- +1 855.488.5327
- customerservice@ituonline.com
- Mon - Fri: 9:00am - 5:00pm ET
New To IT Tech Training Series – 9 Courses
New to information technology? Want to get into IT? This bundle is a great starter training bundle designed just for that.
Included In This Course
Included In This Course
142 Training Hours
867 On-demand Videos
Closed Captions
97 Topics
1,285 Prep Questions
Certificate of Completion
Course Description
New to information technology? Want to get into IT? This bundle is a great starter training bundle designed just for that. The 9 courses included in this bundle are designed to introduce and expand on core IT knowledge needed to launch or enhance your IT career. This is an excellent training program for help desk analysts and IT generalists. Get started today with this low-cost training bundle.
This bundle includes the following courses:
- CompTIA A+ 220-1101 (Core 1)
- CompTIA A+ 220-1102 (Core 2)
- CompTIA FC0-U61: IT Fundamentals
- CompTIA Network+ N10-008
- Microsoft 70-698: Installing and Configuring Windows 10
- Microsoft 98-365 MTA Windows Server 2016 Administration
- Microsoft 98-366 MTA Networking Fundamentals
- Microsoft 98-367 MTA Security Fundamentals
- Windows 10 Power User (How to use Windows 10)
Frequently Asked Questions About New To IT Tech Training Series
What does the “New To IT Tech Training Series” online course include?
This IT Training course bundle includes nine different courses aimed at those new to the IT field or looking to enhance their IT knowledge. Courses include CompTIA A+, IT Fundamentals, Network+, and several Microsoft courses including Windows Server 2016 Administration, Networking Fundamentals, and Security Fundamentals.
What type of content can I expect in the online course bundle?
The bundle comes loaded with on-demand videos and prep questions. It covers 98 topics with 858 videos and 1,285 prep questions for comprehensive learning. You can access the course content at your convenience.
How long does it take to complete the “New To IT Tech Training Series”?
The course bundle provides around 140 hours of training. The duration to complete the course may vary based on your learning pace.
What do I get after completing the “New To IT Tech Training Series”?
Upon completion, you’ll receive a certificate of completion which can be a valuable addition to your professional profile.
Is the “New To IT Tech Training Series” suitable for me?
If you’re new to information technology or looking to expand your existing IT knowledge, this course is designed for you. It’s particularly beneficial for help desk analysts and IT generalists.
Can I try the “New To IT Tech Training Series” before purchasing?
Yes, you can start a 7-day free trial, giving you access to over 2,500 hours of on-demand IT training.
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Course Outline
CompTIA A+ 220-1101 (Core 1) Course Content
Module 1 - Devices, Setups, and Installs
1.1 Introduction to the Course, Meet the Instructor
1.2 Appropriate Safety Procedures
1.3 PC Components
1.4 Guidlines for PC Disassembly
1.5 Motherboards
1.6 CPU Sockets
1.7 PCI Bus
1.8 Storage Bus (SATA and IDE)
1.9 Discussing PC Components
1.10 Common Connection Interfaces
1.11 Wired and Wireless Connection Standards
1.12 Install Peripheral Devices
1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 - Displays and Multimedia Devices
2.1 Displays and Multimedia
2.2 Display Device Connections and Cables
2.3 Discussing Display Device Installation and Configuration
2.4 Troubleshoot Display Devices
2.5 Guidelines for Troubleshooting Display Devices
2.6 Discussing Display Device Troubleshooting
2.7 Install and Configure Multimedia Devices
2.8 Discussing Multimedia Device Installation and Configuration
Module 3 - Supporting Multiple Drive Types
3.1 Supporting Multiple Drive Types and Memory
3.2 Memory Types
3.3 RAM Types
3.4 Memory Modules
3.5 DIMM and SO-DIMM Technologies
3.6 Parity and ECC RAM
3.7 Memory Compatibility Issues
3.8 Discussing System Memory Installation
3.9 Install and Configure Mass Storage Devices
3.10 Storage Adapters and Cables
3.11 Solid State Drives
3.12 Guidlines for Installing Mass Storage Devices
3.13 Discussing Mass Storage Device Installation and Configuration
3.14 Install and Configure Removable Storage
3.15 Discussing Removable Storage Device Istallation and Configuration
3.16 Configure RAID
3.17 RAID Configuration Options
3.18 Discussing RAID Configuration
3.19 Troubleshoot Storage Devices
3.20 Boot Failures
3.21 Discussing Storage Device Troubleshooting
Module 4 - Accounting for CPUs and Internal Components
4.1 Install Upgrade CPUs
4.2 Multiprocessing and Multicore Processors
4.3 Discussing CPU Upgrades
4.4 Configure and Update BIOS UEFI
4.5 Discussing BOIS-UEFI Configuration and Updates
4.6 Install Power Supplies
4.7 Discussing Power Supply Installation
4.8 Troubleshoot Internal System Components
4.9 POST and Boot Problems
4.10 Boot Troubleshooting and Log Entries
4.11 Motherboard Component Problems
4.12 Discussing System Component Troubleshooting
Module 5 - All About Network Theories
