Sei sulla pagina 1di 4

CENTER OF KNOWLEDGE, PATH TO SUCCESS

Website: www.info-trek.com

COMP TIA A+ COMPLETE STUDY GUIDE


Duration: 5 days

Chapter 1: Identifying Personal Computer Components.


I. Identifying Components of Motherboards X. Identifying Purposes and Characteristics of Cooling Systems
• Types of System Boards • Fans
• System Board From Factors • Memory Cooling
• System Board Components • Hard Drive Cooling
• Chipset Cooling
II. Identifying Purposes and Characteristics of Processors • CPU Cooling

III. Identifying Purposes and Characteristics of Memory Chapter 2: Effectively Working with Personal Computer
• DRAM Components.
• SRAM I. Installing, Configuring, and Optimizing PC Components
• ROM • Upgrading Storage Devices
• CMOS • Upgrading Display Devices
• Memory Packaging • Upgrading Input/Multimedia Devices

IV. Identifying Purposes and Characteristics of Storage Devices II. Identifying Tools and Diagnostics for PC Components
• Hard Disk Drive Systems • Gathering Tools
• Floppy Drives • Basic Aspects of Troubleshooting
• CD-ROM Drives
• CD-R and CD-RW Drives • Basic Diagnostic Procedures
• DVD-ROM Drives • Recognizing and Isolating Issues
• DVD Burners • Applying Basic Troubleshooting Techniques
• Other Storage Media
III. Performing Preventative Maintenance on Personal Computers
• Advanced Digital Storage

V. Identifying Purposes and Characteristic of Power Supplies Chapter 3: Understanding Laptops and Portable
• Floppy Drive Power Connectors Devices.
• AT System Connectors I. Understanding Laptop Architecture
• Standard Peripheral Power Connector • Laptops vs. Desktops
• Modern Power Connectors • Laptop Case
• Motherboards and Processors
VI. Identifying Purposes and Characteristics of • Memory
• Display Concepts • Storage
• Video Technologies • Displays
• Monitors • Input Devices
• Liquid Crystal Displays ( LCDs) • Expansion Bus and Ports
• Docking Stations
VII. Identifying Input Devices • Power Systems
• Mouse
• Keyboard II. Managing Power and Removing Devices
• Understanding Laptop Power Management
• Bar-code Reader
• Managing Power in Windows
• Multimedia Devices
• Removing Laptop-Specific Hardware
• Biometric Devices
• Touch Screens
III. Troubleshooting and Performing Preventative Maintenance on
VIII. Identifying Purposes and Characteristics of Adapter Cards Laptops
• Video Card • Diagnosing Laptop Problems
• Network Interface Card (NIC) • Performing Preventative Maintenance
• Modem
• Sound Card Chapter 4: Understanding Operating Systems.
• I/O Card I. Understanding Operating Systems
• Operating System Terms and Concepts
IX. Identifying Characteristics of Ports and Cables • Microsoft Windows
• Peripheral Port Connector Types • Alternative Operating Systems
• D-subminiature Connectors
• Other Types of Ports II. Using Operating Systems
• Common Peripheral Interfaces and Cables • The Windows Interface
• What's in a Window?

Approved

Training
Provider
CENTER OF KNOWLEDGE, PATH TO SUCCESS
Website: www.info-trek.com

• File Management Tools

• Control Panel
• The Command Prompt
• The Registry V. Identifying Diagnostic Resources
• Virtual Memory • User/installation Manuals
• Windows System Files • Internet/Web Resources
• Disk Management • Training Materials
• File Management
VI. Performing Preventative Maintenance on Operating Systems
Chapter 5: Understanding Basics of Installing, • Using Recommended Hardware
• Obtaining Current Drivers
Configuring, Optimizing, and Upgrading Operating
• Installing Windows Properly
Systems.
I. Installing Operating Systems • Shutting Down Properly
• Installation Prerequisites • Updating Windows
• Preparing the Computer for Installation • Scheduling Backups
• Windows XP Installation • Creating Restore Points
• Post-Installation Routines • Guarding against Viruses

II. Upgrading the Operating System Chapter 7: Understanding the Basics of Printers and
• Upgrade Prerequisites Scanners.
• Upgrading to Windows 2000 I. Understanding Printers and Scanner Fundamentals
• Upgrading to Windows XP • Impact Printers
• Finalizing Your Upgrade • Bubble-Jet Printers
• Laser Printers
III. Installing Device Drivers • Printer Interfaces and Supplies
• Rights and Security Issues • Scanners and Their Components
• Basic Procedure for Device Installation
• Windows Version-Specific Installation Items II. Installing Configuring and Upgrading Printers and Scanners
• Printer and Scanner Installation Procedures
IV. Optimizing Windows 2000 and Windows XP • Optimizing Printer and Scanner Performance
• Managing Virtual Memory
• Defragmenting Disks III. Troubleshooting Printer and Scanners
• Using Disk Caches • Dot-Matrix Printer Problems
• Managing Temporary Files • Bubble-Jet Printer Problems
• Laser and Page Printer Problems
Chapter 6: Identifying Operating System • Scanner Troubleshooting
Troubleshooting and Diagnostic Procedures.
I. Troubleshooting Steps Chapter 8: Networking Fundamentals.
• Step 1: Talk to the Customer I. Understanding Networking Principles
• Step 2: Gather Information • Understanding Networking Fundamentals
• Identifying Common Network Media
• Step 3: Eliminate Possibilities • Understanding Networking Components
• Step 4: Evaluate Your Results
• Step .5: Document Your Work II. Installing, Configuring, and Troubleshooting Networks
• Installing and Configuring Network Interface Cards
II. Understanding Boot Sequences • Obtaining Wired and Wireless Internet Connections
• Listing the Important Flies • Troubleshooting Network Interface Cards
• Identifying Important Files in Windows 2000/XP
• Understanding the Windows 2000/XP Boot Process Chapter 9: Understanding Network Security
• Advanced Startup Options Fundamentals.
• Using the Recovery Console I. Understanding Security
• Creating Boot Disks or an Emergency Repair Disk • Authentication Technologies
• Working with Hardware and Software Security
III. Identifying Windows • Understanding Wireless Security
• Files Related Problems • Understanding Data and Physical Security
• System Files Not Found
II. Security Solutions
• Configuration File Issues
• BIOS Security
• Swap Files Issues • Malicious Software Protection
• Windows Boot Issues • Data Access
• Troubleshooting Other Common Problems • Backup Procedures
• Understanding Windows Reporting • Data Migration
• Data Remnant Removal
IV. Identifying Windows-Based Troubleshooting Utilities
• Password Management
• Disk Management Tools
• Locking Workstations
• System Management Tools

