Chapter 1 Introduction to Personal Computer Hardware
Introduction to Personal Computers (1.0)
What Is in a Computer? (1.1.1)
Electrical and ESD Safety (1.1.2)
Case and Power Supplies (1.2.1)
Power Supply Voltage (1.2.1.4)
Motherboard Components (1.2.2.2)
Motherboard Form Factors (1.2.2.4)
CPUs and Cooling Systems (1.2.3)
Adapter Cards and Expansion Slots (1.2.5)
Hard Disk Drives and SSDs (1.2.6)
Types of Storage Devices (1.2.6.1)
Storage Device Interfaces (1.2.6.2)
Magnetic Media Storage (1.2.6.3)
Semiconductor Storage (1.2.6.4)
Optical Storage Devices (1.2.7)
Types of Optical Storage Devices (1.2.7.1)
Ports, Cables, and Adapters (1.2.8)
Video Ports and Cables (1.2.8.1)
Other Ports and Cables (1.2.8.2)
Adapters and Converters (1.2.8.3)
The Original Input Devices (1.2.9.1)
More New Input Devices (1.2.9.3)
Most Recent Input Devices (1.2.9.4)
What Are Output Devices? (1.2.10.1)
Monitors and Projectors (1.2.10.2)
Speakers and Headphones (1.2.10.5)
The Technician’s Toolkit (1.3.1)
Check Your Understanding Questions
Introduction to PC Assembly (2.0)
General and Fire Safety (2.1.1)
Open the Case and Connect the Power Supply (2.1.2)
Select the Case and Fans (2.1.2.3)
Select a Power Supply (2.1.2.4)
Install the Motherboard Components (2.1.3)
Select the Motherboard (2.1.3.7)
Select the CPU and CPU Cooling (2.1.3.8)
Install Internal Drives (2.1.4)
Select Optical Drives (2.1.4.3)
Install the Hard Drive (2.1.4.4)
Install the Optical Drive (2.1.4.5)
Install the Adapter Cards (2.1.5)
Select Adapter Cards (2.1.5.2)
Other Factors for Adapter Card Selection (2.1.5.3)
Install the Adapter Cards (2.1.5.4)
Select Additional Storage (2.1.6)
Select a Media Reader (2.1.6.1)
Select External Storage (2.1.6.2)
Install the Front Panel Cables (2.1.7.6)
Check Your Understanding Questions
Chapter 3 Advanced Computer Hardware
Introduction to Advanced Computer Hardware (3.0)
POST, BIOS, CMOS, and UEFI (3.1.1)
BIOS/UEFI Configuration (3.1.2)
BIOS and UEFI Security (3.1.2.2)
Power Supply Voltage Setting (3.2.1.2)
Power Fluctuation and Protection (3.2.2)
Power Fluctuation Types (3.2.2.1)
Power Protection Devices (3.2.2.2)
Advanced Computer Functionality (3.3)
CPU Architectures and Operation (3.3.1)
Enhancing CPU Operation (3.3.1.2)
Multicore Processors (3.3.1.3)
CPU Cooling Mechanisms (3.3.1.4)
What Do You Already Know? - RAID (3.3.2.1)
Ports, Connectors, and Cables (3.3.3)
Video and Graphic Ports (3.3.3.2)
USB Cables and Connectors (3.3.3.3)
SATA Cables and Connectors (3.3.3.4)
Twisted Pair Cables and Connectors (3.3.3.5)
Coax Cables and Connectors (3.3.3.6)
SCSI and IDE Cables and Connectors (3.3.3.7)
Monitor Characteristics (3.3.4.1)
Using Multiple Monitors (3.3.4.4)
Upgrade Computer Hardware (3.4.1)
Steps to Upgrade a Motherboard (3.4.1.2)
Storage Device Upgrade (3.4.1.4)
Power Supply Upgrade (3.4.1.6)
Configurations for Specialized Computers (3.4.2)
What Do You Already Know? - Configure a CAx Workstation (3.4.2.1)
What Do You Already Know? - Configure an Audio Video Editing Workstation (3.4.2.2)
What Do You Already Know? - Configure a Virtualization Workstation (3.4.2.3)
What Do You Already Know? - Configure a Gaming PC (3.4.2.4)
Thick and Thin Clients (3.4.2.6)
Protecting the Environment (3.5)
Safe Disposal of Equipment and Supplies (3.5.1)
Safe Disposal Methods (3.5.1.1)
Check Your Understanding Questions
Chapter 4 Preventive Maintenance and Troubleshooting
PC Preventive Maintenance Overview (4.1.1)
Benefits to Preventive Maintenance (4.1.1.1)
Preventive Maintenance - Dust (4.1.1.2)
Preventive Maintenance - Internal Components (4.1.1.3)
