The Computer Hardware A+ course is the first step of your professional IT Career. IT’s the ideal foundation course to get started on a career working with Computer Hardware, Operating System, Data Security, and Basic Networking on Desktop, Laptop, Tablets, Mobile device and many more. This course provides strong foundation on Core Hardware, Operating System (Windows, Linux, Apple and Android Platform), Printer, Security issue and Essential Networking installation, configuration, maintenance & computer assembling. This course is design based on latest industry trend to build a successful career to become an IT Support Engineer, Desktop Support Engineer, Computer Hardware Engineer, Help Desk Support Engineer etc.
INTRODUCTION TO PC
- Computer Hardware and Software
- PC Components and Peripheral
- Input, Output and Processing Devices
UNDERSTANDING NUMBER SYSTEM
- Binary, Decimal, Hexadecimal and Octal
UNDERSTANDING LOGIC GATES
- Digital Signal, Electronics Components
- Circuit and Logic Gates
POWER SUPPLY
UNDERSTANDING MOTHERBOARD
- Motherboard Components and Form Factor (sizes)
- Busses, Expansion Slots and Chipsets
UNDERSTANDING BIOS
- BIOS vs CMOS
- BIOS Components and BIOS Configuration
- Flashing BIOS, UEFI
UNDERSTANDING MEMORY
- Memory Classification
- Volatile vs Non-Volatile
- Types of RAM and ROM
UNDERSTANDING CPU
- 32-bit vs 64-bit, CPU Cores and CPU Cache
- Hyper-Threading and Virtualization Support
- CPU Cooling System
COMPARING STORAGE DEVICES
- Hard Disk Components
- Type of Hard Drive
- IDE, EIDE, ATA, PATA, SATA, SCSI and SSD
- Hard Disk Cables and Connectors
- Optical Discs and Drive
- CD, DVD, Blue-ray
EXPLORING PERIPHERALS AND EXPANSION
- Peripherals and Device Drivers
- Input and Output Devices
- Expansion Cards
EXPLORING VIDEO AND DISPLAY DEVICES
- Display Devices – CRT, LCD and LED
- Connector Types – VGA, HDMI and DVI
EXPLORING PRINTERS
- Type of Printers – Inkjet, Thermal, Impact and Laser
- Printers Components
- Print Spooler
WORKING WITH LAPTOP
- Common Laptop Feature
- Conserving Power
- Laptop Hardware Component
UNDERSTANDING MOBILE DEVICES
- Tablets vs. Laptops, Accelerometers and Gyroscopes
- Comparing Operating Systems and Connectivity
WORKING WITH CUSTOMERS
- Communication and Professionalism
- Identify the Problem and Customer Needs
- Workstation Design
INTRODUCING WINDOWS OPERATING SYSTEMS
- Comparing 32bit vs 64 bit
- Windows Versions and Editions
INSTALL AND UPDATING WINDOWS OPERATING SYSTEMS
- Clean Install, Dual Boot, Upgrade and Migrate
USING WINDOWS OPERATING SYSTEMS
- Exploring Windows Features and Management Tools
USING COMMAND PROMPT
- Internal and External Commands Line
- Creating Batch file
CONFIGURING WINDOWS OPERATING SYSTEMS
- Device Manager
- System Protection and System Restore
- Backup and Restore
UNDERSTANDING DISK AND FILE SYSTEM
- Disk, Partition and Volume
- Static Disk vs Dynamic Disk
- Dynamic Disk and RAID
- File System – FAT, NTFS and CDFS
- Disk Management Tools
TROUBLESHOOTING WINDOWS OPERATING SYSTEM
- The Boot Process and Advance Boot Option
- Windows Troubleshooting Tools
INTRODUCING NETWORKING COMPONENTS
- Type of Network – LAN, CAN, MAN and WAN
- Network Hardware Components – NIC, HUB
- Bridge, Switch, Router, Modem
- Workgroup vs. Domain
- Internet Connection
EXPLORING CABLES AND CONNECTIVITY
- Network Cables – Coaxial, Copper and Fiber Optic
- Connector – RJ45, RJ11, BNC
- Network Topology
UNDERSTANDING PROTOCOLS
- Common TCP/IP Protocols and Ports
COMPARING IPV4 AND IPV6
- IPv4 Classes, Private vs. Public
- Unicast, Multicast and Broadcast
- IPv6
NETWORK SECURITY DEVICES
- Firewall, DMZ, Port Forwarding
- Proxy Server and QoS
EXPLORING WIRELESS NETWORKING
- Access Point and Wireless Router
- Configure Wireless
CONNECTING AND TROUBLESHOOTING A NETWORK
- Installing and Configuring Network
- Troubleshooting Tools
UNDERSTANDING IT SECURITY
- User and Group
- Local vs. Administrator Users
- Authentication and Authorization
- NTFS security and Local Security Policy
- Bit Locker and Parental Control
RECOGNIZING MALWARE AND OTHER THREATS
- Malware, Virus, Warms and Spyware
- Antivirus Software
NETWORKING (N+)
Networking N+ is the foundation course to develop your skill in TCP/ IP Network, to implement TCP/IP data network you must be learn Media & Topology, Network Devices – Hub, Switch, Router, Access Point, IP Addressing (IPV4 and IPV6), and Networking Service such as DNS, DHCP, HTTP, HTTPS, FTP, Telnet, SSH, Active Directory Domain Service and so on. Networking is one of the best career opportunities in Information Technology, this program helps to achieve your dream career in IT Networking. Networking N+ is the prerequisite or recommended for higher level networking certification such CCNA, MCSE, RHCE, CEH, Cloud Computing and many more. Successfully completion of Networking N+ you act as a Network Technician, LAN Installer and Network Support Engineer.
