skip to main content
IT Essentials
This course covers a wide range of material about operating systems, from using the different Windows operating systems to demonstrating how the boot process works, as well as installing, supporting, and troubleshooting the different Windows operating systems. Students will be introduced to the hardware of everyday computers. The course takes a hands-on approach to learning the steps to installing, troubleshooting and supporting the most common operating systems in use on the personal computer. In addition to explaining concepts, the course uses a multitude of real world examples of problems and issues related to operating systems, making it a practical preparation for the real world. In this course, we will take an in depth look at some advanced computer maintenance concepts and techniques. We will examine theoretical concepts that make the world of technology unique. Also, this course will adopt a practical hands-on approach when examining PC development techniques. Along with examining different troubleshooting strategies, this course
will explore the advancement of technological development, as well as, timeless problem solving strategies.

TestOut Security Pro Objectives - 2nd Year

over 2 years ago

TestOut Security Pro is CompTIA Approved Quality Content and has been verified to cover 100% of the objectives for the CompTIA Security+ SY0-501 certification exam.

Access Control and Identity Management

  • Create, modify, and delete user profiles
    • Manage Windows Local and Domain Users and Groups
    • Manage Linux Users and Groups
    • Restrict use of common access accounts
  • Harden Authentication
    • Configure Domain GPO Account Policy to enforce a robust password policy
    • Configure the Domain GPO to control local administrator group membership and Administrator password
    • Disable or rename default accounts such as Guest and Administrator
    • Configure the Domain GPO to enforce User Account Control
    • Configure a GPO for Smart Card authentication for sensitive resources
    • Configure secure Remote Access
    • Implement centralized authentication
  • Manage Certificates
    • Approve, deny, and revoke certificate requests
    • Configure Domain GPO Kerberos Settings

Policies, Procedures, and Awareness

  • Promote Information Security Awareness
    • Traveling with Personal Mobile Devices
    • Exchanging content between Home and Work
    • Storing of Personal Information on the Internet
    • Using Social Networking Sites
    • Using SSL Encryption
    • Utilizing E-mail best practices
    • Password Management
    • Photo/GPS Integration
    • Information Security
    • Auto-lock and Passcode Lock
  • Evaluate Information Risk
    • Perform Risk calculation
    • Risk avoidance, transference, acceptance, mitigation, and deterrence
  • Maintain Hardware and Software Inventory

Physical Security

  • Harden Data Center Physical Access
    • Implement Access Rosters
    • Utiliza Visitor Identification and control
    • Protect Doors and Windows
    • Implement Physical Intrusion Detection Systems
  • Harden mobile devices (iPad)
    • Apply updates
    • Set Autolock
    • Enable passcodes
    • Configure network security settings
  • Harden mobile devices (Laptop)
    • Set a BIOS Password
    • Set a Login Password
    • Implement full disk encryption

Perimeter Defenses

  • Harden the Network Perimeter (using a Cisco Network Security Appliance)
    • Change the Default Username and Password
    • Configure a Firewall
    • Create a DMZ
    • Configure NAT
    • Configure VPN
    • Implement Web Threat Protection
  • Secure Wireless Devices and Clients
    • Change the Default Username, Password, and Administration limits
    • Implement WPA2
    • Configure Enhanced Security
    • Disable Network Discovery

Network Defenses

  • Harden Network Devices (using a Cisco Small Business Switch)
    • Change the Default Username and Password on network devices
    • Use secure passwords
    • Shut down unneeded services and ports
    • Implement Port Security
    • Remove unsecure protocols (FTP, telnet, rlogin, rsh)
    • Implement access lists, deny everything else
    • Run latest iOS version
    • Turn on logging with timestamps
    • Segment Traffic using VLANs
  • Implement Intrusion Detection/Prevention (using a Cisco Network Security Appliance)
    • Enable IPS protection for a LAN and DMZ
    • Apply IPS Signature Updates
    • Configure IPS Policy

Host Defenses

  • Harden Computer Systems Against Attack
    • Configure a GPO to enforce Workstation/Server security settings
    • Configure Domain GPO to enforce use of Windows Firewall
    • Configure Domain Servers GPO to remove unneeded services (such as File and Printer Sharing)
    • Protect against spyware and unwanted software using Windows Defender
    • Configure NTFS Permissions for Secure file sharing
  • Implement Patch Management/System Updates
    • Configure Windows Update
    • Apply the latest Apple Software Updates
  • Perform System Backups and Recovery

