Give The Gift of Learning
25% off Winter Sale!

Days
Hours
Minutes

Use coupon code: 25learn

New To IT Tech Training Series

$199.00

New to information technology? Want to get into IT? This bundle is a great starter training bundle designed just for that.

SKU new-to-it-bundle-lifetime Categories , Tag
 

Course overview

140  HOURS OF TRAINING
753 VIDEOS
85  SKILLS
1191 PRACTICE QUESTIONS

New to information technology? Want to get into IT? This bundle is a great starter training bundle designed just for that. The 10 courses included in this bundle are designed to introduce and expand on core IT knowledge needed to launch or enhance your IT career. This is an excellent training program for help desk analysts and IT generalists. Get started today with this low-cost training bundle.

This bundle includes the following courses:

  • CompTIA A+ 220-1001 (Core 1)
  • CompTIA A+ 220-1002 (Core 2)
  • CompTIA FC0-U61: IT Fundamentals
  • CompTIA Network+ N10-008
  • Microsoft 70-698: Installing and Configuring Windows 10
  • Microsoft 98-365 MTA Windows Server 2016 Administration
  • Microsoft 98-365 MTA Windows Server 2016 Administration
  • Microsoft 98-366 MTA Networking Fundamentals
  • Microsoft 98-367 MTA Security Fundamentals
  • Windows 10 Power User (How to use Windows 10)
  • CompTIA Network+ N10-008 Course Outline

