Syllabus

CompTIA | IT Fundamentals+ (Exam: FC0-U61) Course Outlines:

































































































































































TopicDetails
IT Concepts and Terminology 17%
Compare and contrast notational systems 🎥1. Binary
2. Hexadecimal
3. Decimal
4. Data representation


  1. ASCII

  2. Unicode


Compare and contrast fundamental data types and their characteristics.🎥1. Char
2. Strings
3. Numbers


  1. Integers

  2. Floats


4. Boolean
Illustrate the basics of computing and processing.🎥1. Input
2. Processing
3. Output
4. Storage
Explain the value of data and information.1. Data and information as assets
2. Importance of investing in security
3. Relationship of data to creating information
4. Intellectual property


  1. Trademarks

  2. Copyright

  3. Patents


5. Digital products
6. Data-driven business decisions


  1. Data capture and collection

  2. Data correlation

  3. Meaningful reporting


Compare and contrast common units of measure.1. Storage unit

  1. Bit

  2. Byte

  3. KB

  4. MB

  5. GB

  6. TB

  7. PB


2. Throughput unit

  1. bps

  2. Kbps

  3. Mbps

  4. Gbps

  5. Tbps


3. Processing speed

  1. MHz

  2. GHz


Explain the troubleshooting methodology.1. Identify the problem

  1. Gather information

  2. Duplicate the problem, if possible

  3. Question users

  4. Identify symptoms

  5. Determine if anything has changed

  6. Approach multiple problems individually


2. Establish a theory of probable cause

  1. Question the obvious

  2. Consider multiple approaches

  3. Divide and conquer


3. Test the theory to determine the cause

  1. Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem

  2. If the theory is not confirmed, establish a new theory or escalate


4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary
6. Verify full system functionality and, if applicable, implement preventive measures
7. Document findings/lessons learned, actions, and outcomes
Infrastructure 22%
Classify common types of input/output device interfaces.1. Networking

  1. Wired
    Telephone connector (RJ-11)
    Ethernet connector (RJ-45)

  2. Wireless
    Bluetooth
    NFC


2. Peripheral device

  1. USB

  2. FireWire

  3. Thunderbolt

  4. Bluetooth

  5. RF


3. Graphic device

  1. VGA

  2. HDMI

  3. DVI

  4. DisplayPort

  5. Mini DisplayPort


Given a scenario, set up and install common peripheral devices to a laptop/PC.1. Devices

  1. Printer

  2. Scanner

  3. Keyboard

  4. Mouse

  5. Camera

  6. External hard drive

  7. Speakers

  8. Display


2. Installation types

  1. Plug-and-play vs. driver installation

  2. Other required steps

  3. IP-based peripherals

  4. Web-based configuration steps


Explain the purpose of common internal computing components.1. Motherboard/system board
2. Firmware/BIOS
3. RAM
4. CPU


  1. ARM
    Mobile phone
    Tablet

  2. 32-bit
    Laptop
    Workstation
    Server

  3. 64-bit
    Laptop
    Workstation
    Server


5. Storage

  1. Hard drive

  2. SSD


6. GPU
7. Cooling
8. NIC


  1. Wired vs. wireless

  2. On-board vs. add-on card


Compare and contrast common Internet service types.1. Fiber optic
2. Cable
3. DSL
4. Wireless


  1. Radio frequency

  2. Satellite

  3. Cellular


Compare and contrast storage types.1. Volatile vs. non-volatile
2. Local storage types


  1. RAM

  2. Hard drive
    Solid state vs. spinning disk

  3. Optical

  4. Flash drive


3. Local network storage types

  1. NAS

  2. File server


4. Cloud storage service
Compare and contrast common computing devices and their purposes.1. Mobile phones
2. Tablets
3. Laptops
4. Workstations
5. Servers
6. Gaming consoles
7. IoT