INTRODUCTION
- An Overview of CompTIA N10-006 Network+
- Section 1: Network Architecture
NETWORK DEVICES
- Common Network Devices
- Intrusion Detection and Prevention Systems
- Content Filters | Load Balancers
- Packet Shapers | VPN Concentrators
REMOTE ACCESS
- VPN Connections | VPN Protocols
- TACACS and RADIUS | Remote Access Services
- Web Services | Unified Voice Services
- Wireless LAN Controllers
- Cloud Technologies
NETWORK SERVICES
- DHCP Addressing Overview | DHCP Reservations
- DHCP Scopes | DHCP Leases | DHCP Options
- An Overview of DNS | DNS Records | Dynamic DNS
- Proxy Servers | Understanding Network Address Translation
NETWORK SERVICES
- SONET, DWDM, and CWDM | ATM, Frame Relay, and MPLS
- Satellite, ISDN, Cable, DSL, and Dialup (8:54) | PPP and Multilink PPP
- GSM, CDMA, and WiMAX | Leased Lines and Metro Ethernet
- Circuit Switching and Packet Switching
CABLE TYPES
- Copper Connectors | Copper Cabling
- Straight-Through, Crossover, and Rollover Cables
- Fiber Connectors | Fiber Cables
- Media Converters | Network Cabling Tools
NETWORK TOPOLOGIES
- Common Network Topologies
NETWORK INFRASTRUCTURES
NETWORK ADDRESSING
- Binary Math | An Overview of IPv6
- IPv6 Address Configuration | IPv6 Interoperability
- IPv4 Classes | Classless Inter-Domain Routing
- IPv4 Addresses and Subnetting | APIPA
- Unicast, Multicast, and Broadcast
- Broadcast Domains and Collision Domains
ROUTING
- Routing Tables | Route Aggregation and Distribution
- Routing Metrics | Static and Dynamic Routing
- Link State, Distance Vector, and Hybrid Routing
- IGP and EGP | High Availability
UNIFIED COMMUNICATIONS
- Unified Communication Technologies
CLOUD AND VIRTUALIZATION TECHNOLOGIES
- Virtualization | Storage Area Networks
IMPLEMENTING NETWORKS
- Implementing a Basic Network
- Section 2: Network Operations
MONITORING THE NETWORK
- Using Protocol Analyzers | Network Monitoring Tools
- SIEM | Environmental Monitoring Tools
- Wireless Tools
METRICS AND REPORTING
- Baselines and Bottlenecks | Log Management and Graphing
- Utilization Statistics | Interface Monitoring
CONFIGURATION MANAGEMENT
- Configuration Management
- On-Boarding and Off-Boarding Mobile Devices
- Network Access Control | Documenting the Network
NETWORK SEGMENTATION
PATCHES AND UPDATES
SWITCH CONFIGURATION
- Configuring VLANs | Spanning Tree Protocol
- Switch Interface Configuration | Power Over Ethernet
- Switch Management
WIRELESS NETWORKS
- Wireless Network Devices | Wireless Connections
- Wireless Antenna Technologies | Using Wireless Networks
- Section 3: Network Security
RISK
- Business Risk | Single Point of Failure
- Vulnerability Scanning | Penetration Testing
VULNERABILITIES AND THREATS
- Denial of Service | Wireless Network Attacks
- Wireless Protocol Attacks | Brute Force Attacks
- Session Hijacking | Social Engineering
- Man in the Middle Attacks | VLAN Hopping
- Compromised Systems | Insider Threats
- Zero-Day Attacks | Operating System Vulnerabilities
NETWORK HARDENING
- Anti-Malware Software | Switch Port Security
- Security Policies | Disabling Unneeded Services
- Using Secure Protocols | Access Lists
- Wireless Security | User Authentication
- Hashing
PHYSICAL SECURITY CONTROLS
- Physical Security Controls
FIREWALLS
- Firewalls | Firewall Configurations
NETWORK ACCESS CONTROL
- Network Access Control Models
FORENSICS
- Basic Forensic Concepts
- Section 4: Troubleshooting
NETWORK TROUBLESHOOTING METHODOLOGY
- Network Troubleshooting Methodology
TROUBLESHOOTING TOOLS
- Command Line Tools | Physical Testing Tools
- Web-based Troubleshooting Tools | Protocol Analyzers
WIRELESS ISSUES
- Troubleshooting Wireless Signals | Troubleshooting Wireless Configurations
COPPER CABLE ISSUES
- Troubleshooting Copper Cables | Troubleshooting Signal Loss
- Troubleshooting Network Cabling
FIBER ISSUES
- Troubleshooting Fiber Issues
NETWORK ISSUES
- Troubleshooting IP Configurations
- Troubleshooting DNS and DHCP
- Troubleshooting Broadcast Storms and Switching Loops
- Troubleshooting Interface Configurations
- Troubleshooting VLAN Assignments
- Troubleshooting Network Connectivity
- Troubleshooting Mismatched MTUs
- Troubleshooting NIC Teaming