    Module 0 - Course introduction
    •    0.1 Instructor Intro
    •    0.2 Course Overview
    Module 1 - Networking Fundamentals
    •    1.1 Intro to Networking
    •    1.1.1 Activity: Creating a Network
    •    1.2 Common Terminology
    •    1.2.1 Activity: Examining Ports and Sockets
    •    1.3 OSI Model
    •    1.4 DoD Model
    •    1.4.1 Activity: Examining Network Layers
    •    1.5 TCP, UDP, IP
    •    1.5.1 Activity: Examining TCP
    •    1.5.2 Activity: Examining UDP
    •    1.5.3 Activity: Examining IP
    •    1.6 ICMP, IGMP, ARP
    •    1.6.1 Activity: Examining ICMP
    •    1.6.2 Activity: Examining ARP
    •    1.6.3 Activity: Examining IGMP
    •    1.7 Network Topologies
    •    1.8 Network Types
    •    1.9 Part 1: Network Characteristics
    •    1.9 Part 2: Network Characteristics
    •    1.10 Module 1 outro
    Module 2 - Cables and Connectors
    •    2.1 Ethernet Standards
    •    2.2 Copper Cable Types
    •    2.3 Fiber Optic Cable Types
    •    2.4 Connector Types
    •    2.4.1 Activity: Selecting the Right Cable
    •    2.5 Media Converters and Transceivers
    •    2.6 Cable Management
    •    2.7 Module 2 Outro
    Module 3 - Internet Protocol (IP)
    •    3.1 IPv4 Basics
    •    3.2 IP Packet and Interface Types
    •    3.2.1 Activity: Configuring Client IP Settings
    •    3.3 Binary Numbering System
    •    3.4 Classful and Classless Addressing
    •    3.5 Understanding CIDR Notation
    •    3.6 IPv4 Subnetting Method
    •    3.7 Verifying with Binary
    •    3.8 Finding Subnet IDs
    •    3.8.1 Activity: Subnetting a Class C Network
    •    3.9 The Delta in Action
    •    3.9.1 Activity: Subnetting With the Delta
    •    3.10 Subnetting Based on Hosts
    •    3.11 Subnetting in Other Octets
    •    3.12 Supernetting
    •    3.12.1 Activity: Supernetting
    •    3.13 IPv6
    •    3.14 IPv4 - IPv6 Transition Mechanisms
    •    3.15 Module 3 Outro
    Module 4 - Layer 7 Protocols
    •    4.1 Remote Control Protocols
    •    4.2 File Sharing Protocols
    •    4.3 Web Protcols
    •    4.4 Email Protocols
    •    4.5 Database Protocols
    •    4.6 Voice Protocols
    •    4.7 Security Protocols
    •    4.8 Management Protocols
    •    4.9 Module 4 Outro
    Module 5 - Network Services
    •    5.1 DHCP
    •    5.1.1 Activity: Configuring DHCP
    •    5.1.2 Activity: Configuring a DHCP Relay Agent
    •    5.2 DNS
    •    5.2.1 Activity: Configuring DNS - Part 1
    •    5.2.2 Activity: Configuring DNS - Part 2
    •    5.3 NTP
    •    5.4 Corporate and Datacenter Network Architecture
    •    5.5 Cloud Concepts and Connectivity Options
    •    5.6 Module 5 Outro
    Module 6 - Networking Devices
    •    6.1 Introductory Concepts
    •    6.2 Repeaters and Hubs
    •    6.2.1 Activity: Connecting Devices with a Hub
    •    6.3 Bridges and Switches
    •    6.3.1 Activity: Connecting Devices with a Switch
    •    6.4 Routers and Multilayer Switches
    •    6.5 Security Devices
    •    6.6 Modems
    •    6.7 Module 6 Outro
    Module 7 - Networked Devices
    •    7.1 IP Devices
    •    7.2 IoT
    •    7.2.1 Activity - Programming IoT Devices
    •    7.3 ICS/SCADA
    •    7.4 Module 7 Outro
    Module 8 - Routing and Bandwidth Management
    •    8.1 Routing Basics
    •    8.1.1 Activity: Configuring Static Routes
    •    8.2 Packet Delivery on the Same Network
    •    8.3 IP Routing Across a Single Router
    •    8.4 IP Routing Across Multiple Hops
    •    8.4.1 Activity: Static Routes - CHALLENGE
    •    8.5 Route Selection
    •    8.6 RIP
    •    8.6.1 Activity: Configuring RIP - CHALLENGE
    •    8.7 OSPF
    •    8.8 EIGRP
    •    8.9 BGP
    •    8.10 NAT/PAT
    •    8.11 Bandwidth Management (with Module 8 Outro)
    Module 9 - Ethernet Switching
    •    9.1 Ethernet Basics
    •    9.2 Switching Overview
    •    9.2.1 Activity: Examining a MAC Table
    •    9.3 VLANs
    •    9.3.1 Activity: Creating VLANs
    •    9.4 VLAN Trunking
    •    9.4.1 Activity: Configuring VLAN Trunking
    •    9.5 VLAN Routing
    •    9.5.1 Activity: Configuring VLAN Routing
    •    9.6 Contention Management
    •    9.7 Switchport Configuration (with Module 9 Outro)
    Module 10 - Wireless Technologies
    •    10.1 Wireless Overview
    •    10.2 Radio Basics
    •    10.3 Modulation
    •    10.4 Wi-Fi Standards
    •    10.5 Antennas
    •    10.6 Wi-Fi Service Sets
    •    10.7 Wi-Fi Security
    •    10.8 Cellular
    Module 11 Network Performance
    •    11.1 Monitoring Performance
    •    11.2 Common Metrics
    •    11.2.1 Activity: Examining Interface Statistics
    •    11.3 SNMP
    •    11.4 Netflow
    •    11.5 Network Security Monitoring (with Module 11 Outro)
    Module 12 High Availability and Disaster Recovery
    •    12.1 HA and DR Concepts
    •    12.2 High Availability Mechanisms
    •    12.3 Disaster Recovery Mechanisms
    •    12.4 Facility and Infrastructure Support (with Module 12 Outro)
    Module 13 Organizational Documents
    •    13.1 Plans and Procedures
    •    13.2 Security Policies
    •    13.3 Loss Prevention
    •    13.4 Common Agreements
    •    13.5 Common Documentation
    •    13.6 Structured Cabling - MDF and IDF
    •    13.7 Horizontal and Vertical Cabling
    •    13.7.1 Activity - Implementing Cable Management
    •    13.8 Labeling
    •    13.9 Surveys and Assessments (with Module 13 Outro)
    Module 14 Network Security
    •    14.1 Common Security Concepts
    •    14.2 Common Attack Types
    •    14.3 Spoofing-based Attacks
    •    14.4 Hijacking and MITM
    •    14.5 Social Engineering
    •    14.6 Network Segmentation
    •    14.7 Private VLANs
    •    14.8 Single Organization Authentication
    •    14.9 Extending Authentication
    •    14.10 Authorization
    •    14.11 Network Device Hardening
    •    14.12 Wireless Security
    •    14.13 Remote Access Security
    •    14.14 IoT Security
    •    14.15 Physical Security (with Module 14 Outro)
    Module 15 Network Troubleshooting
    •    15.1 Troubleshooting Methodology
    •    15.2 Physical Connectivity Issues
    •    15.3 Hardware Testing Tools
    •    15.3.1 Activity - Testing an Ethernet Cable
    •    15.3.2 Activity - Crimping on an RJ-45 Connector
    •    15.3.3 Activity - Punching Down Twisted Pair
    •    15.3.4 Activity - Using a Telephone Toner
    •    15.4 Understanding Electricity
    •    15.4.1 Activity - Checking Cable Continuity
    •    15.4.2 Activity - Testing DC Voltage
    •    15.4.3 Activity - Testing AC Voltage
    •    15.5 Twisted Pair Pinout Problems
    •    15.6 Twisted Pair Termination Problems
    •    15.7 Repairing Damaged Twisted Pair Cable
    •    15.8 Fiber Optic Connectivity Issues
    •    15.8.1 Activity - Testing a Fiber Optic Cable
    •    15.9 Common Port Problems
    •    15.9.1 Working with Ports and Their Devices
    •    15.10 Common Software Testing Tools
    •    15.10.1 Activity - Scanning for Open Ports
    •    15.11 Common Command Line Utilities
    •    15.12 Troubleshooting Basic IP Networking Issues
    •    15.13 Common Switching Issues
    •    15.14 Switching Test Tools and Techniques
    •    15.15 Common IP Routing Issues
    •    15.16 Wi-Fi Access Point Issues
    •    15.17 Wirelss Interference
    •    15.17.1 Activity - Using a Spectrum Analyzer
    •    15.18 Wireless Antenna Issues
    •    15.18.1 Activity - Configuring a Wi-Fi Router
    •    15.19 WAP Placement Strategies
    •    15.20 Infrastructure Service Issues (DHCP)
    •    15.21 Infrastructure Service Issues (DNS)
    •    15.22 Infrastructure Service Issues (NTP)
    •    15.23 Fireall / ACL Issues
    •    15.24 VPN Issues
    •    15.25 Additional Network Security Troubleshooting and Tips
    •    15.26 Advanced Networking Issues
    •    15.27 Troubleshooting Server Services (with Module 15 Outro)
    •    CompTIA Network+ N10-008 Course Outro

