IT Essentials Course Booklet, Version 6

Paperback Engels 2016 9781587133565
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The Cisco Networking Academy Course Booklet is designed as a study resource students can easily read, highlight, and review on the go, wherever the Internet is not available or practical.

Specificaties

ISBN13:9781587133565
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<!--[if gte mso 9]><xml> </xml><![endif]--> <p style="margin:0px;">Chapter 0 Course Introduction 1</p> <p style="margin:0px;">0.0 Welcome to IT Essentials 1</p> <p style="margin:0px;">0.0.1 Message to the Student 1</p> <p style="margin:0px;">0.0.2 The IT Industry 2</p> <p style="margin:0px;">Chapter 1 Introduction to the Personal Computer System 7</p> <p style="margin:0px;">1.0 Introduction 7</p> <p style="margin:0px;">1.1 Personal Computer Systems 7</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;1.1.1 Cases and Power Supplies 7</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;1.1.2 Internal PC Components 10</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;1.1.3 External Ports and Cables 17</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;1.1.4 Input and Output Devices 20</p> <p style="margin:0px;">1.2 Select Computer Components 23</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;1.2.1 Select PC Components 23</p> <p style="margin:0px;">1.3 Configurations for Specialized Computer Systems 29</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;1.3.1 Specialized Computer Systems 29</p> <p style="margin:0px;">1.4 Chapter Summary 34</p> <p style="margin:0px;">Chapter 2 Introduction to Lab Procedures and Tool Use 37</p> <p style="margin:0px;">2.0 Introduction 37</p> <p style="margin:0px;">2.1 Safe Lab Procedures 37</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.1.1 Procedures to Protect People 37</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.1.2 Procedures to Protect Equipment and Data 39</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.1.3 Procedures to Protect the Environment 41</p> <p style="margin:0px;">2.2 Proper Use of Tools 43</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.2.1 Hardware Tools 43</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.2.2 Software Tools 44</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.2.3 Organizational Tools 45</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;2.2.4 Demonstrate Proper Tool Use 46</p> <p style="margin:0px;">2.3 Summary 50</p> <p style="margin:0px;">Chapter 3 Computer Assembly 53</p> <p style="margin:0px;">3.0 Introduction 53</p> <p style="margin:0px;">3.1 Assemble the Computer 53</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.1.1 Open the Case and Connect the Power Supply 53</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.1.2 Install the Motherboard 54</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.1.3 Install Drives 57</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.1.4 Install the Adapter Cards 58</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.1.5 Install Cables 59</p> <p style="margin:0px;">3.2 Boot the Computer 64</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.2.1 POST, BIOS, UEFI 64</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.2.2 BIOS and UEFI Configuration 66</p> <p style="margin:0px;">3.3 Upgrade and Configure a Computer 70</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.3.1 Motherboard and Related Components 70</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.3.2 Storage Devices 73</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;3.3.3 Peripheral Devices 74</p> <p style="margin:0px;">3.4 Chapter Summary 75</p> <p style="margin:0px;">Chapter 4 Overview of Preventive Maintenance 77</p> <p style="margin:0px;">4.0 Introduction 77</p> <p style="margin:0px;">4.1 Preventive Maintenance 77</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;4.1.1 PC Preventive Maintenance Overview 77</p> <p style="margin:0px;">4.2 Troubleshooting Process 81</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;4.2.1 Troubleshooting Process Steps 81</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;4.2.2 Common Problems and Solutions 85</p> <p style="margin:0px;">4.3 Chapter Summary 85</p> <p style="margin:0px;">Chapter 5 Windows Installation 89</p> <p style="margin:0px;">5.0 Introduction 89</p> <p style="margin:0px;">5.1 Modern Operating Systems 89</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.1.1 Operating System Terms and Characteristics 89</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.1.2 Types of Operating Systems 91</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.1.3 Customer Requirements for an Operating System 92</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.1.4 Operating Systems Upgrade 94</p> <p style="margin:0px;">5.2 Operating System Installation 96</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.2.1 Storage Device Setup Procedures 96</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.2.2 Custom Installation Options 104</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.2.3 Boot Sequence and Registry Files 108</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.2.4 Mulitiboot 110</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;5.2.5 Disk Directories 114</p> <p style="margin:0px;">5.3 Summary 117</p> <p style="margin:0px;">Chapter 6 Windows Configuration and Management 119</p> <p style="margin:0px;">6.0 Introduction 119</p> <p style="margin:0px;">6.1 The Windows GUI and Control Panel 119</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.1.1 Windows Desktop, Tools and Applications 119</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.1.2 Control Panel Utilities 125</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.1.3 Administrative Tools 135</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.1.4 Disk Defragmenter and Disk Error-Checking Tool 138</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.1.5 Command Line Tools 140</p> <p style="margin:0px;">6.2 Client-Side