5.1 Wired Networks
5.2 Common Ethernet Network Implementations
5.3 Taps and Mirrors
5.4 Discussing Wired Networks
5.5 Network Hardware Devices
5.6 Switches
5.7 Power Over Ethernet
5.8 Discussing Network Hardware Devices
5.9 Wireless Networks
5.10 Access Points and Wireless Network Modes
5.11 Discussing Wireless Networks
5.12 Internet Connection Types
5.13 Wireless Internet Service Providers WISP
5.14 Discussing Internet Connection Types
5.15 Network Configuration Concepts
5.16 The TCIP-IP Protocol Suite
5.17 Internet Protocol and IP Addressing
5.18 Public and Private IP Addresses
5.19 IPv6
5.20 Discussing Network Configuration Concepts
5.21 Network Services
5.22 DNS
5.23 Dynamic and Static IP Configurations
5.24 DNS Records MX and A
5.25 Web Servers and HTTP-HTTPS
5.26 Discussing Network Services
Module 6 - Network Operations and Diagnostics
6.1 Configuring and Troubleshooting Networks
6.2 Network Connections in Windows
6.3 Install and Configure SOHO Networks
6.4 Configure SOHO Network Security
6.5 Firewalls
6.6 Port Fowarding and Port Triggering
6.7 Windows Firewall
6.8 Network Security and Embedded Appliances
6.9 Configure Remote Access
6.10 Discussing Remote Access Configuration
6.11 Troubleshoot Network Connections
6.12 IP Configuration Issues
6.13 Routing Issues
6.14 Discussing Network Connection Troubleshooting
Module 7 - Cloud and Virtualization Computing
7.1 Configure Client-Side Virtulaization
7.2 Hypervisors
7.3 Processor Support and Resource Requirements
7.4 Virtual Networks
7.5 Client-Side Virtualization
7.6 Cloud Computing Concepts
7.7 Internal and External Shared Resources
7.8 Cloud Service Options
7.9 Virtual Desktops
7.10 Software-Defined Networking (SDN)
7.11 Discussing Cloud Computing Concepts
Module 8 - Laptop Features and Troubleshooting
8.1 Use Laptop Features
8.2 Expansion Options
8.3 Discussing Laptop Features
8.4 Install and Configure Laptop Hardware
8.5 Discussing Laptop Hardware Installation and Configuration
8.6 Troubleshoot Common Laptop Issues
8.7 Discussing Troubleshooting Common laptop Issues
Module 9 - Syncing and Setup of Mobile Devices
9.1 Syncing and Setup of Mobile Devices
9.2 Connect and Configure Mobile Devices
9.3 Configure Mobile Device Network Connectivity
9.4 Mobile VPN Configuration
9.5 Email Configuration Options
9.6 Discussing Mobile Device Network Connectivity Configuration
9.7 Support Mobile Apps
9.8 Discussing Mobile App Support
Module 10 - All Things Printing
10.1 All Things Printing
10.2 Discussing Laser Printer Maintenance
10.3 Maintain Inkjet Printers
10.4 Discussing Inkjet Printer Maintenance
10.5 Maintain Impact, Thermal, and 3D Printers
10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
10.7 Install and Configure Printers
10.8 Discussing Printer Installation and Configuration
10.9 Troubleshoot Print Device Issues
10.10 Install and Configure Imaging Devices
10.11 Discussing Device Installation and Configuration
Module 11 - Resources and Testing
11.1 Introduction to Resources and Testing
11.2 Resources and Testing
11.3 Joining a Domain with Windows 10
11.4 Boot Order and BIOS
11.5 Virtual Machine Install & Configure
11.6 PC Teardown
11.7 Exploring the Laptop
11.8 Install Windows 10 Demonstration
CompTIA A+ 220-1102 (Core 2) Course Content
Module 1 - Operating System Management
1.1 Introduction to the Course, Meet the Instructor
1.2 Identify Common Operating Systems
1.3 Microsoft Windows
1.4 Work and Education Features
1.5 Windows System Limits
1.6 Apple Operating Systems
1.7 Linux Disk and File Management
1.8 Discussing OS Types
1.9 Use Windows Features and Tools
1.10 Administrative Tools
1.11 Manage Files in Windows
1.12 System Hierarchies
1.13 File Attributes
1.14 Discussing Windows Features and Tools
1.15 Manage Disks in Windows
1.16 Discussing File Management in Windows
1.17 The Windows Disk Management Console
1.18 Discussing Windows Disk Management
1.19 Manage Devices in Windows
1.20 Device Manager
1.21 Discussing Windows Device Manager
Module 2 - Configuring and installing the OS
2.1 Configuring and Installing the OS
2.2 Installation Boot Methods
2.3 Disk Formatting and Partitioning
2.4 Networking Considerations
2.5 Post Installation Tasks
2.6 OS Installation Types
2.7 Unattended Installations
2.8 Maintain OSs
2.9 OS Updates
2.10 Anti-Malware Updates
2.11 Scheduled Backups
2.12 Task Schedulers part 1
2.13 Task Schedulers part 2
2.14 Install Windows 10 Demonstration
2.15 Discussing OS Maintenance
Module 3 - Tools to Troubleshoot and Maintain the OS
3.1 Install and Manage Windows Applications
3.2 Windows OS Tools
3.3 Application and Print Services
3.4 Task Manager
3.5 Manage Windows Performance
3.6 Windows Performance Management Tools
3.7 Troubleshoot Windows
3.8 Event Viewer
3.9 The System Configuration Utility
3.10 Troubleshooting Tips Boot Process
3.11 Troubleshooting Tips for Windows System Issues
3.12 Blue Screens and Spontaneous Shutdowns
3.13 Troubleshooting Tips for File and Memory Corruption
3.14 Safe Boot
3.15 System Repair Disc
3.16 System Restore
3.17 Guidelines for Troubleshooting Windows Issues
Module 4 - Network Management Tools