    CompTIA FC0-U61: IT Fundamentals Course Outline

    Module 1 - IT Concepts and Terminology
    •    Module 1 Notes
    •    0.1 Instructor Intro
    •    1.1 Compare and Contrast Notational Systems
    •    1.1 Compare and Contrast Notational Systems Demo
    •    1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
    •    1.3 Illustrate the Basics of Computing and Processing
    •    1.4 Explain the Value of Data and Information
    •    1.5 Compare and Contrast Common Units of Measures
    •    1.5 Compare and Contrast Common Units of Measures Demo
    •    1.6 Explain the Troubleshooting Methodology
    Module 2 - Infrastructure
    •    Module 2 Notes
    •    2.1 Classify Common Types of Input-Output Device Interfaces
    •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
    •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
    •    2.3 Explain the Purpose of Common Internal Computing Components
    •    2.4 Compare & Contrast Common Internet Service Types-
    •    2.5 Compare & Contrast Storage Types
    •    2.6 Compare & Contrast Common Computing Devices & Their Purposes
    •    2.7 Explain Basic Networking Concepts
    •    2.7 Explain Basic Networking Concepts Demo
    •    2.7 Explain Basic Networking Concepts Part 2
    •    2.7 Explain Basic Networking Concepts Part 3
    •    2.7 Explain Basic Networking Concepts Part 4
    •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
    •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
    Module 3 - Applications and Software
    •    Module 3 Notes
    •    3.1 Explain the Purpose of Operating Systems
    •    3.1 Explain the Purpose of Operating Systems Demo
    •    3.2 Compare & Contrast Components of an Operating System
    •    3.2 Compare & Contrast Components of an Operating System Demo
    •    3.3 Explain the Purpose & Proper Use of Software
    •    3.4 Explain Methods of Application Architecture & Delivery Models
    •    3.5 Given a Scenario Configure & Use Web Browsers
    •    3.5 Given a Scenario Configure & Use Web Browsers FireFox
    •    3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
    •    3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
    •    3.6 Compare & Contrast General Application Concepts & Uses
    Module 4 - Software Development
    •    Module 4 Notes
    •    4.1 Compare & Contrast Programming Language Categories-
    •    4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
    •    4.3 Explain the Purpose & Use of Programming Concepts-
    •    4.3 HTML Demo
    Module 5 - Database Fundamentals
    •    Module 5 Notes
    •    5.1 Explain Database Concepts and the Purpose of Databases
    •    5.2 Compare and Contrast Various Database Structures
    •    5.3 Summarize Methods Used to Interface with Databases
    •    5.3 Summarize Methods Used to Interface with Databases Demo
    Module 6 - Security
    •    Module 6 Notes
    •    6.1 Summarize Confidentiality, Integrity, and Availability Concerns
    •    6.2 Explain Methods to Secure Devices and Best Practices
    •    6.3 Summarize Behavioral Security Concepts
    •    6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
    •    6.5 Explain Password Best Practices
    •    6.6 Explain Common Uses of Encryption
    •    6.7 Explain Business Continuity Concepts
    •    6.8 Takeaways-
    •    6.9 ITF Fundamentals Conclusion