Virtualization 142</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.2.1 Purpose and Requirements of Virtualization 142</p> <p style="margin:0px;">6.3 Common Preventive Maintenance Techniques for Operating Systems 144</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.3.1 OS Preventive Maintenance Plan 144</p> <p style="margin:0px;">6.4 Basic Troubleshooting Process for Operating Systems 148</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.4.1 Applying the Troubleshooting Process for Operating Systems 148</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;6.4.2 Common Problems and Solutions for Operating Systems 149</p> <p style="margin:0px;">6.5 Chapter Summary 149</p> <p style="margin:0px;">Chapter 7 Networking Concepts 151</p> <p style="margin:0px;">7.0 Introduction 151</p> <p style="margin:0px;">7.1 Principles of Networking 151</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.1.1 Computer Networks 151</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.1.2 Types of Networks 154</p> <p style="margin:0px;">7.2 Networking Standards 156</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.2.1 Reference Models 156</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.2.2 Wired and Wireless Ethernet Standards 158</p> <p style="margin:0px;">7.3 Physical Components of a Network 160</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.3.1 Network Devices 160</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.3.2 Cables and Connectors 163</p> <p style="margin:0px;">7.4 Basic Networking Concepts and Technologies 166</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.4.1 Networked Equipment Addressing 166</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;7.4.2 Transport Layer Protocols 171</p> <p style="margin:0px;">7.5 Chapter Summary 173</p> <p style="margin:0px;">Chapter 8 Applied Networking 175</p> <p style="margin:0px;">8.0 Introduction 175</p> <p style="margin:0px;">8.1 Computer to Network Connection 175</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.1.1 Networking Cards 175</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.1.2 Wireless and Wired Router Configurations 178</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.1.3 Network Sharing 184</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.1.4 Remote Connections 188</p> <p style="margin:0px;">8.2 ISP Connection Technologies 190</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.2.1 Broadband Technologies 190</p> <p style="margin:0px;">8.3 Internet Technologies 194</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.3.1 Data Centers and Cloud Computing 194</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.3.2 Networked Host Services 196</p> <p style="margin:0px;">8.4 Common Preventive Maintenance Techniques Used for Networks 199</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.4.1 Network Maintenance 199</p> <p style="margin:0px;">8.5 Basic Troubleshooting Process for Networks 200</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.5.1 Applying the Troubleshooting Process to Networks 200</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;8.5.2 Common Problems and Solutions for Networks 201</p> <p style="margin:0px;">8.6 Chapter Summary 201</p> <p style="margin:0px;">Chapter 9 Laptops and Mobile Devices 203</p> <p style="margin:0px;">9.0 Introduction 203</p> <p style="margin:0px;">9.1 Laptop Components 203</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.1.1 Features of Laptop Components 203</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.1.2 Laptop Displays 207</p> <p style="margin:0px;">9.2 Laptop Configuration 208</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.2.1 Power Settings Configuration 208</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.2.2 Wireless Configuration 210</p> <p style="margin:0px;">9.3 Laptop Hardware and Component Installation and Configuration 212</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.3.1 Expansion Slots 212</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.3.2 Replacing Hardware Devices 215</p> <p style="margin:0px;">9.4 Mobile Device Hardware Overview 223</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.4.1 Mobile Device Hardware 223</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.4.2 Other Mobile Devices 227</p> <p style="margin:0px;">9.5 Common Preventive Maintenance Techniques for Laptops and Mobile Devices 229</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.5.1 Scheduled Maintenance for Laptops and Mobile Devices 229</p> <p style="margin:0px;">9.6 Basic Troubleshooting Process for Laptops and Mobile Devices 231</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.6.1 Applying 231</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;9.6.2 Common Problems and Solutions for Laptops and Mobile Devices 232</p> <p style="margin:0px;">9.7 Chapter Summary 232</p> <p style="margin:0px;">Chapter 10 Mobile, Linux, and OS X Operating Systems 235</p> <p style="margin:0px;">10.0 Introduction 235</p> <p style="margin:0px;">10.1 Mobile Operating Systems 235</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.1.1 Android vs. iOS 235</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.1.2 Android Touch Interface 238</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.1.3 iOS Touch Interface 241</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.1.4 Windows Phone Touch Interface 244</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.1.5 Common Mobile Device Features 245</p> <p style="margin:0px;">10.2 Methods for Securing Mobile Devices 250</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.2.1 Passcode Locks 250</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.2.2 Cloud-Enabled Services for Mobile Devices 253</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.2.3 Software Security 255</p> <p style="margin:0px;">10.3 Network Connectivity and Email 257</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.3.1 Wireless and Cellular Data Network 257</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.3.2 