課程名稱:CompTIA IT Fundamentals+ 國際認可證書課程 - 簡稱:CompTIA ITF+ Training Course |
FC0-U61 CompTIA ITF+ (30 Hours)
Module 1: Using Computers
1.1 Common Computing Devices
1.1.1 Information Technology
1.1.2 Personal Computers (PC)
1.1.3 Mobile Devices
1.1.4 Internet of Things (IoT) Devices
1.2 Using a Workstation
1.2.1 Setting up a PC System
1.2.2 Ergonomic Concepts
1.2.3 Navigating an OS
1.2.4 Using Input Devices
1.2.5 Recognizing Desktop Icons
1.2.6 Working with Windows
1.3 Using an OS
1.3.1 Functions of an Operating System
1.3.2 Types of Operating System
1.3.3 Virtualization
1.3.4 Microsoft Windows
1.3.5 Apple macOS and iOS
1.3.6 Linux, Chrome, and Android
1.3.7 File Explorer
1.3.8 Windows Settings and Control Panel
1.3.9 Using a Web Browser
1.4 Managing an OS
1.4.1 Management Interfaces
1.4.2 Process and Service Management
1.4.3 Memory and Disk Management
1.4.4 Command Line Interfaces
1.4.5 Access Control and Protection
1.5 Troubleshooting and Support
1.5.1 Support and Troubleshooting
1.5.2 Identifying the Problem
1.5.3 Understanding the Problem
1.5.4 Resolving and Documenting the Problem
1.5.5 Troubleshooting PC Issues
1.5.6 Getting Support
1.5.7 Using a Search Engine
1.6 Module 1 Summary
Module 2: Using Apps and Databases
2.1 Using Data Types and Units
2.1.1 Notational Systems
2.1.2 Units of Measure
2.1.3 Data Types
2.1.4 Data Representation
2.1.5 The Value of Data
2.1.6 Intellectual Property
2.1.7 Data-driven Business Decisions
2.2 Using Apps
2.2.1 Installing Applications
2.2.2 Application Management
2.2.3 Managing Software Licensing
2.2.4 Productivity Software
2.2.5 Collaboration Software
2.2.6 Business Software
2.3 Programming and App Development
2.3.1 Programming Logic
2.3.2 Programming Languages
2.3.3 Programming Concepts
2.3.4 Object-Oriented Programming
2.3.5 Scripting Languages
2.3.6 Application Platforms and Delivery
2.4 Using Databases
2.4.1 Database Concepts
2.4.2 Database Structures
2.4.3 Relational Methods
2.4.4 Database Access Methods
2.4.5 Application Architecture Models
2.5 Summary for Using Apps and Databases
Module 3: Using Computer Hardware
3.1 System Components
3.1.1 Selecting a Computer
3.1.2 Motherboard Components
3.1.3 Processors
3.1.4 Features of Processors
3.1.5 System and Expansion Bus Technologies
3.1.6 System Cooling
3.1.7 BIOS and UEFI System Firmware
3.2 Using Device Interfaces
3.2.1 Computer Port and Connector Types
3.2.2 USB and Firewire
3.2.3 Graphics Devices
3.2.4 Graphic Device Interfaces
3.2.5 Input Devices
3.2.6 Configuring Peripherals
3.2.7 Bluetooth
3.2.8 RF and Near Field Communications (NFC)
3.2.9 Networking Interfaces
3.3 Using Peripheral Devices
3.3.1 Installing and Uninstalling Peripherals
3.3.2 Display Devices
3.3.3 Display Settings
3.3.4 Multimedia Ports and Devices
3.3.5 Printer Types
3.3.6 Installing and Configuring a Printer
3.3.7 Scanners and Cameras
3.4 Using Storage Devices
3.4.1 System Memory
3.4.2 Mass Storage Devices
3.4.3 Optical Discs and Drives
3.4.4 Removable Flash Memory Devices
3.5 Using File Systems
3.5.1 Managing the File System
3.5.2 Folders and Directories
3.5.3 File Explorer
3.5.4 Files
3.5.5 File Attributes and Permissions
3.5.6 Searching for Folders and Files
3.5.7 File Types and Extensions
3.6 Using Computer Hardware Summary
Module 4: Using Networks
4.1 Networking Concepts
4.1.1 Network Components
4.1.2 TCP/IP
4.1.3 Internet Protocol
4.1.4 Packet Delivery and Forwarding
4.1.5 DNS and URLs
4.1.6 Internet Application Services
4.2 Connecting to a Network
4.2.1 Internet Service Types
4.2.2 Wireless Internet Services
4.2.3 Setting Up a Wireless Network
4.2.4 Configuring a Wireless Client
4.2.5 Connecting to an Enterprise Network
4.3 Secure Web Browsing
4.3.1 Safe Browsing Practices
4.3.2 Configuring Browser Security
4.3.3 Managing Cookies and PII
4.3.4 Digital Certificates and Anti-phishing
4.3.5 Enabling a Firewall
4.4 Using Shared Storage
4.4.1 Local Network Sharing and Storage
4.4.2 Windows File Sharing
4.4.3 Hosted Sharing and Storage
4.4.4 Backups
4.4.5 Windows Backup
4.5 Using Mobile Devices
4.5.1 Using a Mobile Device
4.5.2 Mobile Applications and App Stores
4.5.3 Network Connectivity
4.5.4 Email Configuration
4.5.5 Synchronization and Data Transfer
5. Module 5: Security Concepts
5.1 Security Concerns
5.1.1 Computer Security Basics
5.1.2 Social Engineering
5.1.3 Business Continuity
5.1.4 Disaster Recovery
5.2 Using Best Practices
5.2.1 Securing Devices
5.2.2 Malware
5.2.3 Preventing Malware Infections
5.2.4 Spam
5.2.5 Software Sources and Patch Management
5.3 Using Access Controls
5.3.1 Access Controls
5.3.2 User Account Types
5.3.3 Authentication Factors
5.3.4 Uses of Encryption
5.3.5 Password Cracking and Management
5.4 Behavioral Security Concepts
5.4.1 Policies and Procedures
5.4.2 Handling Confidential Information
5.4.3 Acceptable Use Policies
5.4.4 Expectations of Privacy
5.5 Security Concepts Summary
|