Preventive Maintenance - Environmental Concerns (4.1.1.4)
Preventive Maintenance - Software (4.1.1.5)
Troubleshooting Process Steps (4.2.1)
Introduction to Troubleshooting (4.2.1.1)
Troubleshooting Process Steps (4.2.1.2)
Identify the Problem (4.2.1.3)
Establish a Theory of Probable Cause (4.2.1.5)
Test the Theory to Determine the Cause (4.2.1.6)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (4.2.1.7)
Verify Full Functionality and, if Applicable, Implement Preventive Measures (4.2.1.8)
Document Findings, Actions, and Outcomes (4.2.1.9)
Common Problems and Solutions for PCs (4.2.2)
PC Common Problems and Solutions (4.2.2.1)
Common Problems and Solutions for Storage Devices (4.2.2.2)
Common Problems and Solutions for Motherboards and Internal Components (4.2.2.3)
Common Problems and Solutions for Power Supplies (4.2.2.4)
Common Problems and Solutions for CPUs and Memory (4.2.2.5)
Common Problems and Solutions for Displays (4.2.2.6)
Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3)
Personal Reference Tools (4.2.3.1)
Internet Reference Tools (4.2.3.2)
Advanced Problems and Solutions for Hardware (4.2.3.4)
Check Your Understanding Questions
Network Components and Types (5.1)
Network Topologies and Description (5.1.1.2)
Internet Connection Types (5.1.2)
Brief History of Connection Technologies (5.1.2.1)
DSL, Cable, and Fiber (5.1.2.2)
Line of Sight Wireless Internet Service (5.1.2.3)
Mobile Hotspot and Tethering (5.1.2.6)
Networking Protocols, Standards, and Services (5.2)
Transport Layer Protocols (5.2.1)
Application Port Numbers (5.2.2)
Classify Application Port Numbers (5.2.2.2)
Bluetooth, NFC, and RFID (5.2.3.2)
Cellular Generations (5.2.3.4)
Client - Server Roles (5.2.4.2)
Authentication Server (5.2.4.10)
Network Interface Card (5.3.1.2)
Repeaters, Bridges, and Hubs (5.3.1.3)
Wireless Access Points (5.3.1.5)
Endpoint Management Server (5.3.2.5)
Legacy and Embedded Systems (5.3.3.1)
Power over Ethernet and Ethernet over Power (5.3.3.3)
Cloud-Based Network Controller (5.3.3.4)
Network Tools and Descriptions (5.4.1.2)
Copper Cables and Connectors (5.4.2)
Twisted-Pair Category Ratings (5.4.2.4)
Twisted-Pair Wire Schemes (5.4.2.5)
Fiber Cables and Connectors (5.4.3)
Types of Fiber Media (5.4.3.2)
Fiber-Optic Connectors (5.4.3.3)
Check Your Understanding Questions
Device to Network Connection (6.1)
Two Network Addresses (6.1.1.4)
Displaying the Addresses (6.1.1.5)
IPv6 Address Formats (6.1.1.7)
Link-Local IPv4 and IPv6 Addresses (6.1.1.10)
Installing and Updating a NIC (6.1.2.4)
Configure a Wired and Wireless Network (6.1.3)
Connecting Wired Devices to the Internet (6.1.3.2)
Logging in to the Router (6.1.3.3)
Basic Wireless Settings (6.1.3.5)
Configure a Wireless Mesh Network (6.1.3.6)
MAC Address Filtering (6.1.4.5)
Whitelisting and Blacklisting (6.1.4.6)
IoT Device Configuration (6.1.5)
IoT Devices in Packet Tracer (6.1.5.2)
Basic Troubleshooting Process for Networks (6.2)
Applying the Troubleshooting Process to Networks (6.2.1)
The Six Steps of the Troubleshooting Process (6.2.1.1)
Identify the Problem (6.2.1.2)
Establish a Theory of Probable Cause (6.2.1.3)
Test the Theory to Determine the Cause (6.2.1.4)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (6.2.1.5)
Verify Full Functionality and, if Applicable, Implement Preventive Measures (6.2.1.6)
Document Findings, Actions, and Outcomes (6.2.1.7)
Network Problems and Solutions (6.2.2)
Common Problems and Solutions for Networking (6.2.2.1)
Advanced Problems and Solutions for Network Connections (6.2.2.2)
