Sei sulla pagina 1di 10

Hardware & Networking Professional Training

COURSES CONTENT A+ Essentials

Bios and Motherboard


Distinguish between the functions of the BIOS chip and the CMOS chip Describe the characteristics of a typical CMOS setup program Recognize the configuration options offered by BIOS Describe the characteristics of the built-in diagnostic features of BIOS Match the potential problems with how they are monitored by the BIOS Match the expansion slots with their descriptions Distinguish between different types of RAM slots Recognize how the bus architecture functions Describe the characteristics of key motherboard connections

Memory, Expansion Cards and Storage Device


Describe the types of memory used in computer systems Recognize key characteristics of different types of RAM Describe the considerations involved in expansion card installation Match the expansion cards to descriptions of their characteristics Propose solutions for specific system upgrade scenarios Classify the characteristics of storage devices Describe how to upgrade a system hard drive in a given scenario

CPUs, Connections and Power Supplies


Match the characteristics of modern x86 processors to their descriptions Recognize types of CPUs Describe the characteristics of CPU sockets Match the physical I/O connection types to their description Match the wireless technologies to their descriptions Describe the considerations involved in choosing a power supply

Configurations, Displays, Connectors and Peripherals


Describe the configuration considerations involved in setting up a graphics work station Identify the key components of an audio/video workstation Distinguish between VDI modes of operation Match the home PC configuration considerations to the appropriate PC type Determine the most appropriate choice for a home server OS Distinguish between CRT, LCD, and projector technologies used for display devices Describe how to install the keyboard and mouse Recognize key characteristics of touch screen monitors Choose the most appropriate peripherals for a given scenario

Network Cabling, IP Addressing, Ports and Protocols


Distinguish between shielded and unshielded twisted-pair cabling Describe how fiber cabling works Distinguish between RG-6 and RG-59 coaxial cabling Specify the class of an IP address Distinguish between IPv4 and IPv6 addressing types Identify the default subnet masks for Class A, B, and C networks Describe how DHCP assignment works Recognize how common ports are used Specify the class of an IP address

Networking Technologies

Distinguish between the standards used for wireless networks Use encryption methods to secure wireless networks Implement the features of small office/home office routers Use encryption techniques to secure wireless networks Implement SOHO routers Use the appropriate network topology for a given scenario Determine the most appropriate network types for given requirements

Networking Devices and Tools


Distinguish between the functions of different network level devices Recognize the advantages of NAS servers Describe the key characteristics of firewalls Match the networking tools to descriptions their functions Identify the correct application for different network devices

Laptops

Recognize key characteristics of laptop computer cards Describe how a USB flash drive works Recognize the differences between the display technologies used for laptops Choose appropriate laptop displays in given scenarios Use laptop features Describe how laptop components are used

Printers

Describe the differences between laser, inkjet, thermal, and impact printers Install a printer using Windows Vista Install printers using Windows XP Share printers Install printers Protect yourself when servicing a printer Replace printer consumables

Operational Procedures

Describe best practice when ensuring the safety of personnel in an IT work environment Describe preventative maintenance measures for the workplace Recognize how to guard against risks to data and equipment in an electronic environment Match the key principles of information security to their descriptions Describe measures that can be taken to ensure information security Take steps to ensure information security

Follow best computers

practices

when

working

with

and

maintaining

personal

Apply troubleshooting methodology to a given scenario Describe the considerations involved in troubleshooting motherboards Recognize the causes of RAM errors Describe how to troubleshoot hardware and software related problems Use troubleshooting methodology to work through a problem Describe the characteristics of CPU failures Determine if an issue is related electrical supply problems Troubleshoot hard drives Identify the probable source of a hardware problem

Network Intro

Definition of LAN, & WAN Characteristics of LAN & WAN Topology Cable Properties Wiring Standards

Intro of OSI and TCP/IP


OSI Reference Model TCP/IP Model Data Encapsulation

Current Ethernet Specification


Collision Domain Broadcast Domain CSMA/CD

LAN Concept Network Devices


Low Level device description High Level device description Specialized devices Switch Bridge Router VPN Concentrator