Application Defenses

  • Implement Application Defenses
    • Configure a GPO to enforce Internet Explorer settings
    • Configure a GPO for Application Whitelisting
    • Enable Data Execution Prevention (DEP)
    • Configure Web Application Security
    • Configure Parental Controls to enforce Web content filtering
    • Configure Secure Browser Settings
    • Configure Secure E-mail Settings
    • Configure virtual machines and switches
  • Implement Patch Management/Software Updates
    • Configure Microsoft Update

Data Defenses

  • Protect and maintain the integrity of data files
    • Implement encryption technologies
    • Perform data backups and recovery
    • Implement redundancy and failover mechanisms
  • Protect Data Transmissions across open, public networks
    • Encrypt Data Communications
    • Implement secure protocols
    • Remove unsecure protocols

Audits and Assessments

  • Implement Logging and Auditing
    • Configure Domain GPO Audit Policy
    • Configure Domain GPO for Event Logging
  • Review security logs and violation reports, implement remediation
  • Review audit reports, implement remediation
  • Review vulnerability reports, implement remediation

By Mike Seal

TestOut Network Pro Objectives - 3rd Year

over 2 years ago

TestOut Network Pro is CompTIA Approved Quality Content and verified to cover 100% of the objectives for the CompTIA Network+ N10-006 certification exam.

Cables and Connectors

  • Identify network cables by sight or name (twisted pair, coaxial, straight-through, crossover, console).
  • Identify network cable speed capabilities by name (10BaseT, 100BaseT, 1000BaseT, 10GBaseT).
  • Identify network connectors by sight or name (RJ11, RJ45, F-type, serial).
  • Given a scenario and networking requirements, select and install cables for communication between computers and networking devices.
  • Troubleshoot issues with networking media.

Networking Devices

  • Identify network interface cards and motherboard expansion slots by name or sight.
  • Given a scenario where a new networking card is required in a new or existing computer, select and install the appropriate networking card.
  • Identify networking and internetworking devices by name or sight (adapters, hubs, bridges, routers, switches).
  • Given a scenario with one or more wired networks, select and install the appropriate networking or internetworking device(s).
  • Given a scenario where a VoIP implementation exists, select and install the appropriate networking devices and cables.

Ethernet

  • Given a scenario with specific Ethernet specifications, select and install appropriate network devices.
  • Given a scenario with network devices that need to be connected, select the appropriate Ethernet cable(s).
  • Given a scenario where network devices cannot communicate, troubleshoot and resolve physical connectivity.

IP Configuration

  • Identify and select valid IP addresses and subnet masks for network connections.
  • Given a Windows system, configure static IPv4 or IPv6 address information on a network connection.
  • Given a Windows system, configure the network connection to communicate outside of the local network.
  • Given a Windows system, configure the network connection to use DHCP for IP configuration.
  • Given a Windows server, authorize, configure, and activate DHCP services for a network subnet.
  • Given a Windows system, configure the network connection to query DNS servers.
  • Given a Windows system, configure an alternate IP configuration on a network connection.
  • Given a scenario where Windows systems cannot connect to the network or the Internet, troubleshoot and resolve name resolution issues.

Wireless Networking

  • Given a scenario where computers must communicate within a home wireless network, select and install the appropriate networking devices.
  • Given a wireless access point for a home network, perform configuration tasks to customize settings and enable security.
  • Given a Windows system, configure a wireless network connection to use the same encryption standard and authentication as configured on a wireless access point.
  • Given a Windows system, configure a wireless profile to automatically connect to a wireless network.
  • Given a scenario and a Windows system, prioritize wireless profiles to meet end user requirements.
  • Implement and secure an enterprise wireless network.
  • Given a scenario, troubleshoot and resolve wireless network problems.

Network Security

  • Given a scenario and a Windows system, configure a basic host firewall.
  • Given a scenario, respond to social engineering exploits.
  • Given a scenario and security requirements, configure a server and remote devices to create and use a VPN connection.

Network Management

  • Given a scenario, perform data and server backup tasks.
  • Given a Windows system, enable and configure Remote Desktop to meet end user requirements.

IT I / Cyber I - How long is this going to take??

about 1 year ago

This is a timeline for the first year. For the Final, you will take the PC Pro Certification test.

