Introduction |
|
xxxiv | |
|
Chapter 1 Introduction to Personal Computer Hardware |
|
|
1 | (32) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
Electrical and ESD Safety |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (3) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (3) |
|
Adapter Cards and Expansion Slots |
|
|
10 | (2) |
|
Hard Disk Drives and SSDs |
|
|
12 | (1) |
|
|
13 | (1) |
|
Ports, Cables, and Adapters |
|
|
14 | (4) |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Part 4 Compliance with Government Regulations |
|
|
25 | (1) |
|
|
26 | (1) |
|
1.3.2.3 Lab -- Disassemble a Computer |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (5) |
|
|
33 | (22) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (2) |
|
Install the Motherboard Components |
|
|
36 | (1) |
|
|
37 | (1) |
|
Install the Adapter Cards |
|
|
38 | (2) |
|
Select Additional Storage |
|
|
40 | (1) |
|
|
41 | (3) |
|
|
44 | (1) |
|
|
44 | (1) |
|
2.1.2.5 Lab--Install the Power Supply |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
2.1.3.10 Lab--Install the Motherboard in a Computer |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (2) |
|
2.1.4.7 Lab--Install the Drives |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
2.1.5.6 Lab--Install Adapter Cards |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (2) |
|
2.1.7.4 Lab--Install Internal Cables |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (2) |
|
2.1.7.8 Lab--Install Front Panel Cables |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
2.1.7.11 Lab--Complete the Computer Assembly |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Chapter 3 Advanced Computer Hardware |
|
|
55 | (34) |
|
|
56 | (1) |
|
|
56 | (1) |
|
POST, BIOS, CMOS, and UEFI |
|
|
56 | (1) |
|
|
57 | |
|
|
56 | (2) |
|
|
58 | (1) |
|
Power Fluctuation and Protection |
|
|
59 | (1) |
|
Advanced Computer Functionality |
|
|
59 | (1) |
|
CPU Architectures and Operation |
|
|
60 | (2) |
|
|
62 | (1) |
|
Ports, Connectors, and Cables |
|
|
63 | (7) |
|
|
70 | (1) |
|
|
71 | (1) |
|
Upgrade Computer Hardware |
|
|
71 | (1) |
|
Protecting the Environment |
|
|
72 | (1) |
|
Safe Disposal of Equipment and Supplies |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
74 | (1) |
|
3.1.1.6 Lab--Investigate BIOS or UEFI Settings |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Part 1 Enter BIOS or UEFI |
|
|
75 | (1) |
|
Part 2 Explore the Settings |
|
|
76 | (2) |
|
3.1.2.5 Lab--Search for BIOS or UEFI Firmware Updates |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (2) |
|
3.1.2.6 Lab--Install Windows |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (3) |
|
3.1.2.7 Lab--Install Third-Party Software In Windows |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Part 1 Installing Third-Party Software |
|
|
83 | (1) |
|
Part 2 Uninstalling Third-Party Software |
|
|
84 | (1) |
|
|
84 | (2) |
|
|
85 | (1) |
|
3.4.1.7 Lab--Research a Hardware Upgrade |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (3) |
|
Chapter 4 Preventive Maintenance and Troubleshooting |
|
|
89 | (16) |
|
|
90 | (1) |
|
|
90 | (1) |
|
PC Preventive Maintenance Overview |
|
|
90 | (1) |
|
|
91 | (1) |
|
Troubleshooting Process Steps |
|
|
92 | (1) |
|
Common Problems and Solutions for PCs |
|
|
92 | (2) |
|
Apply Troubleshooting Process to Computer Components and Peripherals |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
4.2.3.5 Lab--Use a Multimeter and a Power Supply Tester |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Part 2 Power Supply Tester |
|
|
98 | (3) |
|
4.2.3.6 Lab--Troubleshoot Hardware Problems |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (4) |
|
Chapter 5 Networking Concepts |
|
|
105 | (24) |
|
|
106 | (1) |
|
Network Components and Types |
|
|
106 | (1) |
|
|
106 | (2) |
|
Internet Connection Types |
|
|
108 | (1) |
|
Networking Protocols, Standards, and Services |
|
|
109 | (1) |
|
Transport Layer Protocols |
|
|
109 | (1) |
|
|
110 | (2) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Copper Cables and Connectors |
|
|
117 | (3) |
|
Fiber Cables and Connectors |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