Advanced Problems and Solutions for FTP and Secure Internet Connections (6.2.2.3)
Advanced Problems and Solutions Using Network Tools (6.2.2.4)
Check Your Understanding Questions
Chapter 7 Laptops and Other Mobile Devices
Characteristics of Laptops and Other Mobile Devices (7.1)
Mobile Device Overview (7.1.1)
What Do You Already Know? - Mobile Devices (7.1.1.1)
Smartphone Characteristics (7.1.1.4)
Tablets and E-readers (7.1.1.6)
Wearables: Smartwatches and Fitness Trackers (7.1.1.7)
Wearables: Augmented and Virtual Realities (7.1.1.8)
Special Function Keys (7.1.2.6)
Laptop Display Components (7.1.3)
LCD, LED, and OLED Displays (7.1.3.1)
Laptop Display Features (7.1.3.2)
Backlights and Inverters (7.1.3.3)
Wi-Fi Antenna Connectors (7.1.3.5)
Webcam and Microphone (7.1.3.6)
Power Settings Configuration (7.2.1)
Managing ACPI Settings in the BIOS (7.2.1.2)
Wireless Configuration (7.2.2)
Bluetooth Laptop Connections (7.2.2.2)
Laptop Hardware and Component Installation and Configuration (7.3)
Replacing Laptop Components (7.3.2)
Overview of Hardware Replacement (7.3.2.1)
Internal Storage and Optical Drive (7.3.2.8)
Other Mobile Device Hardware Overview (7.4)
Other Mobile Device Hardware (7.4.1)
Wireless Connections and Shared Internet Connections (7.4.1.3)
Specialty Mobile Devices (7.4.2)
Network Connectivity and Email (7.5)
Wireless and Cellular Data Networks (7.5.1)
Wireless Data Networks (7.5.1.1)
Cellular Communication Standards (7.5.1.3)
Bluetooth for Mobile Devices (7.5.2.1)
Introduction to Email (7.5.3.1)
Android Email Configuration (7.5.3.3)
iOS Email Configuration (7.5.3.4)
Mobile Device Synchronization (7.5.4)
Types of Data to Synchronize (7.5.4.1)
Enabling Synchronization (7.5.4.2)
Synchronization Connection Types (7.5.4.3)
Preventive Maintenance for Laptops and Other Mobile Devices (7.6)
Scheduled Maintenance for Laptops and Other Mobile Devices (7.6.1)
What Do You Already Know? - Preventive Maintenance (7.6.1.1)
The Reason for Maintenance (7.6.1.2)
Laptop Preventive Maintenance Program (7.6.1.3)
Mobile Device Preventive Maintenance Program (7.6.1.4)
Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7)
Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1)
The Troubleshooting Process (7.7.1.1)
Identify the Problem (7.7.1.2)
Establish a Theory of Probable Cause (7.7.1.3)
Test the Theory to Determine Cause (7.7.1.4)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (7.7.1.5)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (7.7.1.6)
Document Findings, Actions, and Outcomes (7.7.1.7)
Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2)
Identify Common Problems and Solutions (7.7.2.1)
Common Problems and Solutions for Laptops (7.7.2.2)
Common Problems and Solutions for Other Mobile Devices (7.7.2.3)
Check Your Understanding Questions
Characteristics and Capabilities (8.1.1)
Characteristics of Printers (8.1.1.1)
Printer Speed, Quality, and Color (8.1.1.2)
Reliability and Total Cost of Ownership (8.1.1.3)
Automatic Document Feeder (8.1.1.4)
Printer Connection Types (8.1.2.1)
Inkjet Printer Characteristics (8.2.1.1)
Inkjet Printer Parts (8.2.1.2)
Laser Printer Characteristics (8.2.2.1)
Laser Printing Process (8.2.3)
How Laser Printing Works (8.2.3.1)
Thermal Printers and Impact Printers (8.2.4)
Thermal Printer Characteristics (8.2.4.1)
Impact Printer Characteristics (8.2.4.2)
Virtual Printer Characteristics (8.2.5.1)
3D Printer Characteristics (8.2.6.1)
Installing and Configuring Printers (8.3)
Installing and Updating a Printer (8.3.1)
Installing a Printer (8.3.1.1)
Test Printer Functions (8.3.1.2)
Configuring Options and Default Settings (8.3.2)