Approved

Training
Provider
CENTER OF KNOWLEDGE, PATH TO SUCCESS
Website: www.info-trek.com

• Identifying Applications for Laptop-Specific


Communication Connections
• Identifying Laptop-Specific Power Requirements
• Understanding LCD Technology

III. Identifying Security Problems Areas

Chapter 10: Identifying Safety and Environmental


Issues. II. Removing Devices and Video Sharing
I. Understanding Safety and Environmental Issues
• Removing Laptop-Specific Hardware
• Identifying Potential Safety Hazards
• Understanding Video Memory Sharing
• Identifying Environmental Concerns
• Using Safety Documentation III. Troubleshooting Laptops
• Using Appropriate Repair Tools • Identifying Specific Safety Issues
• Handling Accidents • Diagnosing Laptop Problems

II. Applying Proper Safety and Disposal Procedures


Chapter 14: Installing, Configuring, Optimizing, and
• Preventing Electrostatic Discharge (ESD)
Upgrading Operating Systems.
• Working in a Safe Environment
I. Using Operating Systems
• Handling Equipment
• Using the Command Prompt
• Following Disposal Procedures
• Managing Disks Directories and Files
Chapter 11: Understanding Professionalism and • Using Windows Utilities
Communication.
I. Using Good Communication Skills II. Optimizing Operating Systems
• Elicit Problem Symptoms from Customers • Managing Virtual Memory
• Defragmenting Disks
• Have the Customers Reproduce the Error • Managing Temporary Files
• Identify Recent Changes • Managing Services, Startup, and Applications
• Use the Collected Information
III. Troubleshooting Windows
II. Using Appropriate Behavior • Recovering Windows
• Punctuality • Recognizing and Resolving Common Operational
• Accountability Problems and Error Messages
• Flexibility • Using Windows Diagnostic Utilities
• Confidentiality
• Respect IV. Performing Preventative Maintenance
• Privacy • Updating Windows
• Scheduling Backups
III. Putting It All in Perspective • Creating Restore Points

Chapter 12: Working with Personal Computer Chapter 15: Installing, Configuring, Optimizing, and
Components. Upgrading Printers and Scanners.
I. Removing, Installing, and Configuring Components I. Understanding Printer and Scanner Processes
• Selecting Components • Impact Printers
• Motherboards, CPUs, Memory, and Adapter Cards • Ink-Dispersion Printers
• Storage Devices • Laser Printers
• Power Supplies • Other Printers
• Display Devices • Scanner Processes
• Input Devices
• Cooling Systems II. Installing, Configuring, Optimizing, and Upgrading
Printers and Scanners
II. Using Tools and Diagnostic Procedures for Personal • Printer and Scanner Installation Procedure
Computer Components • Installing Printer Upgrades
• Understanding Computer Resources • Optimizing Scanner Performance
• Determining Available Resources
III. Using Printer and Scanner Troubleshooting Tools and
• Manually Specifying Resource Assignment
Techniques
• Diagnostic Resources
• Multi-meter
• Screwdrivers
III. Performing Preventative Maintenance for Personal Computer • Cleaning Solutions
Components • Extension Magnets
• Test Patterns
Chapter 13: Working with Laptops and Portable
Devices. IV. Performing Preventative Maintenance
I. Using Laptops and Portable Devices • Performing Scheduled Maintenance
• Ensuring a Suitable Environment

Approved

Training
Provider
CENTER OF KNOWLEDGE, PATH TO SUCCESS
Website: www.info-trek.com

• Using Recommended Supplies

Chapter 16: Installing, Configuring, Optimizing, and


Upgrading Network Systems.
I. Understanding Networking
• Identifying Network Protocols and Technologies
• Identifying Network Connectivity Technologies

II. Working with Additional Network Components


• Working with Browsers
• Establishing Network Connectivity
• Sharing Network Resources

III. Using Network Tools and Diagnostics


• Network Tools to Use
• Troubleshooting Network Issues

IV. Performing Preventative Network Maintenance

Chapter 17: Installing, Configuring, Upgrading, and


Optimizing Security Systems.
I. Understanding Security Baselines

II. Hardening a System


• Hardening the OS and NOS
• Hardening File Systems
• Working with Access Control Lists
• Working with Group Policies

III. Auditing and Logging

IV. Updating Your Operating System


• Hot fixes
• Service Packs
• Patches

V. Revisiting Social Engineering

VI. Recognizing Common Attack


• Back Door Attacks
• Spoofing Attacks
• Man-in-the-Middle Attacks
• Replay Attacks
• Password-Guessing Attacks
• Denial of Service (DoS) and Distributed DoS (DDoS)
Attacks
• TCP Attacks

VII. General Rules for the Exam

Approved

Training
Provider

Potrebbero piacerti anche