  1. Home appliances

  2. Home automation devices
    Thermostats
    Security systems

  3. Modern cars

  4. IP cameras

  5. Streaming media devices

  6. Medical devices


Explain basic networking concepts.1. Basics of network communication

  1. Basics of packet transmission

  2. DNS
    URL-to-IP translation

  3. LAN vs. WAN


2. Device addresses

  1. IP address

  2. MAC address


3. Basic protocols

  1. HTTP/S

  2. POP3

  3. IMAP

  4. SMTP


4. Devices

  1. Modem

  2. Router

  3. Switch

  4. Access point

  5. Firewall


Given a scenario, install, configure and secure a basic wireless network.1. 802.11a/b/g/n/ac

  1. Older vs. newer standards

  2. Speed limitations

  3. Interference and attenuation factors


2. Best practices

  1. Change SSID

  2. Change default password

  3. Encrypted vs. unencrypted
    Open
    - Captive portal
    WEP
    WPA
    WPA2


Applications and Software 18%
Explain the purpose of operating systems.1. Interface between applications and hardware
2. Disk management
3. Process management/scheduling


  1. Kill process/end task


4. Application management
5. Memory management
6. Device management
7. Access control/protection
8. Types of OS


  1. Mobile device OS

  2. Workstation OS

  3. Server OS

  4. Embedded OS
    Firmware

  5. Hypervisor (Type 1)


Compare and contrast components of an operating system.1. File systems and features

  1. File systems
    NTFS
    FAT32
    HFS
    Ext4


2. Features

  1. Compression

  2. Encryption

  3. Permissions

  4. Journaling

  5. Limitations

  6. Naming rules


3. File management

  1. Folders/directories

  2. File types and extensions

  3. Permissions


4. Services
5. Processes
6. Drivers
7. Utilities


  1. Task scheduling


8. Interfaces

  1. Console/command line

  2. GUI


Explain the purpose and proper use of software.1. Productivity software

  1. Word processing software

  2. Spreadsheet software

  3. Presentation software

  4. Web browser

  5. Visual diagramming software


2. Collaboration software

  1. Email client

  2. Conferencing software

  3. Instant messaging software

  4. Online workspace

  5. Document sharing


3. Business software

  1. Database software

  2. Project management software

  3. Business-specific applications

  4. Accounting software


Explain methods of application architecture and delivery models.1. Application delivery methods

  1. Locally installed
    Network not required
    Application exists locally
    Files saved locally

  2. Local network hosted
    Network required
    Internet access not required

  3. Cloud hosted
    Internet access required
    Service required
    Files saved in the cloud


2. Application architecture models

  1. One tier

  2. Two tier

  3. Three tier

  4. n-tier


Given a scenario, configure and use web browsers.1. Caching/clearing cache
2. Deactivate client-side scripting
3. Browser add-ons/extensions


  1. Add

  2. Remove

  3. Enable/disable


4. Private browsing
5. Proxy settings
6. Certificates


  1. Valid

  2. Invalid


7. Popup blockers
8. Script blockers
9. Compatible browser for application(s)
Compare and contrast general application concepts and uses.1. Single-platform software
2. Cross-platform software


  1. Compatibility concerns


3. Licensing

  1. Single use

  2. Group use/site license

  3. Concurrent license

  4. Open source vs. proprietary

  5. Subscription vs. one-time purchase

  6. Product keys and serial numbers


4. Software installation best practices

  1. Reading instructions

  2. Reading agreements

  3. Advanced options


Software Development 12%
Compare and contrast programming language categories.1. Interpreted

  1. Scripting languages

  2. Scripted languages

  3. Markup languages


2. Compiled programming languages
3. Query languages
4. Assembly language
Given a scenario, use programming organizational techniques and interpret logic.1. Organizational techniques

  1. Pseudocode concepts

  2. Flow-chart concepts
    Sequence


2. Logic components

  1. Branching

  2. Looping


Explain the purpose and use of programming concepts.1. Identifiers

  1. Variables

  2. Constants


2. Containers

  1. Arrays

  2. Vectors


3. Functions
4. Objects


  1. Properties

  2. Attributes

  3. Methods


Database Fundamentals 11%
Explain database concepts and the purpose of a database.1. Usage of database