Bluetooth 260</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.3.3 Configuring Email 262</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.3.4 Mobile Device Synchronization 265</p> <p style="margin:0px;">10.4 Linux and OS X Operating Systems 268</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.4.1 Linux and OS X Tools and Features 268</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.4.2 Linux and OS X Best Practices 272</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.4.3 Basic CLI 274</p> <p style="margin:0px;">10.5 Basic Troubleshooting Process for Mobile, Linux, and OS X Operating Systems 276</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.5.1 Applying the Troubleshooting Process to Mobile, Linux, and OS X Operating Systems 276</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;10.5.2 Common Problems and Solutions for Mobile, Linux, and OS X Operating Systems 277</p> <p style="margin:0px;">10.6 Chapter Summary 278</p> <p style="margin:0px;">Chapter 11 Printers 281</p> <p style="margin:0px;">11.0 Introduction 281</p> <p style="margin:0px;">11.1 Common Printer Features 281</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.1.1 Characteristics and Capabilities 281</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.1.2 Printer Types 283</p> <p style="margin:0px;">11.2 Installing and Configuring Printers 287</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.2.1 Installing and Updating a Printer 287</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.2.2 Configuring Options and Default Settings 290</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.2.3 Optimizing Printer Performance 292</p> <p style="margin:0px;">11.3 Sharing Printers 293</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.3.1 Operating System Settings for Sharing Printers 293</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.3.2 Print Servers 295</p> <p style="margin:0px;">11.4 Maintaining and Troubleshooting Printers 297</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.4.1 Printer Preventive Maintenance 297</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.4.2 Troubleshooting Printer Issues 299</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;11.4.3 Common Problems and Solutions for Printers 300</p> <p style="margin:0px;">11.5 Chapter Summary 300</p> <p style="margin:0px;">Chapter 12 Security 303</p> <p style="margin:0px;">12.0 Introduction 303</p> <p style="margin:0px;">12.1 Security Threats 303</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.1.1 Types of Security Threats 303</p> <p style="margin:0px;">12.2 Security Procedures 307</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.2.1 Windows Local Security Policy 307</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.2.2 Securing Web Access 309</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.2.3 Protecting Data 312</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.2.4 Protection Against Malicious Software 317</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.2.5 Security Techniques 319</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.2.6 Protecting Physical Equipment 323</p> <p style="margin:0px;">12.3 Common Preventive Maintenance Techniques for Security 326</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.3.1 Security Maintenance 326</p> <p style="margin:0px;">12.4 Basic Troubleshooting Process for Security 331</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.4.1 Applying the Troubleshooting Process to Security 331</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;12.4.2 Common Problems and Solutions for Security 332</p> <p style="margin:0px;">12.5 Summary 333</p> <p style="margin:0px;">Chapter 13 The IT Professional 335</p> <p style="margin:0px;">13.0 Introduction 335</p> <p style="margin:0px;">13.1 Communication Skills and the IT Professional 335</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;13.1.1 Communication Skills, Troubleshooting and the IT Professional 335</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;13.1.2 Working with a Customer 336</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;13.1.3 Employee Best Practices 339</p> <p style="margin:0px;">13.2 Ethical and Legal Issues in the IT Industry 341</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;13.2.1 Ethical and Legal Considerations 341</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;13.2.2 Legal Procedures Overview 344</p> <p style="margin:0px;">13.3 Call Center Technicians 347</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;13.3.1 Call Centers, Level One Technicians, and Level Two Technicians 347</p> <p style="margin:0px;">13.4 Chapter Summary 348</p> <p style="margin:0px;">Chapter 14 Advanced Troubleshooting 351</p> <p style="margin:0px;">14.0 Introduction 351</p> <p style="margin:0px;">14.1 Computer Components and Peripherals 351</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;14.1.1 Apply Troubleshooting Process to Computer Components and Peripherals 351</p> <p style="margin:0px;">14.2 Operating Systems 352</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;14.2.1 Apply Troubleshooting Process to Operating Systems 352</p> <p style="margin:0px;">14.3 Networks 352</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;14.3.1 Apply Troubleshooting Process to Networks 352</p> <p style="margin:0px;">14.4 Security 353</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;14.4.1 Apply Troubleshooting Process to Security 353</p> <p style="margin:0px;">14.5 Chapter Summary 354</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">9781587133565&nbsp;&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 4/22/2016</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">&nbsp;</p> <!--[if gte mso 9]><xml> Normal 0 false false false EN-US X-NONE X-NONE </xml><![endif]--> <!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <![endif]--> <p style="margin:0px;">&nbsp;</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        IT Essentials Course Booklet, Version 6