5.4.2.8 Lab--Build and Test a Network Cable |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (2) |
|
|
125 | (4) |
|
Chapter 6 Applied Networking |
|
|
129 | (38) |
|
|
130 | (1) |
|
Device-to-Network Connections |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Configure Wired and Wireless Networks |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
Network Troubleshooting Process |
|
|
134 | (1) |
|
Network Problems and Solutions |
|
|
135 | (3) |
|
|
138 | (1) |
|
|
138 | (1) |
|
6.1.2.1 Packet Tracer--Add Computers to an Existing Network |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (2) |
|
6.1.2.7 Lab--Configure a NIC to Use DHCP In Windows |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (5) |
|
6.1.3.9 Packet Tracer--Connect to a Wireless Network |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Part 1 Connect to a Wireless Router |
|
|
146 | (2) |
|
Part 2 Configure the Wireless Settings |
|
|
148 | (1) |
|
Part 3 Connect Wireless Clients to an Access Point |
|
|
149 | (1) |
|
Part 4 Other Administrative Tasks |
|
|
149 | (2) |
|
6.1.3.10 Lab--Configure a Wireless Network |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
Part 1 Log into the Wireless Router |
|
|
151 | (1) |
|
Part 2 Configure Basic Wireless Settings |
|
|
152 | (1) |
|
Part 3 Connect a Wireless Client |
|
|
153 | (1) |
|
Part 4 Connect an Access Point (Optional) |
|
|
154 | (1) |
|
Part 5 Reset to the Original Configuration |
|
|
155 | (1) |
|
6.1.4.7 Packet Tracer--Configure Firewall Settings |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (3) |
|
6.1.4.8 Lab--Configure Firewall Settings |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Part 1 Log into the Wireless Router |
|
|
159 | (1) |
|
Part 2 Configure Firewall Settings |
|
|
160 | (2) |
|
|
162 | (1) |
|
6.1.5.3 Packet Tracer--Configure IoT Devices |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (2) |
|
6.2.2.5 Lab--Troubleshoot Network Problems |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (2) |
|
Chapter 7 Laptops and Other Mobile Devices |
|
|
167 | (30) |
|
|
168 | (1) |
|
Characteristics of Laptops and Other Mobile Devices |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
Laptop Display Components |
|
|
169 | (1) |
|
|
170 | (1) |
|
Power Settings Configuration |
|
|
170 | (1) |
|
|
171 | (1) |
|
Laptop Hardware and Component Installation and Configuration |
|
|
171 | (1) |
|
|
171 | (1) |
|
Replacing Laptop Components |
|
|
172 | (1) |
|
Other Mobile Device Hardware Overview |
|
|
172 | (1) |
|
Other Mobile Device Hardware |
|
|
173 | (1) |
|
|
173 | (1) |
|
Network Connectivity and Email |
|
|
174 | (1) |
|
Wireless and Cellular Data Networks |
|
|
174 | (1) |
|
|
175 | (1) |
|
Preventive Maintenance and Troubleshooting Laptops and Other Mobile Devices |
|
|
176 | (1) |
|
Scheduled Maintenance for Laptops and Other Mobile Devices |
|
|
176 | (1) |
|
Basic Troubleshooting Process for Laptops and Other Mobile Devices |
|
|
177 | (1) |
|
Applying the Troubleshooting Process to Laptops and Other Mobile Devices |
|
|
177 | (3) |
|
|
180 | (1) |
|
|
180 | (1) |
|
7.1.1.10 Lab--Mobile Device Information |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
7.1.2.7 Lab--Research Docking Stations and Port Replicators |
|
|
182 | (1) |
|
|
182 | (2) |
|
|
184 | (6) |
|
7.3.1.6 Lab--Research Laptop RAM |
|
|
185 | (1) |
|
7.3.2.4 Lab--Research Laptop Screens |
|
|
186 | (1) |
|
7.3.2.7 Lab--Research Laptop Batteries |
|
|
187 | (2) |
|
7.3.2.10 Lab--Research Laptop Drives |
|
|
189 | (1) |
|
7.5.1.2 Lab--Mobile WI-FI |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
190 | (4) |
|
7.7.2.4 Lab--Research Laptop Problems |
|
|
192 | (1) |
|
7.7.2.5 Lab--Gather Information from the Customer |
|
|
193 | (1) |
|
7.7.2.6 Investigate Support Websites and Repair Companies |
|
|
194 | (1) |
|
Local Laptop Repair Company |
|
|
194 | (1) |
|
Laptop Manufacturer Support Website |
|
|
195 | (2) |
|
|
197 | (24) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Characteristics and Capabilities |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (2) |
|