    Microsoft 98-365 MTA Windows Server 2016 Administration Course Outline

    Module 1 Introducing Windows Server 2016
    •    Module 1 Notes
    •    1. Windows Server 2016 Fundamentals Intro
    •    2. Mod 1 Introducing Windows Server 2016
    •    3. Mod 1a Introducing Windows Server 2016
    Module 2 Managing Windows Server 2016
    •    Module 2 Notes
    •    4. Mod 2 Managing Windows Server 2016
    •    5. Mod 2a Managing Windows Server 2016
    Module 3 Managing Storage
    •    Module 3 Notes
    •    6. Mod 3 Managing Storage
    •    7. Mod 3a Managing Storage
    Module 4 Monitoring and Troubleshooting Servers
    •    Module 4 Notes
    •    8. Mod 4 Monitoring and Troubleshooting Servers
    •    9. Mod 4a Monitoring and Troubleshooting Servers
    Module 5 Essential Services
    •    Module 5 Notes
    •    10. Mod 5 Essential Services
    •    11. Mod 5a Essential Services
    Module 6 Understanding File and Print Services
    •    Module 6 Notes
    •    12. Mod 6 Understanding File and Print Services
    Module 7 Windows Network Services and Applications
    •    Module 7 Notes
    •    13. Mod 7 Windows Network Services and Applications-
    •    14. Mod 7a Windows Network Services and Applications-
    Mod 8 Key Takeaways
    •    Key Takeaway Notes
    •    15. Key takeaways Intro
    •    16. Key takeaways - Module 1 Introducing Windows Server 2016
    •    17. Key takeaways - Module 2 Managing Windows Server 2016
    •    18 Key takeaways - Module 3 Storing Data in Windows Server 2016
    •    19. Key takeaways - Module 4 Monitoring and Troubleshooting Servers
    •    20. Key takeaways - Module 5 Essential Services
    •    21. Key takeaways - Module 6 Understanding File and Print Services
    •    22. Key takeaways - Module 7 Windows Network Services and Applications
    Mod 9 Terms to Know
    •    Terms to Know Notes
    •    23. Terms to Know Intro
    •    24. Terms to Know - Module 1 Introducing Windows Server 2016
    •    25. Terms to Know - Module 2 Managing Windows Server 2016
    •    26 Terms to Know - Module 3 Storing Data in Windows Server 2016
    •    27. Terms to Know - Module 4 Monitoring and Troubleshooting Servers
    •    28. Terms to Know - Module 5 Essential Services
    •    29. Terms to Know - Module 6 Understanding File and Print Services
    •    30. Terms to Know - Module 7 Windows Network Services and Applications
    Mod 10 Hands on Labs
    •    Hands on Labs Setup Notes
    •    01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
    •    02 Step by Step Install VMware Player 15 in Windows 10 1
    •    03 Installing and Configuring DC1 Virtual Machine
    •    04 Installing and Configuring SRV-1 Virtual Machine
    •    05 Installing and Configuring Client 1 Virtual Machine
    •    06 Installing and Configuring the Router Virtual Machine
    •    07 Creating and Configuring SRV-2 Virtual Machine
    •    08 Working with Windows Server 2016 Desktop Experience
    •    09 Managing Organizational Units and Groups in AD DS

    Microsoft 98-367 MTA Security Fundamentals Course Outline

    Module 1 Understanding Security Layers
    •    Module 1 Notes
    •    1.0 Security Fundamentals Instructor
    •    1.1 Security Fundamentals Intro
    •    1.2 Understanding Security Layers Part1
    •    1.3 Understanding Security Layers Part2
    Module 2 Authentication, Authorization, and Accounting
    •    Module 2 Notes
    •    2.0 Authentication, Authorization & Accounting Part1
    •    2.1 Authentication, Authorization & Accounting Part2
    •    2.2 Authentication, Authorization & Accounting Demo
    Module 3 Understanding Security Policies
    •    Module 3 Notes
    •    3.0 Understanding Security Policies
    Module 4 Understanding Network Security
    •    Module 4 Notes
    •    4.0 Understanding Network Security Part1
    •    4.1 Understanding Network Security Part2
    Module 5 Locking Down Server and Client
    •    Module 5 Notes
    •    5.0 Locking Down the Server and Client
    •    5.1 Locking Down the Server and Client Part2
    Module 6 Key Takeaways
    •    Key Takeaway Notes
    •    6.0 Key Take Aways Intro
    •    6.1 Understanding Security Layers
    •    6.2 Authentication Authorization and Accounting
    •    6.3 Understanding Security Policies
    •    6.4 Understanding Network Security
    •    6.5 Security Fundamentals Part 2
    Module 7 Terms to Know
    •    Terms to Know Notes
    •    7.0 Terms to Know Intro
    •    7.1 Understanding Security Layers Terms
    •    7.2 Authentication Authorization and Accounting Terms
    •    7.3 Understanding Security Policies Terms
    •    7.4 Understanding Network Security Terms
    •    7.5 Locking Down Server and Client Terms