Common Configuration Settings (8.3.2.1)
Optimizing Printer Performance (8.3.3)
Software Optimization (8.3.3.1)
Hardware Optimization (8.3.3.2)
Operating System Settings for Sharing Printers (8.4.1)
Configuring Printer Sharing (8.4.1.1)
Wireless Printer Connections (8.4.1.2)
Purposes of Print Servers (8.4.2.1)
Software Print Servers (8.4.2.2)
Hardware Print Servers (8.4.2.3)
Dedicated Print Servers (8.4.2.4)
Maintaining and Troubleshooting Printers (8.5)
Printer Preventive Maintenance (8.5.1)
What Do You Already Know? - Printer Operating Environment (8.5.1.2)
Inkjet Printer Preventive Maintenance (8.5.2)
Laser Printer Preventive Maintenance (8.5.3)
Thermal Printer Preventive Maintenance (8.5.4)
Preventive Maintenance on a Thermal Printer (8.5.4.1)
Impact Printer Preventive Maintenance (8.5.5)
Preventive Maintenance of an Impact Printer (8.5.5.1)
3D Printer Preventive Maintenance (8.5.6)
Applying the Troubleshooting Process to Printers (8.5.7)
The Six Steps of the Troubleshooting Process (8.5.7.1)
Identify the Problem (8.5.7.2)
Establish a Theory of Probable Cause (8.5.7.3)
Test the Theory to Determine Cause (8.5.7.4)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (8.5.7.5)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (8.5.7.6)
Document Findings, Actions, and Outcomes (8.5.7.7)
Problems and Solutions (8.5.8)
Identify Printer Problems and Solutions (8.5.8.1)
Common Problems and Solutions for Printers (8.5.8.2)
Advanced Problems and Solutions for Printers (8.5.8.3)
Check Your Understanding Questions
Chapter 9 Virtualization and Cloud Computing
Cloud Computing and Virtualization (9.1.1.2)
Traditional Server Deployment (9.1.1.3)
Server Virtualization (9.1.1.4)
Advantages of Server Virtualization (9.1.1.5)
Client-Side Virtualization (9.1.2)
Client-Side Virtualization (9.1.2.1)
Type 1 and Type 2 Hypervisors (9.1.2.2)
Virtual Machine Requirements (9.1.2.3)
Cloud Computing Applications (9.2.1)
How We Use the Cloud (9.2.1.1)
What Do You Already Know? - Cloud Models (9.2.2.2)
Cloud Computing Characteristics (9.2.2.4)
Check Your Understanding Questions
Chapter 10 Windows Installation
Modern Operating Systems (10.1)
Operating System Features (10.1.1)
Basic Functions of an Operating System (10.1.1.2)
Windows Operating Systems (10.1.1.3)
Customer Requirements for an Operating System (10.1.2)
Compatible System Software and Hardware Requirements (10.1.2.1)
Minimum Hardware Requirements and Compatibility with OS (10.1.2.2)
32-bit vs. 64-bit Processor Architecture (10.1.2.3)
What Do You Already Know? - Choosing a Windows Edition (10.1.2.4)
Operating System Upgrades (10.1.3)
Checking OS Compatibility (10.1.3.1)
Windows OS Upgrades (10.1.3.2)
Storage Device Types (10.2.1.1)
Hard Drive Partitioning (10.2.1.2)
Partitions and Logical Drives (10.2.1.3)
Installation and Boot Sequence (10.3)
Basic Windows Installation (10.3.1)
Finalize the Installation (10.3.1.3)
Custom Installation Options (10.3.2)
Other Installation Methods (10.3.2.2)
Remote Network Installation (10.3.2.3)
Unattended Network Installation (10.3.2.4)
Windows Boot Sequence (10.3.3)
Windows Boot Sequence (10.3.3.1)
Windows 7 Startup Modes (10.3.3.2)
Windows 8 and 10 Startup Modes (10.3.3.3)
Check Your Understanding Questions
Chapter 11 Windows Configuration
Windows Desktop and File Explorer (11.1)
Comparing Windows Versions (11.1.1)
The Windows 7 Desktop (11.1.2.1)
The Windows 8 Desktop (11.1.2.2)
The Windows 8.1 Desktop (11.1.2.3)
Personalizing the Windows Desktop (11.1.2.4)
The Windows 10 Start Menu (11.1.2.6)
The Windows 8.1 and 8.0 Start Menu (11.1.2.7)
