Get our Bestselling Ethical Hacker Course V13 for Only $12.99

For a limited time, check out some of our most popular courses for free on Udemy.  View Free Courses.

New To IT Tech Training Series – Deal

Course Level: Beginner
Duration: 146 Hrs 12 Min
Total Videos: 868 On-demand Videos

Learn essential IT skills for beginners to support Windows systems, troubleshoot issues, and secure data, preparing for entry-level IT support roles.

Course Description

If you’re new to IT, this training series is your practical starting point. Imagine being able to troubleshoot a Windows PC, set up a basic network, or secure a small business’s data — right from the first week on the job. This bundle is designed to give you the essential skills needed for entry-level IT roles, such as help desk technician or IT support specialist.

The collection includes nine beginner-friendly courses that cover core IT concepts. You’ll learn about operating systems like Windows 10 and Windows Server, basic networking principles, fundamental security practices, and troubleshooting techniques. Each course emphasizes hands-on, real-world skills so you can confidently support users and solve common IT problems from day one.

What makes this training stand out is its focus on practical application. Instead of just theory, you’ll gain experience through guided labs, home lab setups, and scenarios that mirror actual workplace challenges. This approach helps you develop skills you can demonstrate immediately, giving you a competitive edge as you start your IT career.

What You Will Learn

This program provides a comprehensive foundation in essential IT skills. By completing these courses, you will be able to:

  • Diagnose and resolve typical Windows PC issues, including startup problems and software conflicts.
  • Configure and manage Windows 10 settings to optimize user productivity and security.
  • Understand basic networking concepts such as IP addressing, DNS, and network troubleshooting techniques.
  • Implement fundamental security practices to protect data and prevent common cyber threats.
  • Install, configure, and manage Windows Server environments at a basic level.
  • Apply troubleshooting steps for common printer, hardware, and connectivity issues.
  • Set up a home lab environment to practice and reinforce learning without needing a corporate network.
  • Identify and address security vulnerabilities in Windows and network settings.
  • Develop confidence in supporting end-users through effective communication and problem-solving skills.

Who This Course Is For

This training series is ideal for individuals just starting their IT journey or looking to build a solid foundation in technology. It’s perfect for aspiring IT help desk staff, recent graduates interested in IT support, or professionals transitioning into IT roles from other fields. No prior experience is required, but basic computer literacy will help you get the most out of the courses.

Specifically, the ideal students include:

  • Help desk analysts aiming to improve troubleshooting skills
  • IT generalists seeking a broad understanding of core technologies
  • Business support staff who want to learn IT fundamentals
  • Career changers exploring entry-level IT roles
  • Anyone interested in starting a career in information technology with practical, job-ready skills

Why These Skills Matter

Building strong foundational IT skills opens doors to numerous entry-level opportunities. Employers value candidates who can confidently support Windows environments, troubleshoot common issues, and implement basic security protocols. This training prepares you to step into roles that demand practical knowledge, giving you a tangible advantage in a competitive job market.

By mastering these core competencies, you position yourself as a reliable team member capable of supporting everyday IT operations. Whether you aim to move into help desk support, system administration, or network support, this bundle helps you develop the essential skills that employers look for. It’s a strategic investment in your career, providing the confidence and practical experience needed to succeed in today’s IT landscape.

Who Benefits From This Course

Frequently Asked Questions

Is this IT training series suitable for complete beginners with no prior experience?

Yes, this training series is specifically designed for individuals who are new to IT and have little to no prior experience. It provides a comprehensive foundation of core IT concepts, including basic networking, operating systems, security practices, and troubleshooting techniques.

The courses emphasize practical, hands-on learning through guided labs and real-world scenarios, making complex topics accessible for beginners. Whether you're aiming to become a help desk technician or support specialist, this program prepares you with the essential skills needed for entry-level IT roles. Overall, no prior technical background is required, but basic computer literacy will help you get started more comfortably.

What certifications or industry standards does this training prepare me for, such as CompTIA A+ or Microsoft certifications?

This training series acts as a strong foundational program that aligns well with certifications like CompTIA A+ and Microsoft Certified: Windows Client or Windows Server fundamentals. While it does not directly prepare you for a specific certification exam, the skills covered—such as troubleshooting, Windows configuration, basic networking, and security—are core components of these certifications.