    Microsoft 98-366 MTA Networking Fundamentals Course Outline

    Module 1 Understanding Local Area Networking
    •    Module 1 Notes
    •    1.0 Intro to Networking Fundamentals
    •    1.1 Exam Overview
    •    1.1 Examining Local Network Devices and Data Transfers 1a
    •    1.1 Examining Local Network Devices and Data Transfers 1b
    •    1.1 Examining Local Network Devices and Data Transfers 1c
    •    1.1 Examining Local Network Devices and Data Transfers 1d
    •    1.1 Examining Local Network Devices and Data Transfers 1e
    •    1.1 Examining Local Network Devices and Data Transfers 1f
    •    1.2 Examining Local Network Devices and Data Transfers Part 2a
    •    1.2 Examining Local Network Devices and Data Transfers Part 2b
    Module 2 Defining Networks with the OSI Model
    •    Module 2 Notes
    •    2.1 Defining Networks with OSI Model Part 1a
    •    2.2 Defining Networks with OSI Model Part 1b
    •    2.3 Defining Networks with OSI Model Part 1c
    •    2.4 Defining Networks with OSI Model Part 1d
    •    2.5 Defining Networks with OSI Model Part 1e
    •    2.6 Defining Networks with OSI Model Part 1f
    •    2.7 Defining Networks with OSI Model Part 1g
    •    2.8 Defining Networks with OSI Model Part 1h
    Module 3 Understanding Wired and Wireless Networks
    •    Module 3 Notes
    •    3.1 Understand Wired and Wireless Networks Part1
    •    3.2 Understand Wired and Wireless Networks Part2
    Module 4 Understanding Internet Protocol
    •    Module 4 Notes
    •    4.1 Understanding Internet Protocol Part1
    •    4.2 Understanding Internet Protocol Part2
    Module 5 Implementing TCP-IP in the command line
    •    Module 5 Notes
    •    5.1 Implementing TCPIP in the Command Line
    Module 6 Working with Networking Services
    •    Module 6 Notes
    •    6.1 Working with Networking Services
    Module 7 Understanding Wide Area Networks
    •    Module 7 Notes
    •    7.1 Understanding Wide Area Network Part1
    •    7.2 Understanding Wide Area Network Part2
    Module 8 Defining Network Infrastructure and Security
    •    Module 8 Notes
    •    8.1 Defining Network Infrastructure & Network Security Part1
    •    8.2 Defining Network Infrastructure & Network Security Part2
    Module 9 Key Takeaways
    •    Key Takeaway Notes
    •    1. Key Take Aways of Networking Fundamentals
    •    2. Key Take Aways Mod1
    •    3. Key Take Aways Mod2
    •    4. Key Take Aways Mod3
    •    5. Key Take Aways Mod4
    •    6. Key Take Aways Mod5
    •    7. Key Take Aways Mod6
    •    8. Key Take Aways Mod7
    Module 10 Terms to Know
    •    Terms to Know Notes
    •    1. Terms to Know Networking Fundamentals
    •    2. Terms to Know Mod1
    •    3. Terms to Know Mod2
    •    4. Terms to Know Mod3
    •    5. Terms to Know Mod4
    •    6. Terms to Know Mod5
    •    7. Terms to Know Mod6
    •    8. Terms to Know Mod7
    •    9. Terms to Know Mod8

    CompTIA A+ 220-1002 (Core 2) Course Outline

    Module 1 - Operating Systems
    •    Module 1 Workbook
    •    0.1 Intro to A+ Core2 Instructor
    •    1.0 Intro to A+ Core2
    •    1.1 Operating Systems Part1
    •    1.1 Operating Systems Part2
    •    1.2 Compare and Contrast features of Microsoft Windows Versions
    •    1.3 Summarize General OS Installation Considerations Upgrade Methods
    •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
    •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
    •    1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
    •    1.4 Scenario use appropriate Microsoft Command Line Tools Part1
    •    1.4 Scenario use appropriate Microsoft Command Line Tools Part2
    •    1.4 Scenario use appropriate Microsoft Command Line Tools Demo
    •    1.5 Microsoft Operating System and Tools Part1
    •    1.5 Microsoft Operating System and Tools Part1 Demo
    •    1.5 Microsoft Operating System and Tools Part2
    •    1.5 Microsoft Operating System and Tools Part2 Demo
    •    1.5 Microsoft Operating System and Tools Part3
    •    1.5 Microsoft Operating System and Tools Part3 Demo
    •    1.5 Microsoft Operating System and Tools Part4
    •    1.5 Microsoft Operating System and Tools Part4 Demo
    •    1.6 Microsoft Windows Control Panel Utilities
    •    1.6 Microsoft Windows Control Panel Utilities Demo
    •    1.7 Summerize Application Installation and Configuration Concepts
    •    1.8 Configure Windows Networking on a Client Desktop
    •    1.8 Configure Windows Networking on a Client Desktop Demo
    •    1.9 Features and Tools of MAC OS and Linux Client Desktop
    Module 2 - Security
    •    Module 2 Workbook
    •    2.1 Security - Physical Security Measures
    •    2.2 Explain Logical Security Concepts
    •    2.2 Explain Logical Security Concepts Part2
    •    2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
    •    2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
    •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
    •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
    •    2.6 Compare Contrast the different Microsoft Windows Security Settings
    •    2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
    •    2.7 Implement Security Best Practices to Secure a Workstation
    •    2.7 Implement Security Best Practices to Secure a Workstation Part2
    •    2.8 Implement Methods for Securing Mobile Devices
    •    2.9 Implement Appropriate Data Destruction & Disposal Methods
    •    2.10 Configure Security on SOHO Wireless and Wired Networks
    •    2.10 Configure Security on SOHO Wireless and Wired Networks Demo
    Module 3 - Software Troubleshooting
    •    Module 3 Workbook
    •    3.1 Software Troubleshooting Part1
    •    3.1 Software Troubleshooting Part2
    •    3.1 Software Troubleshooting Demo
    •    3.2 Troubleshoot and Resolve PC Security Issues
    •    3.2 Troubleshoot and Resolve PC Security Issues Part2
    •    3.2 Troubleshoot and Resolve PC Security Issues Demo
    •    3.3 Best Practice Procedures for Malware Removal
    •    3.4 Troubleshoot Mobile OS and Application
    •    3.5 Troubleshoot Mobile OS and Application Security Issue
    Module 4 - Operational Procedures
    •    Module 4 Workbook
    •    4.1 Operational Procedures
    •    4.2 Implement Basic Change Management Best Practices
    •    4.3 Implement Basic Disaster Prevention and Recovery Methods
    •    4.4 Explain Common Safety Procedures
    •    4.5 Explain Environmental Impacts and Appropriate Controls
    •    4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
    •    4.7 Using Proper Communication Techniques and Professionalism
    •    4.8 Identify the Basic of Scripting
    •    4.8 Identify the Basic of Scripting Demo
    •    4.9 Use Remote Access Technologies