4.1 Network Management Tools
4.2 Network Connectivity
4.3 IP Addressing and Connection Types
4.4 Proxy Settings
4.5 Windows Client Configuration
4.6 Location Services
4.7 Firewalls
4.8 Network Troubleshooting
4.9 Remote Desktop Tools
4.10 Desktop Management and Remote Monitoring Tools
4.11 Disscussion Topics
Module 5 - Sharing Resources and Wrights Management
5.1 Sharing Resources and Wrights Management
5.2 User Group Accounts
5.3 Local Secutity Policy
5.4 SSO and Credential Manager
5.5 Workgroups and Homegroups
5.6 Network and Sharing Center
5.7 Network Share Configuration
5.8 NTSF File and Folder Permissions
5.9 Configure Active Directory Accounts and Policies
5.10 Domain Membership and Group Policy Objects
5.11 Basic AD Functions
5.12 Account Locks and Password Resets
Module 6 - Threats and Security Measures
6.1 Threats and Security Measures
6.2 Logical Security Concepts
6.3 Encryption
6.4 PKI and Certificates
6.5 Execution Control
6.6 NAC
6.7 Discussing Logical Decurity Concepts
6.8 Threats and Vulnerablilities
6.9 Types of Password Attacks
6.10 Discussing Threats and Vulnerabilities
6.11 Physical Security Controls
6.12 Discussing Physical Security Measures
Module 7 - Policies to Protect Data
7.1 Policies to Protect Data
7.2 Implement Security Best Practices
7.3 Guidlines for Implementing Security Best Practices
7.4 Discussing Security Best Practices Implementation
7.5 Implement Data Protection Policies
7.6 ACLs and Directory Permissions
7.7 Full Disk Encryption
7.8 Guildlines for Implementing Data Protection Policies
7.9 Discussing Data Protection Policies
7.10 Protect Data During Incident Response
7.11 Discussing Data Protection During Incident Response
Module 8 - Prevent Malware and Security Threats
8.1 Prevent Malware and Security Threats
8.2 Detect, Remove, and Prevent Malware
8.3 Trojan Horses and Spyware
8.4 Sources of Malware Infection
8.5 Best Practices for Malware Removal
8.6 Discussing Detecting, Removing, and Preventing Malware Infections
8.7 Troubleshoot Common Workstation Security Issues
8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 - Supporting and Troubleshooting Mobile Devices
9.1 Supporting and Troubleshooting Mobile Devices
9.2 Secure Mobile Devices
9.3 IOT Internet of Things
9.4 Discussing Mobile Device Security
9.5 Troubleshoot Mobile Device Issues
9.6 Mobile Device Security Troubleshooting
9.7 Discussing Troubleshooting Mobile Devices
Module 10 - Implementing Operational Procedures
10.1 Implementing Operational Procedures
10.2 Environmental Impacts and Controls
10.3 Discussing Environmental Impact and Controls
10.4 Create and Maintain Documentation
10.5 Discussing Documentation Creation and Maintenance
10.6 Use Basic Change Management Best Practices
10.7 Discussing Change Management Best Practices
10.8 Implement Disaster Prevention and Recovery Methods
10.9 Discussing Implement Disaster Prevention and Recovery Methods
10.10 Basic Scripting Concepts
10.11 Discussing Scripting
10.12 Professionalism and Communication
10.13 Discussing Professionalism and Communication Skills
Module 11 - Resources and Testing
11.1 Introduction to Resources and Testing
11.2 Resources and Testing
11.3 Joining a Domain with Windows 10
11.4 Boot Order and BIOS
11.5 Virtual Machine Install & Configure
11.6 PC Teardown
11.7 Exploring the Laptop
11.8 Install Windows 10 Demonstration
CompTIA Network+ N10-008 Course Content
Module 0 - Course introduction
0.1 Instructor Intro
0.2 Course Overview
Module 1 - Networking Fundamentals
1.1 Intro to Networking
1.1.1 Activity: Creating a Network
1.2 Common Terminology
1.2.1 Activity: Examining Ports and Sockets
1.3 OSI Model
1.4 DoD Model
1.4.1 Activity: Examining Network Layers
1.5 TCP, UDP, IP
1.5.1 Activity: Examining TCP
1.5.2 Activity: Examining UDP
1.5.3 Activity: Examining IP
1.6 ICMP, IGMP, ARP
1.6.1 Activity: Examining ICMP
1.6.2 Activity: Examining ARP
1.6.3 Activity: Examining IGMP
1.7 Network Topologies
1.8 Network Types
1.9 Part 1: Network Characteristics
1.9 Part 2: Network Characteristics
1.10 Module 1 outro
Module 2 - Cables and Connectors
2.1 Ethernet Standards
2.2 Copper Cable Types
2.3 Fiber Optic Cable Types
2.4 Connector Types
2.4.1 Activity: Selecting the Right Cable
2.5 Media Converters and Transceivers
2.6 Cable Management
2.7 Module 2 Outro
Module 3 - Internet Protocol (IP)
3.1 IPv4 Basics
3.2 IP Packet and Interface Types
3.2.1 Activity: Configuring Client IP Settings
3.3 Binary Numbering System
3.4 Classful and Classless Addressing
3.5 Understanding CIDR Notation
3.6 IPv4 Subnetting Method
3.7 Verifying with Binary
3.8 Finding Subnet IDs
3.8.1 Activity: Subnetting a Class C Network
3.9 The Delta in Action
3.9.1 Activity: Subnetting With the Delta
3.10 Subnetting Based on Hosts
3.11 Subnetting in Other Octets
3.12 Supernetting
3.12.1 Activity: Supernetting
3.13 IPv6
3.14 IPv4 - IPv6 Transition Mechanisms
3.15 Module 3 Outro
Module 4 - Layer 7 Protocols
4.1 Remote Control Protocols
4.2 File Sharing Protocols
4.3 Web Protcols
4.4 Email Protocols
4.5 Database Protocols
4.6 Voice Protocols
4.7 Security Protocols
4.8 Management Protocols
