and Folder Commands |
|
|
274 | (1) |
|
10.4.3.2 Administrative Commands |
|
|
275 | (1) |
|
10.4.3.3 Lab - Working with the Linux Command Line |
|
|
276 | (1) |
|
10.5 Basic Troubleshooting Process for Mobile, Linux, and OS X Operating Systems |
|
|
276 | (2) |
|
10.5.1 Applying the Troubleshooting Process to Mobile, Linux, and OS X Operating Systems |
|
|
276 | (1) |
|
10.5.1.1 Identify the Problem |
|
|
276 | (1) |
|
10.5.1.2 Establish a Theory of Probably Cause |
|
|
276 | (1) |
|
10.5.1.3 Test the Theory to Determine Cause |
|
|
276 | (1) |
|
10.5.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
276 | (1) |
|
10.5.1.5 Verify Full System Functionality and Implement Preventive Measures |
|
|
277 | (1) |
|
10.5.1.6 Document Findings, Actions, and Outcomes |
|
|
277 | (1) |
|
10.5.2 Common Problems and Solutions for Mobile, Linux, and OS X Operating Systems |
|
|
277 | (4) |
|
10.5.2.1 Identify Common Problems and Solutions |
|
|
277 | (1) |
|
10.5.2.2 Lab - Troubleshooting Mobile Devices |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (2) |
Chapter 11 Printers |
|
281 | (22) |
|
|
281 | (1) |
|
11.1 Common Printer Features |
|
|
281 | (6) |
|
11.1.1 Characteristics and Capabilities |
|
|
281 | (2) |
|
11.1.1.1 Characteristics and Capabilities of Printers |
|
|
281 | (1) |
|
11.1.1.2 Printer Connection Types |
|
|
282 | (1) |
|
|
283 | (4) |
|
|
283 | (1) |
|
|
284 | (1) |
|
11.1.2.3 Laser Printing Process |
|
|
285 | (1) |
|
11.1.2.4 Activity - Laser Printing Process |
|
|
285 | (1) |
|
11.1.2.5 Thermal Printers |
|
|
285 | (1) |
|
|
286 | (1) |
|
11.1.2.7 Virtual Printers |
|
|
287 | (1) |
|
11.2 Installing and Configuring Printers |
|
|
287 | (6) |
|
11.2.1 Installing and Updating a Printer |
|
|
287 | (3) |
|
11.2.1.1 Installing a Printer |
|
|
287 | (1) |
|
11.2.1.2 Types of Print Drivers |
|
|
288 | (1) |
|
11.2.1.3 Updating and Installing Printer Drivers |
|
|
288 | (1) |
|
11.2.1.4 Printer Test Page |
|
|
289 | (1) |
|
11.2.1.5 Test Printer Functions |
|
|
290 | (1) |
|
11.2.1.6 Lab - Install a Printer |
|
|
290 | (1) |
|
11.2.2 Configuring Options and Default Settings |
|
|
290 | (2) |
|
11.2.2.1 Common Configuration Settings |
|
|
290 | (1) |
|
11.2.2.2 Global and Individual document Options |
|
|
291 | (1) |
|
11.2.3 Optimizing Printer Performance |
|
|
292 | (1) |
|
11.2.3.1 Software Optimization |
|
|
292 | (1) |
|
11.2.3.2 Hardware Optimization |
|
|
292 | (1) |
|
|
293 | (4) |
|
11.3.1 Operating System Settings for Sharing Printers |
|
|
293 | (2) |
|
11.3.1.1 Configuring Printer Sharing |
|
|
293 | (1) |
|
11.3.1.2 Connecting to a Shared Printer |
|
|
294 | (1) |
|
11.3.1.3 Wireless Printer Connections |
|
|
295 | (1) |
|
|
295 | (2) |
|
11.3.2.1 Purposes of Print Servers |
|
|
295 | (1) |
|
11.3.2.2 Software Print Servers |
|
|
295 | (1) |
|
11.3.2.3 Hardware Print Servers |
|
|
296 | (1) |
|