    CompTIA A+ 220-1001 (Core 1) Course Outline

    Module 1 - Mobile Devices
    •    Module 1 Workbook
    •    0.1 Intro to A+ Core1 Instructor
    •    1.0 CompTIA A+ Course Intro
    •    1.1 Mobile Devices Part 1
    •    1.1 Mobile Devices Part 2
    •    1.1 Mobile Devices Part 3
    •    1.2 Installing Components in Laptop
    •    1.3 Laptop Features Part 1
    •    1.3 Laptop Features Part 2
    •    1.4 Compare and Contrast Types of Mobile Devices
    •    1.5 Accessories and Ports of Other Mobile Devices Part 1
    •    1.5 Accessories and Ports of Other Mobile Devices Part 2
    •    1.6 Configure Basic Device Network Connectivity and Application Support Part 1
    •    1.6 Configure Basic Device Network Connectivity and Application Support Part 2
    •    1.7 Use Methods to Perform Mobile Device Synchronization
    •    1.8 Laptop Disassemble and Assemble
    Module 2 - Networking
    •    Module 2 Workbook
    •    2.1 Networking Part 1
    •    2.1 Networking Part 2
    •    2.2 Compare and Contrast Common Networking Hardware Devices Part 1
    •    2.2 Compare and Contrast Common Networking Hardware Devices Part 2
    •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
    •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
    •    2.3 Setting Up a Wireless Router
    •    2.4 Compare and Contrast Wireless Networking Protocols
    •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
    •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
    •    2.6 Explain Common Network Configuration Concepts Part 1
    •    2.6 Explain Common Network Configuration Concepts Part 2
    •    2.7 Compare and Contrast Internet Connection Types Network Types and Features
    •    2.8 Given a Scenario Using Appropriate Networking Tools
    Module 3 - Hardware
    •    Module 3 Workbook
    •    3.1 Hardware Part 1
    •    3.1 Hardware Part 2
    •    3.1 Hardware Part 3
    •    3.2 Identify Common Connector Types
    •    3.3 Scenario Install RAM Types
    •    3.4 Scenario Select Install and Configure Storage Devices
    •    3.4 Scenario Select Install and Configure Storage Devices Part 2
    •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
    •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
    •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
    •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
    •    3.5 Install Disassemble and Assemble a Desktop
    •    3.6 Purposes for Peripherals and Types
    •    3.7 Summarize Power Supplies
    •    3.8 Scenario Select and Configure Appropriate Components for Customers PCs
    •    3.9 Scenario Installand Configure Common Devices
    •    3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
    •    3.11 Scenario Install and Maintain Various Print Technologies Part 1
    •    3.11 Scenario Install and Maintain Various Print Technologies Part 2
    •    3.11 Scenario Install and Maintain Various Print Technologies Part 3
    Module 4 - Virtualization and Cloud Computing
    •    Module 4 Workbook
    •    4.1 Virtualization Part 1
    •    4.1 Virtualization Part 2
    •    4.2 Scenario Setup and Configure Client-side Virtualization
    Module 5 - Hardware and Network Troubleshooting
    •    Module 5 Workbook
    •    5.1 Hardware and Networking Troubleshooting
    •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
    •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
    •    5.3 Troubleshoot Hard Drives and RAID Arrays
    •    5.4 Troubleshoot Video and Display Issues
    •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
    •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
    •    5.6 Troubleshoot Printers
    •    5.7 Troubleshoot Common Wired and Wireless Network Problems