Thermal Printers and Impact Printers |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
Installing and Configuring Printers |
|
|
205 | (1) |
|
Installing and Updating a Printer |
|
|
205 | (1) |
|
Configuring Options and Default Settings |
|
|
205 | (1) |
|
Optimizing Printer Performance |
|
|
206 | (1) |
|
|
207 | (1) |
|
Operating System Settings for Sharing Printers |
|
|
207 | (1) |
|
|
207 | (1) |
|
Maintaining and Troubleshooting Printers |
|
|
208 | (1) |
|
Printer Preventive Maintenance |
|
|
208 | (1) |
|
Inkjet Printer Preventive Maintenance |
|
|
208 | (1) |
|
Laser Printer Preventive Maintenance |
|
|
208 | (1) |
|
Thermal Printer Preventive Maintenance |
|
|
209 | (1) |
|
Impact Printer Preventive Maintenance |
|
|
209 | (1) |
|
3D Printer Preventive Maintenance |
|
|
209 | (1) |
|
Troubleshooting Printer Issues |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
8.3.1.2 Lab--Install a Printer In Windows |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
8.4.1.3 Lab--Share a Printer in Windows |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
Part: Share a Directly Connected Printer |
|
|
214 | (2) |
|
8.5.2.3 Lab--Perform Preventive Maintenance on an Inkjet Printer |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
8.5.3.2 Lab--Perform Preventive Maintenance on a Laser Printer |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (2) |
|
Chapter 9 Virtualization and Cloud Computing |
|
|
221 | (12) |
|
|
222 | (1) |
|
|
222 | (1) |
|
Traditional Servers and Virtualized Servers |
|
|
222 | (1) |
|
Client-Side Virtualization |
|
|
223 | (1) |
|
|
224 | (1) |
|
Cloud Computing Applications |
|
|
224 | (1) |
|
|
225 | (3) |
|
|
228 | (1) |
|
|
228 | (1) |
|
9.1.2.5 Lab--Install Linux in a Virtual Machine and Explore the GUI |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Part 1 Prepare a Computer for Virtualization |
|
|
229 | (1) |
|
Part 2 Install Ubuntu on the Virtual Machine |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Chapter 10 Windows Installation |
|
|
233 | (36) |
|
|
234 | (1) |
|
|
234 | (1) |
|
Operating System Features |
|
|
234 | (1) |
|
Customer Requirements for an Operating System |
|
|
235 | (2) |
|
Operating System Upgrades |
|
|
237 | (1) |
|
|
238 | (2) |
|
|
240 | (1) |
|
Basic Windows Installation |
|
|
240 | (1) |
|
Custom Installation Options |
|
|
240 | (1) |
|
|
241 | (2) |
|
|
243 | (1) |
|
|
243 | (1) |
|
10.1.3.4 Lab--Operating System Upgrades |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
Part 1 Recovery Partition |
|
|
244 | (1) |
|
Part 2 Unattended Installation |
|
|
245 | (4) |
|
Part 3 Upgrade Considerations before Installation |
|
|
249 | (3) |
|
Part 4 Post Upgrade Installation |
|
|
252 | (2) |
|
10.2.1.8 Lab--Create a Partition in Windows |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Part 1 Open Disk Management |
|
|
254 | (1) |
|
Part 2 Create Free Space as Necessary |
|
|
254 | (1) |
|
Part 3 Create a New Disk Volume in the Free Space |
|
|
254 | (1) |
|
Part 4 Open the This PC Window to Review Information about the New Disk Partition |
|
|
255 | (1) |
|
Part 5 Create a Text Document and Save It to the ITE Drive |
|
|
255 | (1) |
|
Part 6 Convert the ITE Volume from FAT32 to NTFS Without Losing Data |
|
|
256 | (1) |
|
Part 7 Open the This PC Window to Work with the ITE Volume |
|
|
256 | (1) |
|
Part 8 Display the Properties of the ITE Test Document |
|
|
257 | (1) |
|
|
257 | (1) |
|
10.3.1.1 Lab--Windows Installation |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
258 | (3) |
|
10.3.1.4 Lab--Finalize Windows Installation |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
Part 1 User Account Creation |
|
|
261 | (1) |
|
Part 2 Finalize the Installation |
|
|
261 | (1) |
|
|
262 | (1) |
|
10.3.3.4 Lab--Boot Methods |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Part 1 Research Boot Methods |
|
|
263 | (2) |
|
Part 2 Access BIOS / UEFI |
|
|
265 | (1) |
|
Part 3 Use a Bootable USB Media |
|
|
266 | (3) |
|
Chapter 11 Windows Configuration |
|
|
269 | (144) |
|
|
270 | (1) |
|
Windows Desktop and File Explorer |
|
|
270 | (1) |
|
