Description:
This 13-video course offers a comprehensive overview of best practices and safety standards: the working rules which keep operators from causing harm to their systems. Documentation best practices, for example, begin with network topologies—mapping diagrams of distribution of devices and subnetworks, home or office—while sensible password policies exist to offer invaluable protection to users and systems alike. Record all incidents; manage inventory carefully; comply with government regulations and MSDS documentation. Basic safety procedures—goggles, air filter masks, weight limitations, toxic waste handling—are needed to protect users, equipment, and IT staff alike, and must be up-to-date. Change management is critical to continued success; what the world you work in will look like next year is almost impossible to guess, so learn to be ready for anything. Remote access technologies are constantly evolving, and you must keep abreast of changes. A closing exercise allows you to assess your knowledge of just a few: password policies; airborne dust and debris; and government regulatory compliance laws. Course helps prepare for CompTIA A+ certification exam 220-1002.
Target Audience:
Duration: 01:21
Description:
Diagnosing problems within a network or a computer requires a special and versatile toolbox for the IT specialist. This 9-video series outlines many popular troubleshooting tools and practical strategies needed to quickly isolate all kinds of problems, regardless of platform, and resolve them, to help restore normal working conditions efficiently and quickly. Various process checklists are invaluable—the five-step system checklist, the six-step analyzing systems, the seven-step remediation of malware, all discussed here. Is the problem widespread or limited to one machine? Has anything significant been installed recently—hardware or software? Are users plagued by popups, spam, slow bootups, or slow performance? Do specific security issues need addressing? Is a Web-based email application (Hotmail, Yahoo, G-mail accounts) involved? If malware is suspected or discovered, the system is often infected; one machine or many may need to be rebooted, restarted, and cleaned—and antivirus or antimalware installed. Learn what to do and when to do it, from rolling back updates to restarting service. Course helps prepare for CompTIA+ certification exam 220-1002.
Target Audience:
Duration: 00:56
Description:
Among the newer forms of security for most workers in the 21 st century involves social engineering—protecting workers and work against subtle but dangerous attacks by con men and scammers. This 14-video course reviews security fundamentals and the many ways in which devious people steal information—masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing (airports, coffee shops), spoofing, dumpster-diving, and insidiously clever "spear phishing" attacks—legitimate-looking e-mails luring workers to malicious websites, or worse, into opening "encrypted" attachments with company credentials or password. Review critical measures of Active Directory administration, user management, and encryption of files and disks; implement logon time restrictions and failed-attempt lockouts; disable guest accounts in a timely fashion; avoid use of noncompliant systems; prevent careless moving or copying of office files; encrypt files and disks. In this day of widespread remote teleworking, safeguard home offices—where wireless signals are easily intercepted without simple, appropriate precautions. Danger lurks everywhere, and no one, however experienced, can ever be too careful! Course helps prepare for CompTIA+ certification exam 220-1002.
Target Audience:
Duration: 01:31
Description:
An important component of traditional security measures is the physical security requirements employed to safeguard valuable computer equipment. This 14-video course examines current physical security practices and how to improve them in the 21 st century. Begin with door and offices locks, fences, and perimeter defenses—solar-powered lights, cameras, motion detectors, and data storage places. Fire suppression systems are important, but consider less obvious benefits of positive airflow systems—preventing dust particles from entering "clean" areas and ensure that air flows out, not in. Laptops must be physically secured at cubicle desks (cable locks); servers must be locked in secure rooms, not under a reception desk. Other tools: privacy screens; so-called "mantraps"—steel shutters walling off outer vestibules; entry control rosters. Be sure to secure mobile devices—tablets, cell phones—against both viruses and unauthorized use by outsiders. Antimalware, antiviral software, multifactor authentication, Smart cards, data loss prevention, and firewalls are also important examples. Emerge from this course better prepared to implement best practices in security in your office. Course helps prepare for CompTIA A+ certification exam 220-1002.
Target Audience:
Duration: 01:21
Description:
Examine application installations and the configuration requirements and considerations for application rollouts, networking security, and remote connections, including the use of Windows Control Panel tools and Linux commands. This course shows learners how to configure the correct folder/file access to support application installation and validate security to minimize impact to devices and the network; how to configure Windows Firewall; how to configure IP addresses in Windows; how to list differences in network connection types, requirements, and security; when to use Homegroup, Workgroup, and Domain setup; how to manage and configure shares, mapped drives, and printers; and how to manage and configure remote connectivity, including proxy settings, Remote Desktop Connection, and Remote Assistance. Other issues: how to implement best practices for disk maintenance, patch management, driver/firmware updates, and antivirus/anti-malware updates; how to use and configure MAC/Linux client tools; how to manage client features; and how to use basic Linux commands, plus an overview of Client Tools. Course helps prepare for CompTIA A+ certification exam 220-1002.
Target Audience:
Duration: 01:13
Description:
Learn important Microsoft operating system (OS) installation and upgrade considerations and critical skills to ensure success of your installations. In this course, you will learn: to configure partitions and volumes, create redundant disk arrays, and convert disks; to configure disk formatting and distinguish between file system types and their use; to stage and configure alternate third-party drivers to load when necessary; and how to differentiate between the Workgroup and Domain setup, and when each is appropriate; to configure settings including time, date, region, and language. Observe how to perform driver management, including installation, update, and removal; to implement automated OS and software updates for Windows, MAC, and Linux; to use the factory recovery partition to reset a Windows installation; and to format the system volume (boot drive). Other issues covered: enumerating prerequisites for any Windows install and identifying which hardware compatibility tool to use for each OS compatibility; how Microsoft's application compatibility toolset has evolved since AppCompat; how to identify and mitigate OS compatibility/upgrade issues; and how to assess upgrade readiness. Course helps prepare for CompTIA A+ certification exam 220-1002.
Target Audience:
Duration: 01:03
Description:
Explore and compare the various client-side operating systems and their installation processes. In this course you will learn: to identify and define what an operating system is; to differentiate between 32-bit and 64-bit processing; to differentiate between operating system vendors; and to understand the differences between the major smartphone and tablet operating system vendors. Learners also observe how to update limitations and compatibility concerns for vendor-specific operating systems; to identify the differences between versions of Microsoft operating systems; to determine appropriate editions of Windows client, based on customer profiles; and to configure desktop styles and user interfaces. You will learn how to choose the appropriate boot configuration based on needs; to choose appropriate types of installation methods based on deployment needs; to implement network and image-based deployments; how to recover a failed installation; and how to compare common operating system architectures, installation sources, and targets. The course concludes with exercises on aspects of common operating systems, including making distinctions between 32-bit and 64-bit architecture. Course helps prepare for CompTIA A+ certification exam 220-1002.
Target Audience:
Duration: 01:15