11.3.2.4 Dedicated Printer Servers |
|
|
296 | (1) |
|
11.3.2.5 Lab - Share a Printer |
|
|
296 | (1) |
|
11.4 Maintaining and Troubleshooting Printers |
|
|
297 | (3) |
|
11.4.1 Printer Preventive Maintenance |
|
|
297 | (2) |
|
11.4.1.1 Vendor Guidelines |
|
|
297 | (1) |
|
11.4.1.2 Replacing Consumables |
|
|
297 | (1) |
|
11.4.1.3 Cleaning Methods |
|
|
298 | (1) |
|
11.4.1.4 Operational Environment |
|
|
299 | (1) |
|
11.4.2 Troubleshooting Printer Issues |
|
|
299 | (1) |
|
11.4.2.1 Identify the Problem |
|
|
299 | (1) |
|
11.4.2.2 Establish a Theory of Probably Cause |
|
|
299 | (1) |
|
11.4.2.3 Test the Theory to Determine Cause |
|
|
299 | (1) |
|
11.4.2.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
300 | (1) |
|
11.4.2.5 Verify Full System Functionality and Implement Preventive Measures |
|
|
300 | (1) |
|
11.4.2.6 Document Findings, Actions, and Outcomes |
|
|
300 | (1) |
|
11.4.3 Common Problems and Solutions for Printers |
|
|
300 | (3) |
|
11.4.3.1 Identify Common Problems and Solutions |
|
|
300 | (1) |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
Chapter 12 Security |
|
303 | (32) |
|
|
303 | (1) |
|
|
303 | (4) |
|
12.1.1 Types of Security Threats |
|
|
303 | (4) |
|
|
303 | (1) |
|
12.1.1.2 Activity - Identify Malware Types |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
12.1.1.6 Activity - Identify the TCP/IP Attacks |
|
|
306 | (1) |
|
12.1.1.7 Zero-Day Attacks |
|
|
306 | (1) |
|
12.1.1.8 Social Engineering |
|
|
306 | (1) |
|
|
307 | (19) |
|
12.2.1 Windows Local Security Policy |
|
|
307 | (2) |
|
12.2.1.1 What is a Security Policy? |
|
|
307 | (1) |
|
12.2.1.2 Accessing Windows Local Security Policy |
|
|
307 | (1) |
|
12.2.1.3 Usernames and Passwords |
|
|
307 | (1) |
|
12.2.1.4 Security Settings for Account Policies |
|
|
308 | (1) |
|
12.2.1.5 Local Password Management |
|
|
308 | (1) |
|
12.2.1.6 Security Settings for Local Policies |
|
|
309 | (1) |
|
12.2.1.7 Exporting the Local Security Policy |
|
|
309 | (1) |
|
12.2.1.8 Lab - Configure Windows Local Security Policy |
|
|
309 | (1) |
|
12.2.2 Securing Web Access |
|
|
309 | (3) |
|
|
309 | (1) |
|
12.2.2.2 ActiveX Filtering |
|
|
309 | (1) |
|
|
310 | (1) |
|
12.2.2.4 SmartScreen Filter |
|
|
310 | (1) |
|
12.2.2.5 InPrivate Browsing |
|
|
311 | (1) |
|
|
312 | (5) |
|
12.2.3.1 Software Firewalls |
|
|
312 | (1) |
|
12.2.3.2 Biometrics and Smart Cards |
|
|
312 | (1) |
|
|
313 | (1) |
|
12.2.3.4 File and Folder Permissions |
|
|
314 | (1) |
|
12.2.3.5 File and Folder Encryption |
|
|
314 | (1) |
|
12.2.3.6 Windows BitLocker |
|
|
315 | (1) |
|
|
316 | (1) |
|
12.2.3.8 Hard Drive Recycling and Destruction |
|
|
317 | (1) |
|
12.2.3.9 Activity - Identify Data Protection Terminology |
|
|
317 | (1) |
|
12.2.4 Protection Against Malicious Software |
|
|
317 | (2) |
|
12.2.4.1 Malicious Software Protection Programs |
|
|