The Windows 7 Start Menu (11.1.2.8)
Windows 10 Task Manager Functions (11.1.3.2)
Task Manager in Windows 7 (11.1.3.3)
Windows File Explorer (11.1.4)
Run as Administrator (11.1.4.4)
Directory Structures (11.1.4.6)
User and System File Locations (11.1.4.7)
Configure Windows with Control Panels (11.2)
Control Panel Utilities (11.2.1)
Windows 10: Settings and Control Panels (11.2.1.1)
Introduction to Control Panel (11.2.1.2)
Control Panel Views (11.2.1.3)
Define Control Panel Categories (11.2.1.4)
User and Account Control Panel Items (11.2.2)
User Account Control Settings (11.2.2.2)
Network and Internet Control Panels (11.2.3)
Network and Sharing Center (11.2.3.3)
Display Settings and Control Panel (11.2.4)
Display Settings and Configuration (11.2.4.1)
Power and System Control Panels (11.2.5)
Power Options Settings (11.2.5.2)
Power Options Actions (11.2.5.3)
System Control Panel Item (11.2.5.5)
Increasing Performance (11.2.5.7)
Hardware and Sound Control Panels (11.2.6)
Devices and Printers (11.2.6.3)
Clock, Region, and Language (11.2.7)
Programs and Features Control Panels (11.2.8)
Windows Features and Updates (11.2.8.2)
BitLocker Drive Encryption (11.2.9.2)
File Explorer and Folder Options (11.2.9.3)
Administrative Tools Control Panel Item (11.3.1.1)
Computer Management (11.3.1.2)
Local Users and Groups (11.3.1.4)
Performance Monitor (11.3.1.5)
Component Services and Data Sources (11.3.1.6)
Windows Memory Diagnostics (11.3.1.10)
System Configuration (11.3.2.2)
Microsoft Management Console (11.3.2.5)
What Do You Already Know? - Disk Operations (11.3.3.1)
Disk Management Utility (11.3.3.2)
Disk Error-Checking (11.3.3.7)
Application Installation and Configuration (11.3.4)
System Requirements (11.3.4.1)
Installation Methods (11.3.4.2)
Installing an Application (11.3.4.3)
Uninstalling or Changing a Program (11.3.4.5)
Security Considerations (11.3.4.7)
File System CLI Commands (11.4.2)
Command Syntax Conventions (11.4.2.1)
File System Navigation (11.4.2.2)
File System Navigation - Commands (11.4.2.3)
Manipulating Folders - Commands (11.4.2.5)
Manipulating Files - Commands (11.4.2.6)
Disk Operations - Commands (11.4.3.1)
Task and System CLI Commands (11.4.4)
System CLI Commands (11.4.4.1)
Other Useful CLI Commands (11.4.5)
Other Useful Commands (11.4.5.1)
Running System Utilities (11.4.5.2)
Network Sharing and Mapping Drives (11.5.1)
Domain and Workgroup (11.5.1.1)
Network Shares and Mapping Drives (11.5.1.4)
Administrative Shares (11.5.1.5)
Sharing Local Resources with Others (11.5.2)
Sharing Local Resources (11.5.2.1)
Printer Sharing vs. Network Printer Mapping (11.5.2.2)
Configure a Wired Network Connection (11.5.3)
Configuring Wired Network Interfaces in Windows 10 (11.5.3.1)
Configuring a Wired NIC (11.5.3.2)
Setting a Network Profile (11.5.3.3)
Verify Connectivity with the Windows GUI (11.5.3.4)
Network CLI Commands (11.5.3.6)
Configure a Wireless Network Interface in Windows (11.5.4)
Remote Access Protocols (11.5.5)
VPN Access in Windows (11.5.5.1)
Remote Desktop and Assistance (11.5.6)
Common Preventive Maintenance Techniques for Operating Systems (11.6)
OS Preventive Maintenance Plan (11.6.1)
Preventive Maintenance Plan Contents (11.6.1.1)
Basic Troubleshooting Process for Windows Operating Systems (11.7)
Applying Troubleshooting Process to Windows Operating Systems (11.7.1)
The Six Steps of the Troubleshooting Process (11.7.1.1)
Identify the Problem (11.7.1.2)
Establish a Theory of Probable Cause (11.7.1.3)
Test the Theory to Determine the Cause (11.7.1.4)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (11.7.1.5)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (11.7.1.6)