Week #

Module / Sections

Time

IT I

 

 

1.1

1.1: Course Introduction

7

1.1

1.2: Using the Simulator

43

1.1

1.3: Hardware Basics

54

1.2

1.4: Windows Basics

55

1.2

1.5: Linux Basics

44

1.2

1.6: Mac OS Basics

32

 

Total

3:55

 

 

1.3

2.1: Protection and Safety

44

1.3

2.2: Professionalism

22

1.3

2.3: PC Tools

21

1.3

2.4: PC Maintenance

52

1.4

2.5: Troubleshooting Overview

24

 

Total

2:43

 

 

1.4

3.1: Cases and Form Factors

18

1.4

3.2: Power Supplies

44

1.4

3.3: Motherboards and Buses

36

1.5

3.4: Motherboard Troubleshooting

27

1.5

3.5: Processors

67

1.5

3.6: Processor Troubleshooting

33

1.5

3.7: Memory

46

1.6

3.8: Memory Installation

65

1.6

3.9: Memory Troubleshooting

38

1.6

3.10: BIOS/UEFI

73

1.7

3.11: Expansion Cards

22

1.7

3.12: Video

39

1.7

3.13: Audio

59

1.7

3.14: Cooling

27

 

Total

9:54

 

 

1.8

4.1: Peripheral Devices

19

1.8

4.2: USB

33

1.8

4.3: IEEE 1394 (FireWire)

22

1.8

4.4: Display Devices

81

1.9

4.5: Video Troubleshooting

28

1.9

4.6: Device Driver Management

71

1.9

4.7: Device Driver Troubleshooting

41

 

Total

4:55

 

 

1.10

5.1: Storage Devices

26

1.10

5.2: SATA

31

1.10

5.3: Optical Media

25

1.10

5.4: RAID

52

1.11

5.5: File Systems

61

1.11

5.6: File System Creation

57

1.11

5.7: Storage Management

40

1.12

5.8: Storage Spaces

36

1.12

5.9: Disk Optimization

59

1.12

5.10: Storage Troubleshooting

39

 

Total

7:06

 

 

1.13

6.1: Networking Overview

50

1.13

6.2: Network Hardware

43

1.13

6.3: Networking Media

46

1.13

6.4: Ethernet

23

1.14

6.5: IP Networking

40

1.14

6.6: IP Configuration

51

1.14

6.7: IP version 6

19

1.15

6.8: 802.11 Wireless

61

1.15

6.9: Infrared, Bluetooth, and NFC

30

1.15

6.10: Internet Connectivity

48

1.16

6.11: SOHO Configuration

68

1.16

6.12: Network Utilities

72

1.16

6.13: HomeGroup Networking

21

1.17

6.14: Network Troubleshooting

77

 

Total

10:49

 

 

2.1

7.1: Printers

58

2.1

7.2: Printer Configuration

46

2.1

7.3: Network Printing

42

2.2

7.4: Printing Management

44

2.2

7.5: Printer Maintenance

24

2.2

7.6: Printer Troubleshooting

44

 

Total

4:18

 

 

2.3

8.1: Notebook Computers

34

2.3

8.2: Notebook Components

51

2.3

8.3: Notebook Power Management

40

2.3

8.4: Notebook Troubleshooting

42

2.4

8.5: Mobile Devices

31

2.4

8.6: Mobile Device Networking

45

2.4

8.7: Mobile Device Security

27

2.4

8.8: Mobile Device Troubleshooting

25

 

Total

4:55

 

 

2.5

9.1: Windows System Tools

102

2.5

9.2: Preferences and Settings

31

2.6

9.3: Performance Monitoring

31

2.6

9.4: Users and Groups

73

2.7

9.5: Remote Services

69

2.7

9.6: Windows Application Management

60

2.8

9.7: Linux Application Management

31

2.8

9.8: Digital Content Management

27

2.8

9.9: Updates

50

2.8

9.10: System Backup

65

2.9

9.11: System Protection

45

2.9

9.12: System Recovery

55

2.9

9.13: Virtual Memory

31

2.9

9.14: Operating System Troubleshooting

56

2.10

9.15: Windows Boot Errors

84

 

Total

13:30

 

 

2.10

10.1: Component Selection

21

2.10

10.2: Windows Pre-installation

49

2.11

10.3: Windows Installation

44

2.11

10.4: Post Installation

43

2.11

10.5: Virtualization

57

 

Total

3:34

 

 

2.12

11.1: Windows File Locations

38

2.12

11.2: Managing Files on Windows

93

2.12

11.3: NTFS Permissions

44

2.13

11.4: Shared Folders

66

2.13

11.5: Linux File Management

60

 

Total

5:01

 

 

2.13

12.1: Best Practices

31

2.14

12.2: Incident Response

28

2.14

12.3: Physical Security

48

2.14

12.4: Social Engineering

26

2.15

12.5: BIOS/UEFI Security

34

2.15

12.6: Malware Protection

68

2.16

12.7: Authentication

73

2.17

12.8: File Encryption

51

2.17

12.9: Network Security

42

2.17

12.10: Firewalls

45

2.17

12.11: Proxy Servers

29

2.17

12.12: VPN

34

2.18

12.13: Security Troubleshooting

33

 

Total

9:02



By Mike Seal

IT II / Cyber II - How long is this going to take??

about 1 year ago

This is a timeline for the second year. For the Final, you will take the Security Pro Certification test.