4.9 Module 4 Outro
Module 5 - Network Services
5.1 DHCP
5.1.1 Activity: Configuring DHCP
5.1.2 Activity: Configuring a DHCP Relay Agent
5.2 DNS
5.2.1 Activity: Configuring DNS - Part 1
5.2.2 Activity: Configuring DNS - Part 2
5.3 NTP
5.4 Corporate and Datacenter Network Architecture
5.5 Cloud Concepts and Connectivity Options
5.6 Module 5 Outro
Module 6 - Networking Devices
6.1 Introductory Concepts
6.2 Repeaters and Hubs
6.2.1 Activity: Connecting Devices with a Hub
6.3 Bridges and Switches
6.3.1 Activity: Connecting Devices with a Switch
6.4 Routers and Multilayer Switches
6.5 Security Devices
6.6 Modems
6.7 Module 6 Outro
Module 7 - Networked Devices
7.1 IP Devices
7.2 IoT
7.2.1 Activity - Programming IoT Devices
7.3 ICS/SCADA
7.4 Module 7 Outro
Module 8 - Routing and Bandwidth Management
8.1 Routing Basics
8.1.1 Activity: Configuring Static Routes
8.2 Packet Delivery on the Same Network
8.3 IP Routing Across a Single Router
8.4 IP Routing Across Multiple Hops
8.4.1 Activity: Static Routes - CHALLENGE
8.5 Route Selection
8.6 RIP
8.6.1 Activity: Configuring RIP - CHALLENGE
8.7 OSPF
8.8 EIGRP
8.9 BGP
8.10 NAT/PAT
8.11 Bandwidth Management (with Module 8 Outro)
Module 9 - Ethernet Switching
9.1 Ethernet Basics
9.2 Switching Overview
9.2.1 Activity: Examining a MAC Table
9.3 VLANs
9.3.1 Activity: Creating VLANs
9.4 VLAN Trunking
9.4.1 Activity: Configuring VLAN Trunking
9.5 VLAN Routing
9.5.1 Activity: Configuring VLAN Routing
9.6 Contention Management
9.7 Switchport Configuration (with Module 9 Outro)
Module 10 - Wireless Technologies
10.1 Wireless Overview
10.2 Radio Basics
10.3 Modulation
10.4 Wi-Fi Standards
10.5 Antennas
10.6 Wi-Fi Service Sets
10.7 Wi-Fi Security
10.8 Cellular
Module 11 Network Performance
11.1 Monitoring Performance
11.2 Common Metrics
11.2.1 Activity: Examining Interface Statistics
11.3 SNMP
11.4 Netflow
11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
12.1 HA and DR Concepts
12.2 High Availability Mechanisms
12.3 Disaster Recovery Mechanisms
12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
13.1 Plans and Procedures
13.2 Security Policies
13.3 Loss Prevention
13.4 Common Agreements
13.5 Common Documentation
13.6 Structured Cabling - MDF and IDF
13.7 Horizontal and Vertical Cabling
13.7.1 Activity - Implementing Cable Management
13.8 Labeling
13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
14.1 Common Security Concepts
14.2 Common Attack Types
14.3 Spoofing-based Attacks
14.4 Hijacking and MITM
14.5 Social Engineering
14.6 Network Segmentation
14.7 Private VLANs
14.8 Single Organization Authentication
14.9 Extending Authentication
14.10 Authorization
14.11 Network Device Hardening
14.12 Wireless Security
14.13 Remote Access Security
14.14 IoT Security
14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
15.1 Troubleshooting Methodology
15.2 Physical Connectivity Issues
15.3 Hardware Testing Tools
15.3.1 Activity - Testing an Ethernet Cable
15.3.2 Activity - Crimping on an RJ-45 Connector
15.3.3 Activity - Punching Down Twisted Pair
15.3.4 Activity - Using a Telephone Toner
15.4 Understanding Electricity
15.4.1 Activity - Checking Cable Continuity
15.4.2 Activity - Testing DC Voltage
15.4.3 Activity - Testing AC Voltage
15.5 Twisted Pair Pinout Problems
15.6 Twisted Pair Termination Problems
15.7 Repairing Damaged Twisted Pair Cable
15.8 Fiber Optic Connectivity Issues
15.8.1 Activity - Testing a Fiber Optic Cable
15.9 Common Port Problems
15.9.1 Working with Ports and Their Devices
15.10 Common Software Testing Tools
15.10.1 Activity - Scanning for Open Ports
15.11 Common Command Line Utilities
15.12 Troubleshooting Basic IP Networking Issues
15.13 Common Switching Issues
15.14 Switching Test Tools and Techniques
15.15 Common IP Routing Issues
15.16 Wi-Fi Access Point Issues
15.17 Wirelss Interference
15.17.1 Activity - Using a Spectrum Analyzer
15.18 Wireless Antenna Issues
15.18.1 Activity - Configuring a Wi-Fi Router
15.19 WAP Placement Strategies
15.20 Infrastructure Service Issues (DHCP)
15.21 Infrastructure Service Issues (DNS)
15.22 Infrastructure Service Issues (NTP)
15.23 Fireall / ACL Issues
15.24 VPN Issues
15.25 Additional Network Security Troubleshooting and Tips
15.26 Advanced Networking Issues
15.27 Troubleshooting Server Services (with Module 15 Outro)
CompTIA Network+ N10-008 Course Outro
CompTIA FC0-U61: IT Fundamentals Course Content
Module 1 - IT Concepts and Terminology
Module 1 Notes
0.1 Instructor Intro
1.1 Compare and Contrast Notational Systems
1.1 Compare and Contrast Notational Systems Demo
1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
1.3 Illustrate the Basics of Computing and Processing
1.4 Explain the Value of Data and Information
1.5 Compare and Contrast Common Units of Measures
1.5 Compare and Contrast Common Units of Measures Demo
1.6 Explain the Troubleshooting Methodology
Module 2 - Infrastructure
Module 2 Notes
2.1 Classify Common Types of Input-Output Device Interfaces
2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
2.3 Explain the Purpose of Common Internal Computing Components
2.4 Compare & Contrast Common Internet Service Types-
