Curriculum
- 4 Sections
- 42 Lessons
- 365 Days
Expand all sectionsCollapse all sections
- 1.0 Operating Systems17
- 1.1Identify basic features of Microsoft Windows editions33 Minutes
- 1.2Given a scenario, use the appropriate Microsoft command-line tool – Part 1.29 Minutes
- 1.3Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) – Part 1.25 Minutes
- 1.4Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility.42 Minutes
- 1.5Given a scenario, use the appropriate Windows settings.17 Minutes
- 1.6Given a scenario, configure Microsoft Windows networking features on a client/desktop.59 Minutes
- 1.7Given a scenario, apply application installation and configuration concepts.23 Minutes
- 1.8Explain common OS types and their purposes25 Minutes
- 1.9Given a scenario, perform OS installations and upgrades in a diverse OS environment.35 Minutes
- 1.10Identify common features and tools of the macOS/desktop OS.27 Minutes
- 1.11Identify common features and tools of the Linux client/desktop OS Part 1.67 Minutes
- 1.12Given a scenario, use the appropriate Microsoft command-line tool – Part 2.28 Minutes
- 1.13Given a scenario, use the appropriate Microsoft command-line tool – Part 3.35 Minutes
- 1.14Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) – Part 2.35 Minutes
- 1.15Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) – Part 3.21 Minutes
- 1.16Identify common features and tools of the Linux client/desktop OS Part 2.10 Minutes
- 1.17Given a scenario, use the appropriate Microsoft command-line tool – Part 4.30 Minutes
- 2.0 Security11
- 2.1Summarize various security measures and their purposes Part 1.33 Minutes
- 2.2Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods.26 Minutes
- 2.3Explain common social-engineering attacks, threats, and vulnerabilities.73 Minutes
- 2.4Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.50 Minutes
- 2.5Given a scenario, configure a workstation to meet best practices for security.19 Minutes
- 2.6Explain common methods for securing mobile and embedded devices.16 Minutes
- 2.7Given a scenario, use common data destruction and disposal methods.13 Minutes
- 2.8Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.29 Minutes
- 2.9Given a scenario, install and configure browsers and relevant security settings.21 Minutes
- 2.10Compare and contrast wireless security protocols and authentication methods20 Minutes
- 2.11Summarize various security measures and their purposes Part 2.45 Minutes
- 3.0 Software Troubleshooting5
- 3.1Given a scenario, troubleshoot common Windows OS problems.47 Minutes
- 3.2Given a scenario, troubleshoot common personal computer (PC) security issues.15 Minutes
- 3.3Given a scenario, use best practice procedures for malware removal.13 Minutes
- 3.4Given a scenario, troubleshoot common mobile OS and application issues.16 Minutes
- 3.5Given a scenario, troubleshoot common mobile OS and application security issues.18 Minutes
- 4.0 Operational Procedures9
- 4.1Given a scenario, implement best practices associated with documentation and support systems information management.36 Minutes
- 4.2Explain basic change-management best practices.15 Minutes
- 4.3Given a scenario, implement workstation backup and recovery methods.18 Minutes
- 4.4Given a scenario, use common safety procedures.16 Minutes
- 4.5Summarize environmental impacts and local environmental controls.17 Minutes
- 4.6Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.26 Minutes
- 4.7Given a scenario, use proper communication techniques and professionalism.28 Minutes
- 4.8Identify the basics of scripting.18 Minutes
- 4.9Given a scenario, use remote access technologies25 Minutes
Given a scenario, use the appropriate Microsoft command-line tool – Part 1.
Next