Document Findings, Actions, and Outcomes (11.7.1.7)
Common Problems and Solutions for Windows Operating Systems (11.7.2)
Common Problems and Solutions for Windows Operating Systems (11.7.2.1)
Advanced Troubleshooting for Windows Operating Systems (11.7.3)
Advanced Problems and Solutions for Windows Operating Systems (11.7.3.1)
Check Your Understanding Questions
Chapter 12 Mobile, Linux, and macOS Operating Systems
Mobile Operating Systems (12.1)
Open Source vs. Closed Source (12.1.1.1)
Applications and Content Sources (12.1.1.2)
Android Touch Interface (12.1.2)
Common Mobile Device Features (12.1.4)
Virtual Private Network (12.1.4.7)
Methods for Securing Mobile Devices (12.2)
Screen Locks and Biometric Authentication (12.2.1)
What Do You Already Know? - Locks (12.2.1.1)
Restrictions on Failed Login Attempts (12.2.1.3)
Cloud-Enabled Services for Mobile Devices (12.2.2)
Locator Applications (12.2.2.2)
Remote Lock and Remote Wipe (12.2.2.3)
Rooting and Jailbreaking (12.2.3.2)
Patching and Updating Operating Systems (12.2.3.3)
Linux and macOS Operating Systems (12.3)
Linux and macOS Tools and Features (12.3.1)
Introduction to Linux and macOS Operating Systems (12.3.1.1)
Overview of Linux GUI (12.3.1.2)
Overview of macOS GUI (12.3.1.3)
Overview of Linux and macOS CLI (12.3.1.4)
Linux Backup and Recovery (12.3.1.5)
macOS Backup and Recovery (12.3.1.6)
Overview of Disk Utilities (12.3.1.7)
Linux and macOS Best Practices (12.3.2)
Operating System Updates (12.3.2.2)
The ls –l Command Output (12.3.3.3)
Basic Unix File and Directory Permissions (12.3.3.4)
Linux Administrative Commands (12.3.3.7)
Linux Administrative Commands Requiring Root Access (12.3.3.8)
Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4)
Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1)
The Six Steps of the Troubleshooting Process (12.4.1.1)
Identify the Problem (12.4.1.2)
Establish a Theory of Probable Cause (12.4.1.3)
Test the Theory to Determine the Cause (12.4.1.4)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (12.4.1.5)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12.4.1.6)
Document Findings, Actions, and Outcomes (12.4.1.7)
Common Problems and Solutions for Other Operating Systems (12.4.2)
Common Problems and Solutions for Mobile Operating Systems (12.4.2.1)
Common Problems and Solutions for Mobile OS Security (12.4.2.2)
Common Problems and Solutions for Linux and macOS Operating Systems (12.4.2.3)
Check Your Understanding Questions
What Do You Already Know? - Malware (13.1.1.2)
Viruses and Trojan Horses (13.1.1.3)
Anti-Malware Programs (13.1.2.1)
Signature File Updates (13.1.2.2)
Remediating Infected Systems (13.1.2.4)
Networks Are Targets (13.1.3.1)
Types of TCP/IP Attacks (13.1.3.2)
Protecting Against Network Attacks (13.1.3.5)
Social Engineering Attacks (13.1.4)
What Do You Already Know? - Social Engineering Techniques (13.1.4.2)
Social Engineering Techniques (13.1.4.3)
Protecting Against Social Engineering (13.1.4.4)
What Is a Security Policy? (13.2.1.1)
Security Policy Category (13.2.1.2)
Securing Devices and Data (13.2.1.3)
Protecting Physical Equipment (13.2.2)
Types of Secure Locks (13.2.2.2)
Securing Computers and Network Hardware (13.2.2.4)
Data - Your Greatest Asset (13.2.3.1)
File and Folder Permissions (13.2.3.3)
File and Folder Encryption (13.2.3.4)
Windows BitLocker and BitLocker To Go (13.2.3.5)
Data Wiping Magnetic Media (13.2.4.1)
Data Wiping Other Media (13.2.4.2)
Hard Drive Recycling and Destruction (13.2.4.3)
Securing Windows Workstations (13.3)
Securing a Workstation (13.3.1)
Securing a Computer (13.3.1.1)
Securing Windows Login (13.3.1.3)
Local Password Management (13.3.1.4)
Usernames and Passwords (13.3.1.5)
Windows Local Security Policy (13.3.2)
The Windows Local Security Policy (13.3.2.1)
Account Policies Security Settings (13.3.2.2)
Local Policies Security Settings (13.3.2.3)
Exporting the Local Security Policy (13.3.2.4)
Managing Users and Groups (13.3.3)
Maintaining Accounts (13.3.3.1)
Managing User Account Tools and User Account Tasks (13.3.3.2)
Local Users and Groups Manager (13.3.3.3)
Active Directory Users and Computers (13.3.3.5)
Configuring Exceptions in Windows Firewall (13.3.4.4)
Windows Firewall with Advanced Security (13.3.4.5)
Restrictive Settings (13.3.6.1)
Operating System Service Packs and Security Patches (13.3.6.3)
Configure Wireless Security (13.4.1)
What Do You Already Know? - Wireless Security (13.4.1.1)
Common Communication Encryption Types (13.4.1.2)
Wi-Fi Configuration Best Practices (13.4.1.3)
Authentication Methods (13.4.1.4)
Wireless Security Modes (13.4.1.5)
Port Forwarding and Port Triggering (13.4.1.8)
Universal Plug and Play (13.4.1.9)
Basic Troubleshooting Process for Security (13.5)
Applying the Troubleshooting Process to Security (13.5.1)
The Six Steps of the Troubleshooting Process (13.5.1.1)
Identify the Problem (13.5.1.2)
Establish a Theory of Probable Cause (13.5.1.3)
Test the Theory to Determine Cause (13.5.1.4)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (13.5.1.5)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (13.5.1.6)
Document Findings, Actions, and Outcomes (13.5.1.7)
Common Problems and Solutions for Security (13.5.2)
Common Problems and Solutions for Security (13.5.2.1)
Check Your Understanding Questions
Chapter 14 The IT Professional
Communication Skills and the IT Professional (14.1)
Communication Skills, Troubleshooting, and Professional Behavior (14.1.1)
Relationship Between Communication Skills and Troubleshooting (14.1.1.1)
Relationship Between Communication Skills and Professional Behavior (14.1.1.3)
Working with a Customer (14.1.2)
Know, Relate, and Understand (14.1.2.1)
Professional Behavior (14.1.3)
Using Professional Behavior with the Customer (14.1.3.1)
Tips for Hold and Transfer (14.1.3.2)
14.1.3.4 What Do You Already Know? - Netiquette (14.1.3.4)
Keeping the Customer Call Focused (14.1.4.1)
Documentation Overview (14.2.1.1)
IT Department Documentation (14.2.1.2)
Regulatory Compliance Requirements (14.2.1.3)
Change Control Process (14.2.2.1)
Disaster Prevention and Recovery (14.2.3)
Disaster Recovery Overview (14.2.3.1)
Preventing Downtime and Data Loss (14.2.3.2)
Elements of a Disaster Recovery Plan (14.2.3.3)
Ethical and Legal Considerations (14.3)
Ethical and Legal Considerations in the IT Profession (14.3.1)
Ethical and Legal Considerations in IT (14.3.1.1)
Personally Identifiable Information (PII) (14.3.1.2)
Payment Card Industry (PCI) (14.3.1.3)
Protected Health Information (PHI) (14.3.1.4)
Legal Considerations in IT (14.3.1.6)
Legal Procedures Overview (14.3.2)
Data Collected in Computer Forensics (14.3.2.2)
Call Center Technicians (14.4)
Call Centers, Level One and Level Two Technicians (14.4.1)
Level One Technician Responsibilities (14.4.1.2)
Level Two Technician Responsibilities (14.4.1.3)
Basic Scripting and the IT Professional (14.4.2)
Scripting Languages (14.4.2.2)
Basic Script Commands (14.4.2.3)
Variables/Environmental Variables (14.4.2.4)
Conditional Statements (14.4.2.5)
Check Your Understanding Questions
18.119.111.9