2.5 Compare & Contrast Storage Types
2.6 Compare & Contrast Common Computing Devices & Their Purposes
2.7 Explain Basic Networking Concepts
2.7 Explain Basic Networking Concepts Demo
2.7 Explain Basic Networking Concepts Part 2
2.7 Explain Basic Networking Concepts Part 3
2.7 Explain Basic Networking Concepts Part 4
2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 - Applications and Software
Module 3 Notes
3.1 Explain the Purpose of Operating Systems
3.1 Explain the Purpose of Operating Systems Demo
3.2 Compare & Contrast Components of an Operating System
3.2 Compare & Contrast Components of an Operating System Demo
3.3 Explain the Purpose & Proper Use of Software
3.4 Explain Methods of Application Architecture & Delivery Models
3.5 Given a Scenario Configure & Use Web Browsers
3.5 Given a Scenario Configure & Use Web Browsers FireFox
3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
3.6 Compare & Contrast General Application Concepts & Uses
Module 4 - Software Development
Module 4 Notes
4.1 Compare & Contrast Programming Language Categories-
4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
4.3 Explain the Purpose & Use of Programming Concepts-
4.3 HTML Demo
Module 5 - Database Fundamentals
Module 5 Notes
5.1 Explain Database Concepts and the Purpose of Databases
5.2 Compare and Contrast Various Database Structures
5.3 Summarize Methods Used to Interface with Databases
5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 - Security
Module 6 Notes
6.1 Summarize Confidentiality, Integrity, and Availability Concerns
6.2 Explain Methods to Secure Devices and Best Practices
6.3 Summarize Behavioral Security Concepts
6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
6.5 Explain Password Best Practices
6.6 Explain Common Uses of Encryption
6.7 Explain Business Continuity Concepts
6.8 Takeaways-
6.9 ITF Fundamentals Conclusion
Microsoft 98-365 MTA Windows Server 2016 Administration Course Content
Module 1 Introducing Windows Server 2016
Module 1 Notes
1. Windows Server 2016 Fundamentals Intro
2. Mod 1 Introducing Windows Server 2016
3. Mod 1a Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
Module 2 Notes
4. Mod 2 Managing Windows Server 2016
5. Mod 2a Managing Windows Server 2016
Module 3 Managing Storage
Module 3 Notes
6. Mod 3 Managing Storage
7. Mod 3a Managing Storage
Module 4 Monitoring and Troubleshooting Servers
Module 4 Notes
8. Mod 4 Monitoring and Troubleshooting Servers
9. Mod 4a Monitoring and Troubleshooting Servers
Module 5 Essential Services
Module 5 Notes
10. Mod 5 Essential Services
11. Mod 5a Essential Services
Module 6 Understanding File and Print Services
Module 6 Notes
12. Mod 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
Module 7 Notes
13. Mod 7 Windows Network Services and Applications-
14. Mod 7a Windows Network Services and Applications-
Mod 8 Key Takeaways
Key Takeaway Notes
15. Key takeaways Intro
16. Key takeaways - Module 1 Introducing Windows Server 2016
17. Key takeaways - Module 2 Managing Windows Server 2016
18 Key takeaways - Module 3 Storing Data in Windows Server 2016
19. Key takeaways - Module 4 Monitoring and Troubleshooting Servers
20. Key takeaways - Module 5 Essential Services
21. Key takeaways - Module 6 Understanding File and Print Services
22. Key takeaways - Module 7 Windows Network Services and Applications
Mod 9 Terms to Know
Terms to Know Notes
23. Terms to Know Intro
24. Terms to Know - Module 1 Introducing Windows Server 2016
25. Terms to Know - Module 2 Managing Windows Server 2016
26 Terms to Know - Module 3 Storing Data in Windows Server 2016
27. Terms to Know - Module 4 Monitoring and Troubleshooting Servers
28. Terms to Know - Module 5 Essential Services
29. Terms to Know - Module 6 Understanding File and Print Services
30. Terms to Know - Module 7 Windows Network Services and Applications
Mod 10 Hands on Labs
Hands on Labs Setup Notes
01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
02 Step by Step Install VMware Player 15 in Windows 10 1
03 Installing and Configuring DC1 Virtual Machine
04 Installing and Configuring SRV-1 Virtual Machine
05 Installing and Configuring Client 1 Virtual Machine
06 Installing and Configuring the Router Virtual Machine
07 Creating and Configuring SRV-2 Virtual Machine
08 Working with Windows Server 2016 Desktop Experience
09 Managing Organizational Units and Groups in AD DS
Microsoft 98-367 MTA Security Fundamentals Course Content
Module 1 Understanding Security Layers
Module 1 Notes
1.0 Security Fundamentals Instructor
1.1 Security Fundamentals Intro
1.2 Understanding Security Layers Part1
1.3 Understanding Security Layers Part2
Module 2 Authentication, Authorization, and Accounting
Module 2 Notes
2.0 Authentication, Authorization & Accounting Part1
2.1 Authentication, Authorization & Accounting Part2
2.2 Authentication, Authorization & Accounting Demo
Module 3 Understanding Security Policies
Module 3 Notes
3.0 Understanding Security Policies
Module 4 Understanding Network Security
Module 4 Notes
4.0 Understanding Network Security Part1
4.1 Understanding Network Security Part2