Comparing Windows Versions |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (2) |
|
|
273 | (1) |
|
Configure Windows with Control Panels |
|
|
274 | (1) |
|
|
274 | (4) |
|
User and Account Control Panel Items |
|
|
278 | (1) |
|
Network and Internet Control Panels |
|
|
279 | (1) |
|
Display Settings and Control Panel |
|
|
280 | (1) |
|
Power and System Control Panels |
|
|
281 | (1) |
|
Hardware and Sound Control Panels |
|
|
282 | (2) |
|
Clock, Region, and Language |
|
|
284 | (1) |
|
Programs and Features Control Panels |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (2) |
|
|
288 | (2) |
|
|
290 | (2) |
|
Application Installation and Configuration |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
Task and System CLI Commands |
|
|
295 | (1) |
|
Other Useful CLI Commands |
|
|
296 | (1) |
|
|
296 | (1) |
|
Network Sharing and Mapping Drives |
|
|
297 | (1) |
|
Sharing Local Resources with Others |
|
|
298 | (1) |
|
Configure a Wired Network Connection |
|
|
299 | (1) |
|
Configure a Wireless Network Interface in Windows |
|
|
299 | (1) |
|
|
300 | (1) |
|
Remote Desktop and Assistance |
|
|
301 | (1) |
|
Common Preventive Maintenance Techniques for Operating Systems |
|
|
302 | (1) |
|
OS Preventive Maintenance Plan |
|
|
302 | (1) |
|
|
302 | (1) |
|
Basic Troubleshooting Process for Windows Operating Systems |
|
|
303 | (1) |
|
Applying the Troubleshooting Process to Windows Operating Systems |
|
|
303 | (1) |
|
Common Problems and Solutions for Windows Operating Systems |
|
|
304 | (1) |
|
Advanced Troubleshooting for Windows Operating Systems |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
307 | (2) |
|
11.1.2.6 Lab--Configure the Windows Desktop |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (2) |
|
11.1.3.4 Lab--Work with Task Manager |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (3) |
|
|
314 | (1) |
|
11.1.4.11 Lab--Working with File Explorer |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (4) |
|
11.2.1.5 Lab--Explore Control Panel Categories |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (3) |
|
11.2.2.3 Lab--User Accounts |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
Part 2 Change the Account Type |
|
|
322 | (1) |
|
Part 3 Delete the Account |
|
|
323 | (1) |
|
|
323 | (1) |
|
11.2.2.4 Lab--Permissions |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
Part 1 User Account Control (UAC) |
|
|
324 | (1) |
|
Part 2 Permission Inheritance |
|
|
325 | (1) |
|
Part 3 Encrypting File System (EFS) |
|
|
326 | (1) |
|
|
327 | (1) |
|
11.2.3.5 Lab--Configure Browser Settings |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
Part 1 Set Microsoft Edge as the Default Browser |
|
|
328 | (1) |
|
Part 2 Clearing Browsing History |
|
|
329 | (1) |
|
Part 3 Configure the Security Settings |
|
|
329 | (1) |
|
Part 4 Configure Privacy Settings |
|
|
329 | (1) |
|
Part 5 Microsoft Defender SmartScreen |
|
|
330 | (1) |
|
|
330 | (1) |
|
11.2.5.8 Lab--Manage Virtual Memory |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
Part 1 Open System Properties |
|
|
331 | (1) |
|
Part 2 Make Virtual Memory Changes |
|
|
331 | (1) |
|
Part 3 Navigate Back to the Virtual Memory Window to Verify Changes |
|
|
332 | (1) |
|
Part 4 Reset the Virtual Memory Back to the Original Settings |
|
|
333 | (1) |
|
|
333 | (1) |
|
11.2.6.2 Lab--Use Device Manager |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (2) |
|
11.2.7.4 Lab--Region and Language Options |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (2) |
|
|
338 | (1) |
|
11.2.9.4 Lab--Privacy and Gaming |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
Part 1 Privacy and Gaming |
|
|
339 | (1) |
|
|
340 | (1) |
|
Part 3 Windows PC Privacy Settings |
|
|
341 | (1) |
|
Part 4 Windows Gaming Settings |
|
|
342 | (1) |
|
11.3.1.11 Lab--Monitor and Manage System Resources |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
Part 2 Explore the Impact of Services |
|
|
344 | (1) |
|
Part 3 Monitor and Record System Usage with Administrative Tools |
|
|
345 | (3) |
|
11.3.2.7 Lab--System Utilities |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
Part 1 Custom Management Console |