 

Week #

Module / Sections

Time

IT II

 

 

 

 

1.1

1.1: Security Overview

24

1.1

1.2: Using the Simulator

16

 

Total

0:40

 

 

1.1

2.1: Understanding Attacks

41

1.2

2.2: Defense Planning

19

1.2

2.3: Access Control

28

1.2

2.4: Cryptography Basics

17

1.2

2.5: Network Monitoring

23

1.2

2.6: Incident Response

67

 

Total

3:15

 

 

1.3

3.1: Security Policies

59

1.3

3.2: Risk Management

26

1.3

3.3: Business Continuity

14

1.3

3.4: Manageable Network Plan

26

1.4

3.5: Social Engineering

51

1.4

3.6: App Development and Deployment

27

1.4

3.7: Employee Management

39

1.5

3.8: Mobile Devices

22

1.5

3.9: Third-Party Integration

18

 

Total

4:42

 

 

1.5

4.1: Physical Threats

40

1.5

4.2: Device Protection

19

1.5

4.3: Network Infrastructure Protection

15

1.5

4.4: Environmental Controls

30

 

Total

1:44

 

 

1.5

5.1: Recon and Denial

50

1.6

5.2: Spoofing and Poisoning

68

1.6

5.3: Security Appliances

39

1.6

5.4: Demilitarized Zones (DMZ)

27

1.6

5.5: Firewalls

40

1.7

5.6: Network Address Translation (NAT)

33

1.7

5.7: Virtual Private Networks (VPN)

51

1.7

5.8: Web Threat Protection

27

1.7

5.9: Network Access Protection

31

1.7

5.10: Wireless Overview

54

1.8

5.11: Wireless Attacks

44

1.8

5.12: Wireless Defenses

60

 

Total

8:44

 

 

 

 

 

 

1.8

6.1: Network Threats

19

1.8

6.2: Network Device Vulnerabilities

28

1.9

6.3: Network Applications

23

1.9

6.4: Switch Attacks

16

1.9

6.5: Switch Security

60

1.9

6.6: Using VLANs

32

1.10

6.7: Router Security

43

1.10

6.8: Intrusion Detection and Prevention

53

1.10

6.9: Vulnerability Assessment

64

1.11

6.10: Protocol Analyzers

29

1.12

6.11: Remote Access

50

1.13

6.12: Network Authentication

62

1.13

6.13: Penetration Testing

32

1.13

6.14: Virtual Networking

34

1.13

6.15: Software-Defined Networking (SDN)

17

1.13

6.16: Cloud Services

26

 

Total

9:48

 

 

 

1.14

7.1: Malware

55

1.14

7.2: Password Attacks

34

1.14

7.3: Windows System Hardening

60

1.15

7.4: Hardening Enforcement

37

1.15

7.5: File Server Security

52

1.15

7.6: Linux Host Security

36

1.15

7.7: Embedded Systems

21

1.15

7.8: Log Management

57

1.15

7.9: Audits

36

1.16

7.10: Email

46

1.16

7.11: BYOD Security

33

1.16

7.12: Mobile Device Management

55

1.16

7.13: Host Virtualization

50

 

Total

9:32

 

 

 

2.1

8.1: Access Control Models

55

2.1

8.2: Authentication

44

2.1

8.3: Authorization

30

2.2

8.4: Web Application Attacks

52

2.2

8.5: Internet Browsers

62

2.2

8.6: Application Development

68

2.3

8.7: Active Directory Overview

31

2.3

8.8: Windows Domain Users and Groups

49

2.3

8.9: Linux Users

62

2.4

8.10: Linux Groups

33

2.4

8.11: Linux User Security

26

2.4

8.12: Group Policy Overview

47

2.5

8.13: Hardening Authentication 1

71

2.5

8.14: Hardening Authentication 2

38

 

Total

11:08

 

 

 