Module 5 Locking Down Server and Client
Module 5 Notes
5.0 Locking Down the Server and Client
5.1 Locking Down the Server and Client Part2
Module 6 Key Takeaways
Key Takeaway Notes
6.0 Key Take Aways Intro
6.1 Understanding Security Layers
6.2 Authentication Authorization and Accounting
6.3 Understanding Security Policies
6.4 Understanding Network Security
6.5 Security Fundamentals Part 2
Module 7 Terms to Know
Terms to Know Notes
7.0 Terms to Know Intro
7.1 Understanding Security Layers Terms
7.2 Authentication Authorization and Accounting Terms
7.3 Understanding Security Policies Terms
7.4 Understanding Network Security Terms
7.5 Locking Down Server and Client Terms
Microsoft 98-366 MTA Networking Fundamentals Course Content
Module 1 Understanding Local Area Networking
Module 1 Notes
1.0 Intro to Networking Fundamentals
1.1 Exam Overview
1.1 Examining Local Network Devices and Data Transfers 1a
1.1 Examining Local Network Devices and Data Transfers 1b
1.1 Examining Local Network Devices and Data Transfers 1c
1.1 Examining Local Network Devices and Data Transfers 1d
1.1 Examining Local Network Devices and Data Transfers 1e
1.1 Examining Local Network Devices and Data Transfers 1f
1.2 Examining Local Network Devices and Data Transfers Part 2a
1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
Module 2 Notes
2.1 Defining Networks with OSI Model Part 1a
2.2 Defining Networks with OSI Model Part 1b
2.3 Defining Networks with OSI Model Part 1c
2.4 Defining Networks with OSI Model Part 1d
2.5 Defining Networks with OSI Model Part 1e
2.6 Defining Networks with OSI Model Part 1f
2.7 Defining Networks with OSI Model Part 1g
2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
Module 3 Notes
3.1 Understand Wired and Wireless Networks Part1
3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
Module 4 Notes
4.1 Understanding Internet Protocol Part1
4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
Module 5 Notes
5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
Module 6 Notes
6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
Module 7 Notes
7.1 Understanding Wide Area Network Part1
7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
Module 8 Notes
8.1 Defining Network Infrastructure & Network Security Part1
8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
Key Takeaway Notes
1. Key Take Aways of Networking Fundamentals
2. Key Take Aways Mod1
3. Key Take Aways Mod2
4. Key Take Aways Mod3
5. Key Take Aways Mod4
6. Key Take Aways Mod5
7. Key Take Aways Mod6
8. Key Take Aways Mod7
Module 10 Terms to Know
Terms to Know Notes
1. Terms to Know Networking Fundamentals
2. Terms to Know Mod1
3. Terms to Know Mod2
4. Terms to Know Mod3
5. Terms to Know Mod4
6. Terms to Know Mod5
7. Terms to Know Mod6
8. Terms to Know Mod7
9. Terms to Know Mod8
Microsoft 70-698: Installing and Configuring Windows 10 Course Content
Module 1 : Prepare for installation requirements
Module 1 Workbook
Prep for Installation Windows 10
Clean Install or Upgrade Windows 10
Editions of Windows 10
What Features Do You Want
Installation Media
Looking at MS Application Compatibility Toolkit (ACT)
Module 2 : Install Windows
Module 2 Workbook
Installing Windows
Clean installation of Windows 10-Demo
Upgrade using Installation Media
Configure Native Boot and VHD
Migrating to Windows 10
Chp2 Booting from VHD
Creating a VHD-Demo
Installing Windows 10 to a VHD-Demo
Installing on Bootable USB
Using USMT User State Migration Tool-Demo
Additional Windows Features
Create an MBR-Partitioned VHD-Demo
Additional Regional and Language Support
Putting Win 10 on a VHD with DISM-Demo
Module 3 : Configure devices and device drivers
Module 3 Workbook
Configure Devices and Device Drivers
Resolve Driver Issues
Configuring Driver Settings
Manage Driver Packages
Download and Import Driver Packages
Using DISM
Installing o Updating Drivers using Device Manager-Demo
Roll Back Drivers-Demo
Using Sigverif-Demo
More on Device Manager-Demo
Module 4 : Perform post-installation configuration
Module 4 Workbook
Perform Post Installation Configuration
Configure Accessibilty Options
Configure Cortana
Configure Microsoft Edge
Configure Internet Explorer
Configure Client Hyper-V
Configure Power Settings
Customizing the Start Menu-Demo
Start Tiles-Demo
Desktop Customization-Demo
Action Center and Notifications-Demo
Hyper V-Demo
Power Settings-Demo
Module 5 : Implement Windows in an enterprise environment
Module 5 Workbook
Implement Windows in an Enterprise Enviornment
Implementing Active Directory
Implement Volume Activation Using a Key Mgmt Service
Query and Configure Activation State using Command line
Configure Active Directory Including Group Policies
Configure and Optimize User Account Control UAC
Using Software Licensing Manager; slmgr.vbs -dli-Demo
Taking a look at UAC-Demo
Module 6 : Configure networking
Module 6 Workbook
Configuring Networking
Configuring Name Resolution
Connect to a Network
Configure Network Locations
Configure Windows Firewall
Configure Windows Firewall with Advance Security
Configure Network Discovery
Configuring Wi-Fi Settings