  1. Create

  2. Import/input

  3. Query

  4. Reports


2. Flat file vs. database

  1. Multiple concurrent users

  2. Scalability

  3. Speed

  4. Variety of data


3. Records
4. Storage


  1. Data persistence


Compare and contrast various database structures.1. Structured vs. semi-structured vs. non-structured
2. Relational databases


  1. Schema

  2. Tables
    Rows/records

  3. Fields/columns
    Primary key
    Foreign key

  4. Constraints


3. Non-relational databases

  1. Key/value databases

  2. Document databases


Summarize methods used to interface with databases.1. Relational methods

  1. Data manipulation
    Select
    Insert
    Delete
    Update

  2. Data definition
    Create
    Alter
    Drop
    Permissions


2. Database access methods

  1. Direct/manual access

  2. Programmatic access

  3. User interface/utility access

  4. Query/report builders


3. Export/import

  1. Database dump

  2. Backup


Security 20%
Summarize confidentiality, integrity and availability concerns.1. Confidentiality concerns

  1. Snooping

  2. Eavesdropping

  3. Wiretapping

  4. Social engineering

  5. Dumpster diving


2. Integrity concerns

  1. Man-in-the-middle

  2. Replay attack

  3. Impersonation

  4. Unauthorized information alteration


3. Availability concerns

  1. Denial of service

  2. Power outage

  3. Hardware failure

  4. Destruction

  5. Service outage


Explain methods to secure devices and best practices.1. Securing devices (mobile/workstation)

  1. Antivirus/Anti-malware

  2. Host firewall

  3. Changing default passwords

  4. Enabling passwords

  5. Safe browsing practices

  6. Patching/updates


2. Device use best practices

  1. Software sources
    Validating legitimate sources
    Researching legitimate sources
    OEM websites vs. third-party websites

  2. Removal of unwanted software

  3. Removal of unnecessary software

  4. Removal of malicious software


Summarize behavioral security concepts.1. Expectations of privacy when using:

  1. The Internet
    Social networking sites
    Email
    File sharing
    Instant messaging

  2. Mobile applications

  3. Desktop software

  4. Business software

  5. Corporate network


2. Written policies and procedures
3. Handling of confidential information


  1. Passwords

  2. Personal information

  3. Customer information

  4. Company confidential information


Compare and contrast authentication, authorization, accounting and non-repudiation concepts.1. Authentication

  1. Single factor

  2. Multifactor

  3. Examples of factors
    Password
    PIN
    One-time password
    Software token
    Hardware token
    Biometrics
    Specific location
    Security questions

  4. Single sign-on


2. Authorization

  1. Permissions

  2. Least privilege model

  3. Role-based access
    User account types

  4. Rule-based access

  5. Mandatory access controls

  6. Discretionary access controls


3. Accounting

  1. Logs

  2. Tracking

  3. Web browser history


4. Non-repudiation

  1. Video

  2. Biometrics

  3. Signature

  4. Receipt


Explain password best practices.1. Password length
2. Password complexity
3. Password history
4. Password expiration
5. Password reuse across sites
6. Password managers
7. Password reset process
Explain common uses of encryption.1. Plain text vs. cipher text
2. Data at rest


  1. File level

  2. Disk level

  3. Mobile device


3. Data in transit

  1. Email

  2. HTTPS

  3. VPN

  4. Mobile application


Explain business continuity concepts.1. Fault tolerance

  1. Replication

  2. Redundancy
    Data
    Network
    Power

  3. Backup considerations
    Data
    - File backups
    - Critical data
    - Database
    - OS backups
    Location
    - Stored locally
    - Cloud storage
    - On-site vs. off-site

  4. Contingency plan


2. Disaster recovery

  1. Data restoration

  2. Prioritization

  3. Restoring access


No comments:

Post a Comment