2.5

9.1: Data Management

38

2.6

9.2: Advanced Cryptography

28

2.6

9.3: Cryptography Implementations

24

2.6

9.4: Cryptographic Attacks

30

2.7

9.5: Symmetric Encryption

30

2.7

9.6: Asymmetric Encryption

23

2.7

9.7: File Encryption

59

2.8

9.8: Public Key Infrastructure (PKI)

64

2.8

9.9: Hashing

27

2.8

9.10: Data Transmission Security

67

2.9

9.11: Data Loss Prevention (DLP)

14

2.9

9.12: Redundancy

63

2.9

9.13: Backup and Restore

61

2.10

9.14: Cloud Storage

13

 

Total

9:01


By Mike Seal

TestOut PC Pro Objectives - 1st Year

over 2 years ago

TestOut PC Pro is CompTIA Approved Quality Content and verified to cover 100% of the objectives for the CompTIA A+ 220-901 and 220-902 exams.

Basic Hardware Components

  • Identify power supply connectors, motherboard characteristics, CPU features, memory module attributes, and expansion bus types.
  • Given scenarios with system specifications and end-user requirements, select and install appropriate power supplies, motherboards, CPUs, memory modules, and expansion cards.
  • View BIOS/UEFI settings for basic hardware components.
  • Configure the settings of basic hardware components.
  • Troubleshoot basic hardware components and resolve issues.

Video

  • Identify video adapter components, features, connectors, and cables.
  • Given a scenario with system specifications and end-user requirements, select and install the appropriate video adapters.
  • Identify display device types.
  • Given a scenario with system specifications and end-user requirements, select and install appropriate display devices.
  • Configure display and video adapter settings.

Audio

  • Identify external device component, features, connectors and cables.
  • Given a scenario with system specifications and end-user requirements, select and install the appropriate sound cards.
  • Identify audio device types.
  • Given a scenario with system specifications and end-user requirements, select and install appropriate audio devices.
  • Manage sound card and audio device settings.

External Devices

  • Identify external device component, features, connectors and cables.
  • Connect external devices using the appropriate connectors and cables.
  • Manage device driver updates, roll back drivers, and enable or disable devices.
  • Install drivers for external devices.
  • Prepare devices for safe removal.

Storage

  • Identify storage device components, features, connectors, and cables.
  • Given scenarios with specifications and end-user requirements, select and install appropriate storage solution.
  • Configure BIOS/UEFI settings for hard disks.
  • Configure common RAID arrays.
  • Install and configure a new storage device with volumes, partitions, a drive letter, and format it with an appropriate file system.
  • Add space to an existing volume.
  • Manage the file system type on an existing drive by converting a file system type or reformatting a partition.
  • Schedule and run Disk Cleanup and Disk Defragmentation in Windows.

Networking

  • Identify Ethernet wired and wireless network adapter components, features, and connectors.
  • Identify Ethernet wired network cable features and connectors.
  • Identify Ethernet wireless access point components, features, connectors, and cables.
  • Identify common network connectivity devices and their roles.
  • Understand the function of different network devices.
  • Given a scenario with specifications and networking requirements, select and install the necessary Ethernet adapters, access points, or cables.
  • Given basic IPv4/IPv6 configuration settings or a network diagram, configure a wired or wireless network connection.
  • Use appropriate networking utilities to view, test, and troubleshoot basic network configuration, communication, and connectivity problems.

Printing

  • Identify printer types and connectors.
  • Given a scenario with system specifications and end-user requirements, select and install the appropriate printer.
  • Use Windows utilities to configure a local printer, set the default printer, manage print jobs, start and stop the print spooler, and print a test page.
  • Connect and configure a network printer.

Mobile Devices

  • Identify notebook computer types, features, and special keys.
  • Install and configure basic hardware components on notebook computers.
  • Maintain notebook computers and troubleshoot common issues.
  • Identify and configure mobile device features and accessories.
  • Configure mobile device connection, data synchronization, email, and security settings.
  • Maintain mobile devices and troubleshoot common issues.

System Management

  • Use Windows Backup to configure a full system or file backup schedule.
  • Enable system restore and configure a restore point.
  • Configure Windows Update settings.
  • Configure local users and groups for a Windows system.
  • Configure User Access Control (UAC) settings in Windows.
  • Troubleshoot common Windows operating system and software issues.

Security

  • Configure BIOS/UEFI security settings.
  • Configure password and account lockout settings in a local security policy.
  • Configure a screen saver and require a password to unlock a Windows workstation.
  • Configure the basic Windows Firewall.
  • Encrypt files and folders.

By Mike Seal

IT Essentials Standards

over 2 years ago