CompTIA | IT Fundamentals+ (Exam: FC0-U61) Course Outlines:
Topic | Details |
---|---|
IT Concepts and Terminology 17% | |
Compare and contrast notational systems 🎥 | 1. Binary 2. Hexadecimal 3. Decimal 4. Data representation
|
Compare and contrast fundamental data types and their characteristics.🎥 | 1. Char 2. Strings 3. Numbers
4. Boolean |
Illustrate the basics of computing and processing.🎥 | 1. Input 2. Processing 3. Output 4. Storage |
Explain the value of data and information. | 1. Data and information as assets 2. Importance of investing in security 3. Relationship of data to creating information 4. Intellectual property
5. Digital products 6. Data-driven business decisions
|
Compare and contrast common units of measure. | 1. Storage unit
2. Throughput unit
3. Processing speed
|
Explain the troubleshooting methodology. | 1. Identify the problem
2. Establish a theory of probable cause
3. Test the theory to determine the cause
4. Establish a plan of action to resolve the problem and identify potential effects 5. Implement the solution or escalate as necessary 6. Verify full system functionality and, if applicable, implement preventive measures 7. Document findings/lessons learned, actions, and outcomes |
Infrastructure 22% | |
Classify common types of input/output device interfaces. | 1. Networking
2. Peripheral device
3. Graphic device
|
Given a scenario, set up and install common peripheral devices to a laptop/PC. | 1. Devices
2. Installation types
|
Explain the purpose of common internal computing components. | 1. Motherboard/system board 2. Firmware/BIOS 3. RAM 4. CPU
5. Storage
6. GPU 7. Cooling 8. NIC
|
Compare and contrast common Internet service types. | 1. Fiber optic 2. Cable 3. DSL 4. Wireless
|
Compare and contrast storage types. | 1. Volatile vs. non-volatile 2. Local storage types
3. Local network storage types
4. Cloud storage service |
Compare and contrast common computing devices and their purposes. | 1. Mobile phones 2. Tablets 3. Laptops 4. Workstations 5. Servers 6. Gaming consoles 7. IoT
|
Explain basic networking concepts. | 1. Basics of network communication
2. Device addresses
3. Basic protocols
4. Devices
|
Given a scenario, install, configure and secure a basic wireless network. | 1. 802.11a/b/g/n/ac
2. Best practices
|
Applications and Software 18% | |
Explain the purpose of operating systems. | 1. Interface between applications and hardware 2. Disk management 3. Process management/scheduling
4. Application management 5. Memory management 6. Device management 7. Access control/protection 8. Types of OS
|
Compare and contrast components of an operating system. | 1. File systems and features
2. Features
3. File management
4. Services 5. Processes 6. Drivers 7. Utilities
8. Interfaces
|
Explain the purpose and proper use of software. | 1. Productivity software
2. Collaboration software
3. Business software
|
Explain methods of application architecture and delivery models. | 1. Application delivery methods
2. Application architecture models
|
Given a scenario, configure and use web browsers. | 1. Caching/clearing cache 2. Deactivate client-side scripting 3. Browser add-ons/extensions
4. Private browsing 5. Proxy settings 6. Certificates
7. Popup blockers 8. Script blockers 9. Compatible browser for application(s) |
Compare and contrast general application concepts and uses. | 1. Single-platform software 2. Cross-platform software
3. Licensing
4. Software installation best practices
|
Software Development 12% | |
Compare and contrast programming language categories. | 1. Interpreted
2. Compiled programming languages 3. Query languages 4. Assembly language |
Given a scenario, use programming organizational techniques and interpret logic. | 1. Organizational techniques
2. Logic components
|
Explain the purpose and use of programming concepts. | 1. Identifiers
2. Containers
3. Functions 4. Objects
|
Database Fundamentals 11% | |
Explain database concepts and the purpose of a database. | 1. Usage of database
2. Flat file vs. database
3. Records 4. Storage
|
Compare and contrast various database structures. | 1. Structured vs. semi-structured vs. non-structured 2. Relational databases
3. Non-relational databases
|
Summarize methods used to interface with databases. | 1. Relational methods
2. Database access methods
3. Export/import
|
Security 20% | |
Summarize confidentiality, integrity and availability concerns. | 1. Confidentiality concerns
2. Integrity concerns
3. Availability concerns
|
Explain methods to secure devices and best practices. | 1. Securing devices (mobile/workstation)
2. Device use best practices
|
Summarize behavioral security concepts. | 1. Expectations of privacy when using:
2. Written policies and procedures 3. Handling of confidential information
|
Compare and contrast authentication, authorization, accounting and non-repudiation concepts. | 1. Authentication
2. Authorization
3. Accounting
4. Non-repudiation
|
Explain password best practices. | 1. Password length 2. Password complexity 3. Password history 4. Password expiration 5. Password reuse across sites 6. Password managers 7. Password reset process |
Explain common uses of encryption. | 1. Plain text vs. cipher text 2. Data at rest
3. Data in transit
|
Explain business continuity concepts. | 1. Fault tolerance
2. Disaster recovery
|
No comments:
Post a Comment