CompTIA Tech+
(FC0-U71.AA1.0L0) / ISBN : 978-1-64459-603-6
This course includes
Lessons
TestPrep
Hands-On Labs
About This Course
Skills You’ll Get
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
6+ Interactive Lessons |
Gamified TestPrep
Hands-On Labs
78+ LiveLab | 68+ Video tutorials | 01:15+ Hours
1
1.0 IT Concepts and Terminology
- 1.1 Explain the basics of computing.
- 1.2 Identify notational systems.
- 1.3 Compare and contrast common units of measure.
- 1.4 Explain the troubleshooting methodology.
2
2.0 Infrastructure
- 2.1 Explain common computing devices and their purposes.
- 2.2 Explain the purpose of common internal computing components.
- 2.3 Compare and contrast storage types.
- 2.4 Given a scenario, install and configure common peripheral devices.
- 2.5 Compare and contrast common types of input/output device interfaces.
- 2.6 Compare and contrast virtualization and cloud technologies.
- 2.7 Compare and contrast common internet service types.
- 2.8 Identify basic networking concepts.
- 2.9 Explain the basic capabilities of a small wireless network.
3
3.0 Applications and Software
- 3.1 Identify components of an OS.
- 3.2 Explain the purpose of operating systems.
- 3.3 Explain the purpose and proper use of software.
- 3.4 Given a scenario, configure and use web browser features.
- 3.5 Identify common uses of artificial intelligence (AI).
4
4.0 Software Development Concepts
- 4.1 Compare and contrast programming language categories.
- 4.2 Identify fundamental data types and their characteristics.
- 4.3 Explain the purpose and use of programming concepts.
- 4.4 Identify programming organizational techniques and logic concepts.
5
5.0 Data and Database Fundamentals
- 5.1 Explain the value of data and information.
- 5.2 Explain database concepts and the purpose of a database.
- 5.3 Compare and contrast various database structures.
- 5.4 Explain basic data backup concepts.
6
6.0 Security
- 6.1 Explain fundamental security concepts and frameworks.
- 6.2 Explain methods to secure devices and security best practices.
- 6.3 Explain password best practices.
- 6.4 Identify common use cases for encryption.
- 6.5 Given a scenario, configure security settings for a small wireless network.
1
1.0 IT Concepts and Terminology
- Troubleshooting IP Addressing Issues
- Configuring a Network Adapter
- Sharing a Printer
- Adding a Keyboard Layout
- Configuring the Mouse Settings
- Installing a Printer
- Creating a Virtual Machine
- Configuring a Firewall
- Troubleshooting Memory Issue
- Troubleshooting the Heating Issue
2
2.0 Infrastructure
- Connecting a Docking Station
- Replacing a Laptop Battery
- Connecting an iPhone to WiFi
- Connecting to a DSL Network
- Setting Up Amazon Echo
- Connecting an iPhone to a Laptop via Bluetooth
- Implementing Physical Security
- Replacing the SMPS
- Troubleshooting the Audio System
- Protecting the Computer Using a UPS
- Connecting a Desktop
- Replacing the Internal HDD
- Connecting a Wireless Mouse
- Connecting a Laptop to a Television
- Connecting an External Hard Disk
- Connecting an SD Card
- Connecting an External Speaker and Headphones
- Connecting a Printer to a Laptop via Bluetooth
- Connecting to a Cable Modem
- Creating a Home Wireless Network
- Connecting to an Ethernet Network
3
3.0 Applications and Software
- Compressing and Decompressing a File in Linux
- Finding Files in Linux
- Manipulating Files in Linux
- Running the Disk Cleanup
- Running Commands on Windows PowerShell
- Using Basic Linux Commands
- Configuring a Default Domain Password Policy
- Propagating Permissions
- Working with the Task Manager
- Managing NTFS Permissions
- Creating New User Account
- Using the Task Scheduler
- Configuring UAC Settings
- Creating a Volume
- Creating a Shortcut
- Creating a Linux User and Group
- Formatting a Text to Bold in Word
- Creating a Simple Chart in Excel
- Inserting a Table in PowerPoint
- Setting Automatic Windows Updates
- Configuring the Edge Pop-Up Blocker
- Setting the Default Browser
- Creating an HTML Script
4
4.0 Software Development Concepts
- Creating Functions in Java
- Calling the Nested Function
- Creating an array
- Using the for Loop
- Using the while Loop
- Using the if-else Statement
5
5.0 Data and Database Fundamentals
- Using the SELECT Statement
- Using the INSERT INTO Statement
- Using the CREATE TABLE Statement
- Using the DELETE Statement
- Creating a Restore Point
- Restoring Files
- Creating a Local Backup
6
6.0 Security
- Conducting an IP Spoofing Attack
- Simulating a DoS Attack
- Detecting Rootkits
- Performing a Quick Scan
- Analyzing Malware
- Cracking Passwords Using Cain and Abel
- Understanding Symmetric Encryption
- Configuring a VPN Connection
- Creating a Demilitarized Zone
- Configuring a Router
- Configuring a DHCP Server