|
|
348 | (1) |
|
|
349 | (2) |
|
|
351 | (1) |
|
11.3.2.8 Lab--Manage System Files |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
352 | (2) |
|
|
354 | (1) |
|
11.3.3.8 Lab--Hard Drive Maintenance |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (2) |
|
11.3.4.9 Lab--Install Third-Party Software |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Part 1 Installing Third-Party Software |
|
|
357 | (1) |
|
Part 2 Uninstalling Third-Party Software |
|
|
358 | (1) |
|
|
358 | (1) |
|
11.4.1.5 Lab--Work in the Windows Command Shell |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
359 | (3) |
|
11.4.2.7 Lab--File System Commands |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
362 | (6) |
|
|
368 | (1) |
|
11.4.3.2 Lab--Disk CLI Commands |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
Part 1 Explore the chkdsk Command |
|
|
369 | (1) |
|
Part 2 Create a New Partition Using DiskPart |
|
|
370 | (4) |
|
|
374 | (2) |
|
11.4.4.2 Lab--Task and System CLI Commands |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Part 2 System CLI Commands |
|
|
377 | (3) |
|
11.4.6.3 Lab--Other Useful Commands |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
Part 1 The Group Policy CLI |
|
|
380 | (1) |
|
|
381 | (3) |
|
11.5.1.6 Lab--Network Drive Mapping |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (2) |
|
11.5.2.4 Lab--Share Resources |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
Part 1 Verify Network Settings for Sharing |
|
|
386 | (1) |
|
|
386 | (3) |
|
11.5.4.2 Lab--Connect and Test the Wireless Connection |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (3) |
|
|
392 | (1) |
|
11.5.5.3 Packet Tracer--Using Telnet and SSH |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
Part 1 Simulated Remote Access Using Packet Tracer |
|
|
393 | (1) |
|
Part 2 SSH Using Physical Equipment (Optional) |
|
|
394 | (1) |
|
11.5.6.2 Lab--Windows Remote Desktop and Assistance |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
Part 1 Windows Remote Desktop |
|
|
395 | (2) |
|
|
397 | (1) |
|
|
398 | (1) |
|
11.6.1.2 Lab--Manage the Startup Folder |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (2) |
|
|
401 | (1) |
|
11.6.1.5 Lab--Schedule a Task Using the GUI and the Command Line |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
Part 1 Schedule a Task Using the GUI |
|
|
402 | (1) |
|
Part 2 Schedule a Task Using the CLI |
|
|
403 | (1) |
|
|
404 | (1) |
|
11.6.2.4 Lab--System Restore and Hard Drive Backup |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (2) |
|
|
407 | (2) |
|
|
409 | (1) |
|
11.7.3.2 Lab--Troubleshoot Operating System Problems |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
410 | (3) |
|
Chapter 12 Mobile, Linux, and macOS Operating Systems |
|
|
413 | (46) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
Android and iOS Touch Interfaces |
|
|
414 | (1) |
|
Common Mobile Device Features |
|
|
415 | (1) |
|
Methods for Securing Mobile Devices |
|
|
416 | (1) |
|
Screen Locks and Biometric Authentication |
|
|
416 | (1) |
|
Cloud-Enabled Services for Mobile Devices |
|
|
416 | (1) |
|
|
417 | (1) |
|
Linux and macOS Operating Systems |
|
|
417 | (1) |
|
Linux and macOS Tools and Features |
|
|
417 | (1) |
|
Linux and macOS Best Practices |
|
|
418 | (1) |
|
|
419 | (1) |
|
Basic Troubleshooting Process for Other Operating Systems |
|
|
420 | (1) |
|
Applying the Troubleshooting Process to Other Operating Systems |
|
|
420 | (1) |
|
Common Problems and Solutions for Other Operating Systems |
|
|
421 | (2) |
|
|
423 | (1) |
|
|
423 | (1) |
|
12.1.2.2 Lab--Working with Android |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
424 | (5) |
|
|
429 | (3) |
|
|
432 | (4) |
|
12.1.3.2 Lab--Working with iOS |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
Part 1 Apps and the Home Screen |
|
|
436 | (1) |
|
|
437 | (3) |
|
|
440 | (2) |
|
|
442 | (1) |
|
12.1.4.4 Lab--Mobile Device Features |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
445 | (2) |
|
12.2.1.2 Lab--Passcode Locks |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
Part 1 Passcode Lock on Android |
|
|
447 | (4) |