    Microsoft 70-698: Installing and Configuring Windows 10 Course Outline

    Module 1 : Prepare for installation requirements
    •    Module 1 Workbook
    •    Prep for Installation Windows 10
    •    Clean Install or Upgrade Windows 10
    •    Editions of Windows 10
    •    What Features Do You Want
    •    Installation Media
    •    Looking at MS Application Compatibility Toolkit (ACT)
    Module 2 : Install Windows
    •    Module 2 Workbook
    •    Installing Windows
    •    Clean installation of Windows 10-Demo
    •    Upgrade using Installation Media
    •    Configure Native Boot and VHD
    •    Migrating to Windows 10
    •    Chp2 Booting from VHD
    •    Creating a VHD-Demo
    •    Installing Windows 10 to a VHD-Demo
    •    Installing on Bootable USB
    •    Using USMT User State Migration Tool-Demo
    •    Additional Windows Features
    •    Create an MBR-Partitioned VHD-Demo
    •    Additional Regional and Language Support
    •    Putting Win 10 on a VHD with DISM-Demo
    Module 3 : Configure devices and device drivers
    •    Module 3 Workbook
    •    Configure Devices and Device Drivers
    •    Resolve Driver Issues
    •    Configuring Driver Settings
    •    Manage Driver Packages
    •    Download and Import Driver Packages
    •    Using DISM
    •    Installing o Updating Drivers using Device Manager-Demo
    •    Roll Back Drivers-Demo
    •    Using Sigverif-Demo
    •    More on Device Manager-Demo
    Module 4 : Perform post-installation configuration
    •    Module 4 Workbook
    •    Perform Post Installation Configuration
    •    Configure Accessibilty Options
    •    Configure Cortana
    •    Configure Microsoft Edge
    •    Configure Internet Explorer
    •    Configure Client Hyper-V
    •    Configure Power Settings
    •    Customizing the Start Menu-Demo
    •    Start Tiles-Demo
    •    Desktop Customization-Demo
    •    Action Center and Notifications-Demo
    •    Hyper V-Demo
    •    Power Settings-Demo
    Module 5 : Implement Windows in an enterprise environment
    •    Module 5 Workbook
    •    Implement Windows in an Enterprise Enviornment
    •    Implementing Active Directory
    •    Implement Volume Activation Using a Key Mgmt Service
    •    Query and Configure Activation State using Command line
    •    Configure Active Directory Including Group Policies
    •    Configure and Optimize User Account Control UAC
    •    Using Software Licensing Manager; slmgr.vbs -dli-Demo
    •    Taking a look at UAC-Demo
    Module 6 : Configure networking
    •    Module 6 Workbook
    •    Configuring Networking
    •    Configuring Name Resolution
    •    Connect to a Network
    •    Configure Network Locations
    •    Configure Windows Firewall
    •    Configure Windows Firewall with Advance Security
    •    Configure Network Discovery
    •    Configuring Wi-Fi Settings
    •    Troubleshoot Network Issues
    •    Configure VPNs
    •    Configure IPsec
    •    Configure DirectAccess
    •    Configure IP Addresses Manually-Demo
    •    DNS Settings-Demo
    •    Looking at Network Locations and where to make Chpanges-Demo
    •    Windows Firewall – Basic Settings-Demo
    •    Windows Firewall – Advanced Settings-Demo
    •    Troubleshooting Tools-Demo
    •    Create a VPN Connection-Demo
    Module 7 : Configure storage
    •    Configure Storage
    •    Create and Configure VHD
    •    Configure Removable Devices
    •    Create and Configure Storage Spaces
    •    Troubleshoot Storage and Removable Device Issue
    •    Steps to create a simple volume-Demo
    •    Create VHD with Hyper-V Manager-Demo
    •    Create VHD with PowerShell-Demo
    •    Bitlocker to Go-Demo
    Module 8 : Configure data access and usage
    •    Module 8 Workbook
    •    Configure Data Access and Usage File-Printer
    •    Configure File System Permissions
    •    Configure File Share Public Folders and OneDrive
    •    Configure OneDrive usage including Files On Demand
    •    Troubleshoot Data Access and Usage
    •    File Sharing-Demo
    •    Printer Sharing-Demo
    •    Set Printer Security-Demo
    •    File system permissions-Demo
    •    Public Folder Sharing-Demo
    •    OneDrive-Demo
    •    Storage Sense-Demo
    •    Disk Quotas-Demo
    Module 9 : Implement Apps
    •    Module 9 Workbook
    •    Implement Apps
    •    Configure Startup Options
    •    Configure Windows Features
    •    Configure Windows Stores
    •    Implementing Windows Store Apps
    •    Implement Windows Store for Business and Education
    •    Provison Packages
    •    Create Packages
    •    Chpange Default Apps-Demo
    •    Application Startup Options-Demo
    •    Looking at Windows Features-Demo
    •    Windows Store-Demo
    •    Windows Imaging and Configuration Designer Tool ICD-Demo
    Module 10 : Configure remote management
    •    Module 10 Workbook
    •    Configuring Remote Management
    •    Configure Remote Management Settings
    •    Configure Remote Desktop
    •    Configure Remote Assistance
    •    Modifying Using MMC or PS
    •    Configure Remote PowerShell
    •    Remote Management Settings-Demo
    •    Allow through Windows Firewall-Demo
    •    Remote Desktop-Demo
    •    Remote Assistance-Demo
    •    Remote with MMC-Demo
    •    Windows PowerShell Remoting-Demo
    Module 11 : Configure Updates
    •    Module 11 Workbook
    •    Configure Update Windows 10
    •    Manage Update History
    •    Roll Back Updates
    •    Implement Insider Preview CB CBB and LTSB
    •    Update Windows Store Apps
    •    Windows Update Options-Demo
    •    Update History-Demo
    •    Rolling Back Updates-Demo
    •    Update Windows Store apps-Demo
    Module 12 : Monitor Windows
    •    Module 12 Workbook
    •    Monitor Windows
    •    Configure Event Subscriptions
    •    Monitor Performance Using Task Manager
    •    Monitor System
    •    Monitor and Manage Printers
    •    Monitor Performance Using Performance Monitor Data Collectors
    •    Monitor and Manage Printers
    •    Configure Indexing Options
    •    Manage Client Security by Using Windows Defender
    •    Evaluate System Stability by Using Reliaability Monitor
    •    Troubleshoot Performance Issues
    •    Manage Security Using Windows Defender Security Center
    •    Configure Windows Defender Advanced Threat Detection
    •    Event Viewer-Demo
    •    Creating Event Subscriptions-Demo
    •    Task Manager-Demo
    •    Performance Monitor-Demo
    •    Resource Monitor-Demo
    •    Managing the Printers with Print Management-Demo
    •    Indexing-Demo
    •    Windows Defender-Demo
    •    Reliability Monitor-Demo
    Module 13 : Configure System and Data Recovery
    •    Module 13 Workbook
    •    Configure System and Data Recovery
    •    Configure System Restore
    •    Configure Restore Points
    •    Peform a Refresh or Recycle
    •    Restore Previous Versions of Files and Folders
    •    Configure File History
    •    Recover Files from OneDrive
    •    Use Windows Backup and Restore
    •    Perform a Backup and Restore with WBAdmin
    •    Perform Recovery Operations Windows Recovery
    •    Configure a Recovery Drive-Demo
    •    Configure System Restore-Demo
    •    Configure Restore Points-Demo
    •    Performing a Refresh or Recycle-Demo
    •    Configure File History-Demo
    •    Use Windows Backup & Restore-Demo
    Module 14 : Configure Authorization and Authentication
    •    Module 14 Workbook
    •    Configure Authorization and Authentication
    •    Configure Pictures Passwords and Biometrics
    •    Configure Workgroups
    •    Configure Domain Settings
    •    Configue Homegroup Settings
    •    Configure Credential Manager
    •    Configure Local Accounts
    •    Configure Microsoft Accounts
    •    Configure Device Registration
    •    Configure Windows Hello for Business
    •    Configure Device Guard
    •    Credential Guard
    •    Configure Device Health Attestation
    •    Configure UAC Behavior
    •    Configure Dynamic Look
    •    Picture Passwords-Demo
    •    Workgroups-Demo
    •    Domains-Demo
    •    Credential Manager-Demo
    •    Configure Local Accounts-Demo
    •    Dynamic Lock-Demo
    Module 15 : Configure Advanced Management Tools
    •    Module 15 Workbook
    •    Configure Advanced Management Tools
    •    Configure Device Manager
    •    Configure and use the MMC
    •    Configure Task Schedule
    •    Configure Automation of Mgmt Task Using Windows PowerShell
    •    Convert Group Policy Objects to MDM Policies using the MDM
    •    Services-Demo
    •    Using the MMC-Demo
    •    Task Scheduler-Demo
    •    Opening PowerShell and the Integrated Scripting Environment-Demo

