CompTIA IT Fundamentals (ITF+)
Course Length: |
5 days |
Certifications: |
CompTIA ITF+ |
Number of Exams: |
1 |
|
Certified Instructor
Includes all course materials
|
CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills.
Exam: FCO-U61
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.
- ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
- ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
- ITF+ establishes an IT education framework for students in secondary and post-secondary settings.
What Skills Will You Learn?
IT CONCEPTS & TERMINOLOGY
Comprehend notational systems, illustrate the basics of computing and explain the value of data and troubleshooting
INFRASTRUCTURE
Know how to set up and install common peripheral devices to a laptop/PC or secure a basic wireless network
APPLICATIONS & SOFTWARE
Manage applications software, understand the various components of an operating system and explain the purpose of methods of application architecture
SOFTWARE DEVELOPMENT
Comprehend programming language categories, interpret logic, and understand the purpose of programming concepts
DATABASE FUNDAMENTALS
Able to explain database concepts, structures, and purpose, as well as understands methods used to interface
SECURITY
Understand confidentiality, integrity, and availability concerns of secure devices and best practice methods
Who would benefit from ITF+?
- Students considering a career in IT.
- Professionals working in fields that require a broad understanding of IT.
- Marketing, sales and operations staff in IT-based organizations.
Course Outline
1.0 IT Concepts and Terminology
Compare and contrast notational systems.
- Binary
- Hexadecimal
- Decimal
- Data representation
Compare and contrast fundamental data types and their characteristics.
- Char
- Strings
- Numbers
- Boolean
Illustrate the basics of computing and processing.
- Input
- Processing
- Output
- Storage
Explain the value of data and information.
- Data and information as assets
- Importance of investing in security
- Relationship of data to creating information
- Intellectual property
- Digital products
- Data-driven business decisions
Compare and contrast common units of measure.
- Storage unit
- Throughput unit
- Processing speed
Explain the troubleshooting methodology.
- Identify the problem
- Research knowledge base/ Internet, if applicable
- Establish a theory of probable cause
- Test the theory to determine the cause
- Establish a plan of action to resolve the problem and identify potential effects
- Implement the solution or escalate as necessary
- Verify full system functionality and, if applicable, implement preventive measures
- Document findings/lessons learned, actions, and outcomes
2.0 Infrastructure
Classify common types of input/output device interfaces.
- Networking
- Peripheral device
- Graphic device
Given a scenario, set up and install common peripheral devices to a laptop/PC.
- o Devices
- Installation types
Explain the purpose of common internal computing components.
- Motherboard/system board
- Firmware/BIOS
- RAM
- CPU
- Storage
- GPU
- Cooling
- NIC
Compare and contrast common Internet service types.
- Fiber optic
- Cable
- DSL
- Wireless
Compare and contrast storage types.
- Volatile vs. non-volatile
- Local storage types
- Local network storage types
- Cloud storage service
Compare and contrast common computing devices and their purposes.
- Mobile phones
- Tablets
- Laptops
- Workstations
- Servers
- Gaming consoles
- IoT
Explain basic networking concepts.
- Basics of network communication
- Device addresses
- Basic protocols
- Devices
Given a scenario, install, configure and secure a basic wireless network.
- 802.11a/b/g/n/ac
- Best practices
3.0 Applications and Software
Explain the purpose of operating systems.
- Interface between applications and hardware
- Disk management
- Process management/scheduling
- Application management
- Memory management
- Device management
- Access control/protection
- Types of OS
Compare and contrast components of an operating system.
- File systems and features
- Features
- File management
- Services
- Processes
- Drivers
- Utilities
- Interfaces
Explain the purpose and proper use of software.
- Productivity software
- Collaboration software
- Business software
Explain methods of application architecture and delivery models.
- Application delivery methods
- Application architecture models
Given a scenario, configure and use web browsers.
- Caching/clearing cache
- Deactivate client-side scripting
- Browser add-ons/extensions
- Private browsing
- Proxy settings
- Certificates
- Popup blockers
- Script blockers
- Compatible browser for application(s)
Compare and contrast general application concepts and uses.
- Single-platform software
- Cross-platform software
- Licensing
- Software installation best practices
4.0 Software Development Concepts
Compare and contrast programming language categories.
- Interpreted
- Compiled programming languages
- Query languages
- Assembly language
Given a scenario, use programming organizational techniques and interpret logic.
- Organizational techniques
- Logic components
Explain the purpose and use of programming concepts.
- Identifiers
- Containers
- Functions
- Objects
5.0 Database Fundamentals
Explain database concepts and the purpose of a database.
- Usage of database
- Flat file vs. database
- Records
- Storage
Compare and contrast various database structures.
- Structured vs. semi-structured vs. non-structured
- Relational databases
- Non-relational databases
Summarize methods used to interface with databases.
- Relational methods
- Database access methods
- Export/import
6.0 Security
Summarize confidentiality, integrity and availability concerns.
- Confidentiality concerns
- Integrity concerns
- Availability concerns
Explain methods to secure devices and best practices.
- Securing devices (mobile/workstation)
- Device use best practices
Summarize behavioral security concepts.
- Expectations of privacy
- Written policies and procedures
- Handling of confidential information
Compare and contrast authentication, authorization, accounting and non-repudiation concepts.
- Authentication
- Authorization
- Accounting
- Non-repudiation
Explain password best practices.
- Password length
- Password complexity
- Password history
- Password expiration
- Password reuse across sites
- Password managers
- Password reset process
Explain common uses of encryption.
- Plain text vs. cipher text
- Data at rest
- Data in transit
Explain business continuity concepts.
- Fault tolerance
- Disaster recovery
MCSEClasses.com is your best choice for CompTIA ITF+,
CompTIA ITF+ training,
CompTIA ITF+ certification,
CompTIA ITF+ certification boot camp,
CompTIA ITF+ boot camp,
CompTIA ITF+ certification training,
CompTIA ITF+ boot camp training,
CompTIA ITF+ boot camp certification,
CompTIA ITF+ certification course,
CompTIA ITF+ course,
training CompTIA ITF+,
certification CompTIA ITF+,
boot camp CompTIA ITF+,
certification CompTIA ITF+ boot camp,
certification CompTIA ITF+ training,
boot camp CompTIA ITF+ training,
certification CompTIA ITF+ course.
|