Troubleshoot Network Issues
Configure VPNs
Configure IPsec
Configure DirectAccess
Configure IP Addresses Manually-Demo
DNS Settings-Demo
Looking at Network Locations and where to make Chpanges-Demo
Windows Firewall – Basic Settings-Demo
Windows Firewall – Advanced Settings-Demo
Troubleshooting Tools-Demo
Create a VPN Connection-Demo
Module 7 : Configure storage
Configure Storage
Create and Configure VHD
Configure Removable Devices
Create and Configure Storage Spaces
Troubleshoot Storage and Removable Device Issue
Steps to create a simple volume-Demo
Create VHD with Hyper-V Manager-Demo
Create VHD with PowerShell-Demo
Bitlocker to Go-Demo
Module 8 : Configure data access and usage
Module 8 Workbook
Configure Data Access and Usage File-Printer
Configure File System Permissions
Configure File Share Public Folders and OneDrive
Configure OneDrive usage including Files On Demand
Troubleshoot Data Access and Usage
File Sharing-Demo
Printer Sharing-Demo
Set Printer Security-Demo
File system permissions-Demo
Public Folder Sharing-Demo
OneDrive-Demo
Storage Sense-Demo
Disk Quotas-Demo
Module 9 : Implement Apps
Module 9 Workbook
Implement Apps
Configure Startup Options
Configure Windows Features
Configure Windows Stores
Implementing Windows Store Apps
Implement Windows Store for Business and Education
Provison Packages
Create Packages
Chpange Default Apps-Demo
Application Startup Options-Demo
Looking at Windows Features-Demo
Windows Store-Demo
Windows Imaging and Configuration Designer Tool ICD-Demo
Module 10 : Configure remote management
Module 10 Workbook
Configuring Remote Management
Configure Remote Management Settings
Configure Remote Desktop
Configure Remote Assistance
Modifying Using MMC or PS
Configure Remote PowerShell
Remote Management Settings-Demo
Allow through Windows Firewall-Demo
Remote Desktop-Demo
Remote Assistance-Demo
Remote with MMC-Demo
Windows PowerShell Remoting-Demo
Module 11 : Configure Updates
Module 11 Workbook
Configure Update Windows 10
Manage Update History
Roll Back Updates
Implement Insider Preview CB CBB and LTSB
Update Windows Store Apps
Windows Update Options-Demo
Update History-Demo
Rolling Back Updates-Demo
Update Windows Store apps-Demo
Module 12 : Monitor Windows
Module 12 Workbook
Monitor Windows
Configure Event Subscriptions
Monitor Performance Using Task Manager
Monitor System
Monitor and Manage Printers
Monitor Performance Using Performance Monitor Data Collectors
Monitor and Manage Printers
Configure Indexing Options
Manage Client Security by Using Windows Defender
Evaluate System Stability by Using Reliaability Monitor
Troubleshoot Performance Issues
Manage Security Using Windows Defender Security Center
Configure Windows Defender Advanced Threat Detection
Event Viewer-Demo
Creating Event Subscriptions-Demo
Task Manager-Demo
Performance Monitor-Demo
Resource Monitor-Demo
Managing the Printers with Print Management-Demo
Indexing-Demo
Windows Defender-Demo
Reliability Monitor-Demo
Module 13 : Configure System and Data Recovery
Module 13 Workbook
Configure System and Data Recovery
Configure System Restore
Configure Restore Points
Peform a Refresh or Recycle
Restore Previous Versions of Files and Folders
Configure File History
Recover Files from OneDrive
Use Windows Backup and Restore
Perform a Backup and Restore with WBAdmin
Perform Recovery Operations Windows Recovery
Configure a Recovery Drive-Demo
Configure System Restore-Demo
Configure Restore Points-Demo
Performing a Refresh or Recycle-Demo
Configure File History-Demo
Use Windows Backup & Restore-Demo
Module 14 : Configure Authorization and Authentication
Module 14 Workbook
Configure Authorization and Authentication
Configure Pictures Passwords and Biometrics
Configure Workgroups
Configure Domain Settings
Configue Homegroup Settings
Configure Credential Manager
Configure Local Accounts
Configure Microsoft Accounts
Configure Device Registration
Configure Windows Hello for Business
Configure Device Guard
Credential Guard
Configure Device Health Attestation
Configure UAC Behavior
Configure Dynamic Look
Picture Passwords-Demo
Workgroups-Demo
Domains-Demo
Credential Manager-Demo
Configure Local Accounts-Demo
Dynamic Lock-Demo
Module 15 : Configure Advanced Management Tools
Module 15 Workbook
Configure Advanced Management Tools
Configure Device Manager
Configure and use the MMC
Configure Task Schedule
Configure Automation of Mgmt Task Using Windows PowerShell
Convert Group Policy Objects to MDM Policies using the MDM
Services-Demo
Using the MMC-Demo
Task Scheduler-Demo
Opening PowerShell and the Integrated Scripting Environment-Demo
Windows 10 Power User (How to use Windows 10) Course Content
Module 1: Getting Started With Windows 10
Introduction
First Steps
Navigating The Desktop
Using Cortana To Search
Module 2: Using File Explorer
File Explorer
Understanding File And Folder Basics
Work With Libraries
Creating A Home Group
Module 3: Using Windows Applications
Opening And Using Applications
Installing New Applications From The Windows Store
Using Default Applications
Module 4: Browsing the Web With Microsoft Edge