    Windows 10 Power User (How to use Windows 10) Course Outline

    Module 1: Getting Started With Windows 10
    •    Introduction
    •    First Steps
    •    Navigating The Desktop
    •    Using Cortana To Search
    Module 2: Using File Explorer
    •    File Explorer
    •    Understanding File And Folder Basics
    •    Work With Libraries
    •    Creating A Home Group
    Module 3: Using Windows Applications
    •    Opening And Using Applications
    •    Installing New Applications From The Windows Store
    •    Using Default Applications
    Module 4: Browsing the Web With Microsoft Edge
    •    Examining The Edge Window
    •    Searching The Web With Edge
    •    Bookmarking Important Sites
    •    Using The Reading List
    •    Marking A Page With Web Notes
    •    Conclusion
    Module 5: Customizing Windows
    •    Introduction
    •    Customizing The Display
    •    Customizing File Explorer
    •    Configuring Cortanas Notebook Feature
    •    Customizing Privacy Settings
    •    Customizing Microsoft Edge
    Module 6: Connecting Devices And Devices
    •    Connecting Printers
    •    Connecting And Using A Flash Drive
    •    Connect A Phone
    Module 7: Managing User Accounts
    •    Create Additional Users
    •    Understanding User Profiles
    •    Sharing Data Between Profiles
    Module 8: Backing Up Important Data
    •    Using File History
    •    Using Windows Backup
    •    Using System Restore
    Module 9: Maintaining Windows
    •    Windows Updates
    •    Working With The Action Center
    •    Using Disk Defragmenter
    •    Managing Storage And Apps Using Settings
    •    Conclusion
    Module 10: Protecting Windows
    •    Introduction
    •    Using Windows Defender
    •    Using Windows Firewall
    •    Using Bit Locker
    •    Windows Hello
    Module 11: Monitoring Performance
    •    Using Task Manager
    •    Using Resource Monitor
    Module 12: Working With Control Panel And Settings
    •    Control Panel Part 1
    •    Control Panel Part 2
    •    Settings App
    •    Using Device Manager
    •    Using Remote Desktop
    •    Conclusion
    ITU Learning Management System Image