This course is a five day, ten lesson multiple topic course and includes both theoretical and lab based tasks.
Lesson 1: Supporting Operating Systems
In this lesson we learn about installing, configuring, maintaining, and troubleshooting personal computer operating systems.
-
Topic A - Identifying Common Operating Systems
-
Topic B - Use Windows Features and Tools
-
Topic C - Manage Files in Windows
-
Topic D - Manage Disks in Windows
-
Topic E - Manage Devices in Windows
Lesson 2: Installing, Configuring, and Maintaining Operating Systems
In this lesson, we examine some of the other popular operating systems, we also look at the installation and upgrade of operating systems
-
Topic A - Configure and use Linux
-
Topic B - Configure and use MacOS
-
Topic C - Install and Upgrade Operating Systems
-
Topic D - Maintain Operating Systems
Lesson 3: Maintaining and Troubleshooting Microsoft Windows
In this lesson, we look at using various tools and features to install and configure devices and software within the Windows operating system.
-
Topic A - Install and Manage Windows Applications
-
Topic B - Manage Windows Performance
-
Topic C - Troubleshoot Windows
Lesson 4: Configuring and Troubleshooting Networks
In this lesson, we look at installing, configuring, and troubleshooting network connectivity within an operating system.
-
Topic A - Configyre Network Connection Settings
-
Topic B - Install and Configure SOHO networks
-
Topic C - Configure SOHO Network Security
-
Topic D - Configure Remote Access
-
Topic E - Troubleshoot Network Connections
Lesson 5: Managing Users, Workstations, and Shared Resources
In this lesson, we will cover creating, and managing the security principals used for authentication to an operating system.
-
Topic A - Manage Users
-
Topic B - Configure Shared Resources
-
Topic C - Configure Active Directory Accounts and Policies
Lesson 6: Security Concepts
In this lesson, we cover the duties involved in protecting organisational computing assets from attacks, we will identify security threats and vulnerabilities,
-
Topic A - Logical Security Concepts
-
Topic B - Threats and Vunerabilities
-
Topic C - Physical Security Measures
Lesson 7: Securing Workstations and Data
In this lesson, we cover sources of vulnerabilities and weaknesses, we then look at methods to protect the organisational data.
-
Topic A - Implement Security Best Practices
-
Topic B - Implement Data Protection Policies
-
Topic C - Protect Data During an Incident Response
Lesson 8: Troubleshooting Workstation Security Issues
In this lesson, we look at securing user accounts and also installing antivirus software, updating with patches, and encrypting data.
-
Topic A - Detect, Remove, and Prevent Malware
-
Topic B - Troubleshoot Common Workstation Security Issues
Lesson 9: Supporting and Troubleshooting Mobile Devices
In this lesson, we look at the skills required to support the mobile devices in an organisation
-
Topic A - Secure Mobile Devices
-
Topic B - Troubleshoot Mobile Device Issues
Lesson 10: Implementing Operational Procedures
In this lesson, we look at the soft skills and some automation skills required in order to become professional IT support technicians
-
Topic A - Use Appropriate Safety Procedures
-
Topic B - Environmental Impacts and Controls
-
Topic C - Create and Maintain Documentation
-
Topic D - Use Basic Change Management Best Practices
-
Topic E - Implement Disaster Prevention and Recovery Methods
-
Topic F - Basic Scripting Concepts
-
Topic G - Professionalism and Communication