Examining The Edge Window
Searching The Web With Edge
Bookmarking Important Sites
Using The Reading List
Marking A Page With Web Notes
Conclusion
Module 5: Customizing Windows
Introduction
Customizing The Display
Customizing File Explorer
Configuring Cortanas Notebook Feature
Customizing Privacy Settings
Customizing Microsoft Edge
Module 6: Connecting Devices And Devices
Connecting Printers
Connecting And Using A Flash Drive
Connect A Phone
Module 7: Managing User Accounts
Create Additional Users
Understanding User Profiles
Sharing Data Between Profiles
Module 8: Backing Up Important Data
Using File History
Using Windows Backup
Using System Restore
Module 9: Maintaining Windows
Windows Updates
Working With The Action Center
Using Disk Defragmenter
Managing Storage And Apps Using Settings
Conclusion
Module 10: Protecting Windows
Introduction
Using Windows Defender
Using Windows Firewall
Using Bit Locker
Windows Hello
Module 11: Monitoring Performance
Using Task Manager
Using Resource Monitor
Module 12: Working With Control Panel And Settings
Control Panel Part 1
Control Panel Part 2
Settings App
Using Device Manager
Using Remote Desktop
Conclusion
Add a review
Rating*
0/5
* Rating is required
Your review
* Review is required
Name
* Name is required
Email
* Email is required
1-5 of 49 reviews
Sorry, no reviews match your current selections
Your Training Instructors
David has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Jr. Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Additionally, David taught part-time during the evening at the college, where he instructed on Active Directory, Introduction to Computers, and Networking. David has 18 years of IT experience, 17 professional IT certifications, and 8 years of teaching experience.
Patrick is a skilled presenter with a strong background in IT training and certification covering general information technology, network administration, and consulting. His strong customer service background and skills both in support and presentation situations allow him to effectively communicate course information in an engaging manner. He specializes in areas such as Active Directory, Microsoft Exchange, Windows Network Infrastructure, and Security.
Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.
When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.
Chrys lives by, and is fond of repeating, her professional creed:
“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”
$79.00
OR
Subscribe To All-Access
Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.
$49.00 $14.99 Monthly
New To IT Tech Training Series – 9 Courses
New To IT Tech Training Series – 9 Courses
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
7 Days Free - $39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
Related Courses
$49.00
Become a Cisco Routing and Switching expert with ITU Online! Our online course covers all you need to know to pass the Cisco 300-115 exam.
If you’re looking to get Cisco SWITCH certified, this course will help prepare you for the SWITCH 300-115 exam. This exam tests a candidate’s knowledge of complex enterprise switching solutions that use the Cisco Enterprise Campus Architecture.
$49.00
Advance your IT career with Microsoft 70-412 training course. Learn how to configure advanced Windows Server 2012 services with ITU Online.
In this Microsoft 70-412: Configuring Advanced Windows Server Services course you will learn how to perform the advanced configuring tasks required to deploy, manage, and maintain a Windows Server 2012 infrastructure, such as fault tolerance, certificate services, and identity federation.
$49.00
Prepare for the Microsoft 70-686 Pro: Windows 7, Enterprise Desktop Administrator exam with our expert-led training. Enroll now!
In this Microsoft 70-686 course, students will learn how to efficiently plan and deploy Windows 7 desktops in large organizations. By the end of the course, students should be able to confidently design, configure, and manage any Windows 7 client environment.
I was looking for an online course for Six Sigma as my new boss is a true believer and I wanted to have a better handle of what is Six Sigma. I started looking around and found ITU, and bought the course, and could not be happier. I have no intention of getting certified, but at least now I can speak the jargon and understand what my boss is talking about.
The educators at ituonline.com are highly skilled but could improve their methods of instruction. In the CCNA 200-301 course, there’s a heavy emphasis on oral lectures, and it would be beneficial to include more in-depth visual aids. Annotating labs and graphics could also make the educational journey more effective. On the other hand, the N10-008 course instructor consistently offers top-notch material.
The CompTIA PenTest was an excellent course and the instructor, Chrys, explained the material in a clear and easy way for me to understand and comprehend essential techniques. Highly recommend!
This course is super detailed but not boring, and they give you cool projects to actually practice what you’re learning.