OBJECTIVES
After completing the training, you will be able to:
- Install, configure, and maintain computer equipment, mobile devices, and software for end users
- Service components based on customer requirements
- Understand networking basics and apply basic cybersecurity methods to mitigate threats
- Properly and safely diagnose, resolve, and document common hardware and software issues
- Apply troubleshooting skills and provide customer support using appropriate communication skills
- Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments
COURSE BREAKDOWN
1.0 Operating Systems
1.1 Identify basic features of Microsoft Windows editions
1.2 Use the appropriate Microsoft command-line tool.
1.3 Use features and tools of the Microsoft Windows 10 operating system (OS)
1.4 Use the appropriate Microsoft Windows 10 Control Panel utility
1.5 Use the appropriate Windows settings
1.6 Configure Microsoft Windows networking features on a client/desktop
1.7Apply application installation and configuration concepts
1.8 Explain common OS types and their purposes
1.9 Perform OS installations and upgrades in a diverse OS environment
1.10 Identify common features and tools of the macOS/desktop OS
1.11 Identify common features and tools of the Linux client/desktop OS
2.0 Security
2.1 Summarize various security measures and their purposes
2.2 Compare and contrast wireless security protocols and authentication methods
2.3 Detect, remove, and prevent malware using the appropriate tools and methods
2.4 Explain common social-engineering attacks, threats, and vulnerabilities
2.5 Manage and configure basic security settings in the Microsoft Windows OS
2.6 Configure a workstation to meet best practices for security
2.7 Explain common methods for securing mobile and embedded devices
2.8 Use common data destruction and disposal methods
2.9 Configure appropriate security settings on small office/home office (SOHO) wireless and wired networks
2.10 Install and configure browsers and relevant security settings
3.0 Software Troubleshooting
3.1 Troubleshoot common Windows OS problems
3.2 Troubleshoot common personal computer (PC) security issues
3.3 Use best practice procedures for malware removal.
3.4 Troubleshoot common mobile OS and application issues
3.5 Troubleshoot common mobile OS and application security issues
4.0 Operational Procedures
4.1 Implement best practices associated with documentation and support systems information management
4.2 Explain basic change-management best practices
4.3 Implement workstation backup and recovery methods
4.4 Use common safety procedures
4.5 Summarize environmental impacts and local environmental controls
4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts
4.7 Use proper communication techniques and professionalism
4.8 Identify the basics of scripting
4.9 Use remote access technologies
Course Facilitators
This course is delivered by highly skilled and experienced ICT Trainers who have attained several CompTIA certifications.