317 | (1) |
|
12.2.4.2 Remediating Infected Systems |
|
|
318 | (1) |
|
12.2.4.3 Signature File Updates |
|
|
319 | (1) |
|
12.2.5 Security Techniques |
|
|
319 | (4) |
|
12.2.5.1 Common Communication Encryption Types |
|
|
319 | (1) |
|
12.2.5.2 Service Set Identifiers |
|
|
320 | (1) |
|
12.2.5.3 Wireless Security Modes |
|
|
321 | (1) |
|
12.2.5.4 Universal Plug and Play |
|
|
321 | (1) |
|
12.2.5.5 Firmware Updates |
|
|
321 | (1) |
|
|
321 | (1) |
|
12.2.5.7 Port Forwarding and Port Triggering |
|
|
322 | (1) |
|
12.2.5.8 Packet Tracer - Configure Wireless Security |
|
|
323 | (1) |
|
12.2.6 Protecting Physical Equipment |
|
|
323 | (3) |
|
12.2.6.1 Physical Equipment Protection Methods |
|
|
323 | (2) |
|
12.2.6.2 Security Hardware |
|
|
325 | (1) |
|
12.2.6.3 Activity - Identify the Physical Security Device |
|
|
326 | (1) |
|
12.3 Common Preventive Maintenance Techniques for Security |
|
|
326 | (5) |
|
12.3.1 Security Maintenance |
|
|
326 | (5) |
|
12.3.1.1 Operating System Service Packs and Security Patches |
|
|
326 | (1) |
|
|
326 | (1) |
|
12.3.1.3 Lab - Configure Data Backup and Recovery in Windows |
|
|
327 | (1) |
|
12.3.1.4 Windows Firewall |
|
|
327 | (1) |
|
12.3.1.5 Lab - Configure the Firewall in Windows |
|
|
328 | (1) |
|
12.3.1.6 Maintaining Accounts |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
12.3.1.9 Lab - Configure Users and Groups in Windows |
|
|
331 | (1) |
|
12.4 Basic Troubleshooting Process for Security |
|
|
331 | (2) |
|
12.4.1 Applying the Troubleshooting Process to Security |
|
|
331 | (1) |
|
12.4.1.1 Identify the Problem |
|
|
331 | (1) |
|
12.4.1.2 Establish a Theory of Probable Cause |
|
|
332 | (1) |
|
12.4.1.3 Test the Theory to Determine Cause |
|
|
332 | (1) |
|
12.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution |
|
|
332 | (1) |
|
12.4.1.5 Verify Full System Functionality and, If Applicable, Implement Preventive Measures |
|
|
332 | (1) |
|
12.4.1.6 Document Findings, Actions and Outcomes |
|
|
332 | (1) |
|
12.4.2 Common Problems and Solutions for Security |
|
|
332 | (3) |
|
12.4.2.1 Identify Common Problems and Solutions |
|
|
332 | (1) |
|
12.4.2.2 Lab - Document Customer Information in a Work Order |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
Chapter 13 The IT Professional |
|
335 | (16) |
|
|
335 | (1) |
|
13.1 Communication Skills and the IT Professional |
|
|
335 | (6) |
|
13.1.1 Communication Skills, Troubleshooting and the IT Professional |
|
|
335 | (1) |
|
13.1.1.1 Relationship Between Communication Skills and Troubleshooting |
|
|
335 | (1) |
|
13.1.1.2 Relationship Between Communication Skills and Professional Behavior |
|
|
336 | (1) |
|
13.1.1.3 Lab - Technician Resources |
|
|
336 | (1) |
|
13.1.2 Working with a Customer |
|
|
336 | (3) |
|
13.1.2.1 Using Communication Skills to Determine Customer Problems |
|
|
336 | (1) |
|