|
Part 2 Passcode Lock on iOS |
|
|
451 | (5) |
|
12.4.2.4 Lab--Troubleshoot Mobile Devices |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
Troubleshooting Mobile Devices |
|
|
456 | (3) |
|
|
459 | (46) |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (2) |
|
Social Engineering Attacks |
|
|
464 | (2) |
|
|
466 | (1) |
|
|
466 | (1) |
|
Protecting Physical Equipment |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
467 | (1) |
|
Securing Windows Workstations |
|
|
468 | (1) |
|
|
468 | (1) |
|
Windows Local Security Policy |
|
|
469 | (1) |
|
Managing Users and Groups |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
Configure Wireless Security |
|
|
472 | (2) |
|
Basic Troubleshooting Process for Security |
|
|
474 | (1) |
|
Applying the Troubleshooting Process to Security |
|
|
474 | (1) |
|
Common Problems and Solutions for Security |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
13.1.2.6 Lab--Operating System Security |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
Part 1 Microsoft Defender Antivirus |
|
|
477 | (1) |
|
Part 2 Windows Defender Firewall |
|
|
478 | (2) |
|
13.2.3.7 Lab--BltLocker and BltLocker To Go |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
Part 1 Use BitLocker To Go |
|
|
480 | (1) |
|
Part 2 Encrypt the Operating System Drive |
|
|
481 | (2) |
|
13.3.1.6 Lab--Operating System Login |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
Part 1 Type of Authentications |
|
|
483 | (1) |
|
Part 2 Single sign-on (SSO) |
|
|
484 | (2) |
|
13.3.2.5 Lab--Configure Windows Local Security Policy |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (4) |
|
13.3.3.6 Lab--Configure Users and Groups In Windows |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (2) |
|
|
492 | (2) |
|
Part 3 Modify User and Group Permissions |
|
|
494 | (2) |
|
|
496 | (1) |
|
13.3.4.6 Lab--Configure Windows Firewall |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (2) |
|
|
499 | (1) |
|
13.4.1.10 Packet Tracer--Configure Wireless Security |
|
|
500 | (1) |
|
|
500 | (2) |
|
13.5.2.2 Lab--Document Customer Information in a Work Order |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (2) |
|
Chapter 14 The IT Professional |
|
|
505 | |
|
|
506 | (1) |
|
Communication Skills and the IT Professional |
|
|
506 | (1) |
|
Communication Skills, Troubleshooting, and Professional Behavior |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
508 | (2) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
510 | (1) |
|
Disaster Prevention and Recovery |
|
|
511 | (1) |
|
Ethical and Legal Considerations |
|
|
511 | (1) |
|
Ethical and Legal Considerations in the IT Profession |
|
|
511 | (2) |
|
Legal Procedures Overview |
|
|
513 | (1) |
|
|
514 | (1) |
|
Level One and Level Two Technicians |
|
|
515 | (1) |
|
Basic Script and the IT Professional |
|
|
515 | (3) |
|
|
518 | (1) |
|
|
518 | (1) |
|
14.3.1.5 Lab--Investigate Breaches of PII, PHI, PCI |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
Part 1 Research a PII Breach |
|
|
519 | (2) |
|
14.4.1.4 Lab---Remote Technician--Repair Boot Problem |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
Your Reponse to the Customer |
|
|
522 | (1) |
|
Any Technical Resources Used |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
14.4.1.5 Lab---Remote Technician--Fix an Operating System Problem |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
Your Reponse to the Customer |
|
|
525 | (1) |
|
Any Technical Resources Used |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
14.4.1.6 Lab---Remote Technician--Fix a Network Problem |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
Your Reponse to the Customer |
|
|
528 | (1) |
|
Any Technical Resources Used |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
14.4.1.7 Lab---Remote Technician--Fix a Security Problem |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
Your Reponse to the Customer |
|
|
531 | (1) |
|
Any Technical Resources Used |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
14.4.2.7 Lab--Write Basic Scripts In Windows and Linux |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | |