HemSök efter kurserCompTIA IT Fundamentals

CompTIA IT Fundamentals


5 dagar

46830 kr

This 5-day course is intended for those wishing to qualify with CompTIA IT Fundamentals Certification.

CompTIA Information Technology (IT) Fundamentals Certification is the essential qualification for beginning a career in PC support.

Target Audience

CompTIA IT Fundamentals is a starter qualification for students and career changes to help decide whether they can be successful in pursuing a career in IT.

It is ideal for those with no previous computer experience considering a career as an IT technician or in IT customer support / helpdesk.

Please note - the exam is not included with this course. Please contact your QA account manager if you wish to purchase the Pearson Vue exam voucher.

This course is designed to help you acquire the knowledge and skills to set up and use a computer at home securely and keep it in good working order, provide informal support for PCs and simple computer networks to your colleagues in a small business, and prepare to study for the CompTIA A+ certification in PC support skills or other advanced IT education programs.

On course completion, you will be able to.

  • Set up a computer workstation running Windows and use basic software applications.
  • Understand the functions and types of devices used within a computer system.
  • Apply basic computer maintenance and support principles.
  • Configure computers and mobile devices to connect to home networks and to the internet.
  • Identify security issues affecting the use of computers and networks.

CompTIA IT Fundamentals is aimed at those considering a career in IT and computer-related fields. Consequently, there are no special prerequisites for you to meet to successfully start this course. We have made the assumption that you don't know much about how computers or software work, or even how to use them. Some experience with using a keyboard and mouse will be helpful but is not essential.

Module 1 – Using Computers

  • Common Computing Devices
  • Information Technology
  • Personal Computers (PC)
  • Mobile Devices
  • Internet of Things (IoT) Devices

Using a Workstation

  • Setting up a PC System
  • Ergonomic Concepts
  • Navigating an OS
  • Using Input Devices
  • Recognising Desktop Icons
  • Working with Windows

Using an OS

  • Functions of an Operating System
  • Types of Operating System
  • Microsoft Windows
  • Apple macOS and iOS
  • Linux, Chrome, and Android
  • File Explorer
  • Windows Settings and Control Panel
  • Using a Web Browser

Managing an OS

  • Management Interfaces
  • Process and Service Management
  • Memory and Disk Management
  • Command Line Interfaces
  • Access Control and Protection

Troubleshooting and Support

  • Support and Troubleshooting
  • Identifying the Problem
  • Understanding the Problem
  • Resolving and Documenting the Problem
  • Troubleshooting PC Issues
  • Getting Support
  • Using a Search Engine

Module 2 – Using Apps and Databases

Using Data Types and Units

  • Notational Systems
  • Units of Measure
  • Data Types
  • Data Representation
  • The Value of Data
  • Intellectual Property
  • Data-driven Business Decisions

Using Apps

  • Installing Applications
  • Application Management
  • Managing Software Licensing
  • Productivity Software
  • Collaboration Software
  • Business Software

Programming and App Development

  • Programming Logic
  • Programming Languages
  • Programming Concepts
  • Object-Orientated Programming
  • Scripting Languages
  • Application Platforms and Delivery

Using Databases

  • Database Concepts
  • Database Structures
  • Relational Methods
  • Database Access Methods
  • Application Architecture Models

Module 3 – Using Computer Hardware

System Components

  • Selecting a Computer
  • Motherboard Components
  • Processors
  • Features of Processors
  • System and Expansion Bus Technologies
  • System Cooling
  • BIOS and EUFI System Firmware

Using Device Interfaces

  • Computer Port and Connector Types
  • USB and Firewire
  • Graphics Devices
  • Graphic Device Interfaces
  • Input Devices
  • Configuring Peripherals
  • Bluetooth
  • RF and Near Field Communications (NFC)
  • Networking Interfaces

Using Peripheral Devices

  • Installing and Uninstalling Peripherals
  • Display Devices
  • Display Settings
  • Multimedia Ports and Devices
  • Printer Types
  • Installing and Configuring a Printer
  • Scanners and Cameras

Using Storage Devices

  • System Memory
  • Mass Storage Devices
  • Optical Discs and Drives
  • Removable Flash Memory Devices

Using File Systems

  • Managing the File System
  • Folders and Directories
  • File Explorer
  • Files
  • File Attributes and Permissions
  • Searching for Folders and Files
  • File Types and Extensions

Module 4 -Using Networks

Networking Concepts

  • Networking Components
  • TCP/IP
  • Internet Protocol
  • Packet delivery and Forwarding
  • DNS and URLs
  • Internet Application Services

Connecting to a Network

  • Internet Service Types
  • Wireless Internet Services
  • Setting up a Wireless Network
  • Configuring a Wireless Client
  • Connecting to an Enterprise Network

Secure Web Browsing

  • Safe Browsing Practices
  • Configuring Browser Security
  • Managing Cookies and PII (personal identifiable information)
  • Digital Certificates and Anti-phishing
  • Enabling a Firewall

Using Shared Storage

  • Local Network Sharing and Storage
  • Windows File Sharing
  • Hosted Sharing and Storage
  • Backups
  • Windows Backup

Using Mobile Devices

  • Using a Mobile Device
  • Mobile Applications and App Stores
  • Network Connectivity
  • Email Configuration
  • Synchronisation and Data Transfer

Module 5 – Security Concepts

Security Concerns

  • Computer Security Basics
  • Social Engineering
  • Business Continuity
  • Disaster Recovery

Using Best Practices

  • Securing Devices
  • Malware
  • Preventing Malware Infections
  • Spam
  • Software Sources and Patch Management

Using Access Controls

  • Access Controls
  • User Account Types
  • Authentication Factors
  • Uses of Encryption
  • Password Cracking and Management

Behavioural Security Concepts

  • Policies and Procedures
  • Handling Confidential Information
  • Acceptable Use Policies
  • Expectations of Privacy