IP Addressing, Sub netting, and Troubleshooting


IP terminology and Scheme IPv4 Add Type IPv6 Addressing and Expressions

Address Type Special Addresses Sub netting Detail DICR Troubleshooting IP Addresses

IP Routing and Routing Table


Routing Basics and process Static and Dynamic Routing Routing Protocol Detail RIP & RIP 2 EIGRP & OSPF IPv6 Routing Protocol RIPng EIGRPv6 OSPFv3

Switching and Virtual LANs


Switching Services Spanning Tree Protocol Intro Rapid STP Virtual Lan Basic Static and Dynamic VLANs Configuration of VTP Port Mirroring and Spanning

Wireless Networking

Intro of Wireless Technology 802.11 Standards 802.11b (2.4GHz) 802.11g (2.4GHz) 802.11a (5GHz) 802.11h (5GHz) Wireless Access Points

Wireless Antennas Ad Hoc Mode & Infrastructure Mode Signal Degradation Wireless Security

Authentication and Access Control


Access Control List Manage User Account and Password Security Public Key Infrastructure (PKI) Kerberos

Network Threats and Mitigation


Denial of Service Viruses Worms Wireless Threats Attackers and Tools Active and passive Detection

Trouble Shooting Tools


ARP HOSTNAME IPCONFIG WINIPCFG IFCONFIG NBTSTAT NS Look Up PING TRACERT ROUTE Telnet Utility Trouble Shooting Examples

Practical Application Introducing Microsoft Windows


Distinguish between Windows operating systems Distinguish between 32-bit and 64-bit operating systems Match Windows features to their descriptions Match the security and administrative tools to their descriptions Choose the appropriate Windows tool for a particular task

Installing and Configuring Windows


Choose a Windows installation method Describe the different Windows installation types Describe the decisions that need to be made prior to running a Windows Installation Distinguish between the formatting options available when working in Windows Identify basic Windows configuration tasks Describe the characteristics of key OS command tools Add Administrative Tools to the Start menu Use Administrative Tools

Optimizing Windows

Manage hard drive volumes Describe Windows migration tools Use the correct Windows utility for a given scenario Use Windows optimization tools Determine the most appropriate Windows Utility to use in a given scenario

Managing Windows

Configure Windows using the Control Panel Describe the characteristics of a workgroup Connect to a network

Use the Control Panel to configure Windows Use Windows networking features Perform Windows maintenance tasks Describe the characteristics of System Protection Describe the features of access control in Windows Distinguish between the options available for implementing virtualization Choose a virtualization option for a given scenario Security and Data Disposal Identify the type of social engineering techniques being used in a given scenario Identify malware attack types Propose security solutions for given scenarios Propose appropriate techniques for destroying magnetic media Describe the functions of a data leakage prevention strategy Describe how to connect to a network using an Ethernet connection Describe how a firewall works when a connection is made Recognize how to connect to a wireless network Match the wireless network security measure to its description Securely connect to wired and wireless networks

Mobile Devices

Match the mobile device to its characteristics Distinguish between iOS and Android systems Describe the features of iOS synchronization Describe the options available when synchronizing with Android-based devices Describe how to configure a mobile device Describe the considerations involved in getting online with mobile devices Distinguish between the security characteristics of iOS and Android Describe the backup options available on Android Recognize how to manage online access with a mobile device Describe how to secure a mobile device

System Troubleshooting

Apply troubleshooting methodology to a given scenario

Describe the considerations involved in troubleshooting motherboards Recognize the causes of RAM errors Describe how to troubleshoot hardware and software related problems Describe the characteristics of CPU failures Determine if an issue is related electrical supply problems Troubleshoot hard drives Sequence the steps to troubleshoot RAID drives Identify the probable source of a hardware problem General Troubleshooting

Describe the options for dealing with malware Troubleshoot network problems Propose solutions to deal with security issues Match each video issue with its probable cause Match the considerations involved in performing specific laptop maintenance tasks to the appropriate tasks Recognize how to isolate the source of a printer problem Describe how to troubleshoot printers

Potrebbero piacerti anche