13.1.2.2 Displaying Professional Behavior with Customers |
|
|
337 | (1) |
|
13.1.2.3 Activity Professional Behaviors with Customers |
|
|
338 | (1) |
|
13.1.2.4 Keeping the Customer Focused on the Problem |
|
|
338 | (1) |
|
13.1.2.5 Using Proper Netiquette |
|
|
339 | (1) |
|
13.1.3 Employee Best Practices |
|
|
339 | (2) |
|
13.1.3.1 Time and Stress Management Techniques |
|
|
339 | (1) |
|
13.1.3.2 Observing Service Level Agreements |
|
|
340 | (1) |
|
13.1.3.3 Following Business Policies |
|
|
340 | (1) |
|
13.2 Ethical and Legal Issues in the IT Industry |
|
|
341 | (6) |
|
13.2.1 Ethical and Legal Considerations |
|
|
341 | (3) |
|
13.2.1.1 Ethical Considerations in IT |
|
|
341 | (1) |
|
13.2.1.2 Legal Considerations in IT |
|
|
342 | (1) |
|
|
343 | (1) |
|
13.2.2 Legal Procedures Overview |
|
|
344 | (3) |
|
13.2.2.1 Computer Forensics |
|
|
344 | (1) |
|
13.2.2.2 Cyber Law and First Response |
|
|
345 | (1) |
|
13.2.2.3 Documentation and Chain of Custody |
|
|
346 | (1) |
|
13.3 Call Center Technicians |
|
|
347 | (1) |
|
13.3.1 Call Centers, Level One Technicians, and Level Two Technicians |
|
|
347 | (4) |
|
|
347 | (1) |
|
13.3.1.2 Level One Technician Responsibilities |
|
|
347 | (1) |
|
13.3.1.3 Level Two Technician Responsibilities |
|
|
348 | (1) |
|
|
348 | (2) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
Chapter 14 Advanced Troubleshooting |
|
351 | (6) |
|
|
351 | (1) |
|
14.0.1.2 Six Steps for Troubleshooting Review |
|
|
351 | (1) |
|
14.1 Computer Components and Peripherals |
|
|
351 | (1) |
|
14.1.1 Apply Troubleshooting Process to Computer Components and Peripherals |
|
|
351 | (1) |
|
14.1.1.1 Advanced Problems and Solutions for Components and Peripherals |
|
|
351 | (1) |
|
14.1.1.2 Lab - Troubleshoot Hardware Problems |
|
|
351 | (1) |
|
14.1.1.3 Lab - Remote Technician - Fix a Hardware Problem |
|
|
352 | (1) |
|
|
352 | (1) |
|
14.2.1 Apply Troubleshooting Process to Operating Systems |
|
|
352 | (1) |
|
14.2.1.1 Advanced Problems and Solutions for Operating Systems |
|
|
352 | (1) |
|
14.2.1.2 Lab - Troubleshoot Operating System Problems |
|
|
352 | (1) |
|
14.2.1.3 Lab - Remote Technician - Fix an Operating System Problem |
|
|
352 | (1) |
|
|
352 | (1) |
|
14.3.1 Apply Troubleshooting Process to Networks |
|
|
352 | (1) |
|
14.3.1.1 Advanced Problems and Solutions for Networks |
|
|
352 | (1) |
|
14.3.1.2 Lab - Troubleshoot Network Problems |
|
|
353 | (1) |
|
14.3.1.3 Lab - Remote Technician - Fix a Network Problem |
|
|
353 | (1) |
|
|
353 | (1) |
|
14.4.1 Apply Troubleshooting Process to Security |
|
|
353 | (1) |
|
14.4.1.1 Advanced Problems and Solutions for Security |
|
|
353 | (1) |
|
14.4.1.2 Lab - Troubleshoot Security Problems |
|
|
354 | (1) |
|
14.4.1.3 Lab - Remote Technician - Fix a Security Problem |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (2) |
Index |
|
357 | |