Completing this training can significantly boost your confidence and knowledge base, making it easier to pursue and succeed in certifications like the CompTIA A+ (exam codes 220-1101 and 220-1102) or Microsoft’s fundamental certifications. These certifications are highly valued in the industry for entry-level roles and can serve as a stepping stone for more advanced IT certifications and career growth.

How does this training help me develop practical skills for real-world IT support jobs?

The program emphasizes hands-on, real-world skills through guided labs, home lab setups, and scenario-based exercises that mirror workplace challenges. This approach allows you to practice troubleshooting common hardware and software issues, configure network settings, and secure systems in a controlled environment.

By engaging with practical scenarios, you learn how to diagnose and resolve typical problems encountered by help desk technicians and IT support staff. This experience not only builds your confidence but also demonstrates your ability to handle real job tasks from day one. The focus on practical application makes you job-ready and better prepared to support end-users effectively.

What are the key topics covered in this beginner IT training series?

The training covers a broad range of fundamental IT topics, including operating systems like Windows 10 and Windows Server, basic networking concepts such as IP addressing and DNS, security best practices, and troubleshooting techniques. It also includes setting up and managing hardware devices, configuring wireless networks, and understanding core IT terminology.

This comprehensive curriculum ensures that learners gain a well-rounded understanding of essential technologies, enabling them to support Windows environments, troubleshoot common issues, and implement basic security measures. The focus on core skills prepares you for a variety of entry-level IT positions and helps lay the groundwork for further specialization.

What career benefits can I expect after completing this IT training series?

Completing this training series provides you with practical skills that are highly valued in entry-level IT roles such as help desk technician, IT support specialist, or general IT assistant. The foundational knowledge in Windows, networking, security, and troubleshooting makes you a more competitive candidate in the job market.

Additionally, the program helps you develop confidence in supporting end-users, managing basic IT environments, and solving common technical problems. As a result, you can expect increased employability, opportunities for career growth, and a solid stepping stone toward more advanced certifications and specialized roles in IT. The skills gained can also open doors to various industries that rely on IT support for daily operations.

Included In This Course

Module 1 - Devices, Setups, and Installs

  •    1.1 Introduction to the Course, Meet the Instructor
  •    1.2 Appropriate Safety Procedures
  •    1.3 PC Components
  •    1.4 Guidlines for PC Disassembly
  •    1.5 Motherboards
  •    1.6 CPU Sockets
  •    1.7 PCI Bus
  •    1.8 Storage Bus (SATA and IDE)
  •    1.9 Discussing PC Components
  •    1.10 Common Connection Interfaces
  •    1.11 Wired and Wireless Connection Standards
  •    1.12 Install Peripheral Devices
  •    1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices

  •    2.1 Displays and Multimedia
  •    2.2 Display Device Connections and Cables
  •    2.3 Discussing Display Device Installation and Configuration
  •    2.4 Troubleshoot Display Devices
  •    2.5 Guidelines for Troubleshooting Display Devices
  •    2.6 Discussing Display Device Troubleshooting
  •    2.7 Install and Configure Multimedia Devices
  •    2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types

  •    3.1 Supporting Multiple Drive Types and Memory
  •    3.2 Memory Types
  •    3.3 RAM Types
  •    3.4 Memory Modules
  •    3.5 DIMM and SO-DIMM Technologies
  •    3.6 Parity and ECC RAM
  •    3.7 Memory Compatibility Issues
  •    3.8 Discussing System Memory Installation
  •    3.9 Install and Configure Mass Storage Devices
  •    3.10 Storage Adapters and Cables
  •    3.11 Solid State Drives
  •    3.12 Guidlines for Installing Mass Storage Devices
  •    3.13 Discussing Mass Storage Device Installation and Configuration
  •    3.14 Install and Configure Removable Storage
  •    3.15 Discussing Removable Storage Device Istallation and Configuration
  •    3.16 Configure RAID
  •    3.17 RAID Configuration Options
  •    3.18 Discussing RAID Configuration
  •    3.19 Troubleshoot Storage Devices
  •    3.20 Boot Failures
  •    3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components

  •    4.1 Install Upgrade CPUs
  •    4.2 Multiprocessing and Multicore Processors
  •    4.3 Discussing CPU Upgrades
  •    4.4 Configure and Update BIOS UEFI
  •    4.5 Discussing BOIS-UEFI Configuration and Updates
  •    4.6 Install Power Supplies
  •    4.7 Discussing Power Supply Installation
  •    4.8 Troubleshoot Internal System Components
  •    4.9 POST and Boot Problems
  •    4.10 Boot Troubleshooting and Log Entries
  •    4.11 Motherboard Component Problems
  •    4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories

  •    5.1 Wired Networks
  •    5.2 Common Ethernet Network Implementations
  •    5.3 Taps and Mirrors
  •    5.4 Discussing Wired Networks
  •    5.5 Network Hardware Devices
  •    5.6 Switches
  •    5.7 Power Over Ethernet
  •    5.8 Discussing Network Hardware Devices
  •    5.9 Wireless Networks
  •    5.10 Access Points and Wireless Network Modes
  •    5.11 Discussing Wireless Networks
  •    5.12 Internet Connection Types
  •    5.13 Wireless Internet Service Providers WISP
  •    5.14 Discussing Internet Connection Types
  •    5.15 Network Configuration Concepts
  •    5.16 The TCIP-IP Protocol Suite
  •    5.17 Internet Protocol and IP Addressing
  •    5.18 Public and Private IP Addresses
  •    5.19 IPv6
  •    5.20 Discussing Network Configuration Concepts
  •    5.21 Network Services
  •    5.22 DNS
  •    5.23 Dynamic and Static IP Configurations
  •    5.24 DNS Records MX and A
  •    5.25 Web Servers and HTTP-HTTPS
  •    5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics

  •    6.1 Configuring and Troubleshooting Networks
  •    6.2 Network Connections in Windows
  •    6.3 Install and Configure SOHO Networks
  •    6.4 Configure SOHO Network Security
  •    6.5 Firewalls
  •    6.6 Port Fowarding and Port Triggering
  •    6.7 Windows Firewall
  •    6.8 Network Security and Embedded Appliances
  •    6.9 Configure Remote Access
  •    6.10 Discussing Remote Access Configuration
  •    6.11 Troubleshoot Network Connections
  •    6.12 IP Configuration Issues
  •    6.13 Routing Issues
  •    6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing

  •    7.1 Configure Client-Side Virtulaization
  •    7.2 Hypervisors
  •    7.3 Processor Support and Resource Requirements
  •    7.4 Virtual Networks
  •    7.5 Client-Side Virtualization
  •    7.6 Cloud Computing Concepts
  •    7.7 Internal and External Shared Resources
  •    7.8 Cloud Service Options
  •    7.9 Virtual Desktops
  •    7.10 Software-Defined Networking (SDN)
  •    7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting

  •    8.1 Use Laptop Features
  •    8.2 Expansion Options
  •    8.3 Discussing Laptop Features
  •    8.4 Install and Configure Laptop Hardware
  •    8.5 Discussing Laptop Hardware Installation and Configuration
  •    8.6 Troubleshoot Common Laptop Issues
  •    8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices

  •    9.1 Syncing and Setup of Mobile Devices
  •    9.2 Connect and Configure Mobile Devices
  •    9.3 Configure Mobile Device Network Connectivity
  •    9.4 Mobile VPN Configuration
  •    9.5 Email Configuration Options
  •    9.6 Discussing Mobile Device Network Connectivity Configuration
  •    9.7 Support Mobile Apps
  •    9.8 Discussing Mobile App Support

Module 10 - All Things Printing

  •    10.1 All Things Printing
  •    10.2 Discussing Laser Printer Maintenance
  •    10.3 Maintain Inkjet Printers
  •    10.4 Discussing Inkjet Printer Maintenance
  •    10.5 Maintain Impact, Thermal, and 3D Printers
  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
  •    10.7 Install and Configure Printers
  •    10.8 Discussing Printer Installation and Configuration
  •    10.9 Troubleshoot Print Device Issues
  •    10.10 Install and Configure Imaging Devices
  •    10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing
  •    11.2 Resources and Testing
  •    11.3 Joining a Domain with Windows 10
  •    11.4 Boot Order and BIOS
  •    11.5 Virtual Machine Install & Configure
  •    11.6 PC Teardown
  •    11.7 Exploring the Laptop
  •    11.8 Install Windows 10 Demonstration

Module 1 - Operating System Management

  •    1.1 Introduction to the Course, Meet the Instructor
  •    1.2 Identify Common Operating Systems
  •    1.3 Microsoft Windows
  •    1.4 Work and Education Features
  •    1.5 Windows System Limits
  •    1.6 Apple Operating Systems
  •    1.7 Linux Disk and File Management
  •    1.8 Discussing OS Types
  •    1.9 Use Windows Features and Tools
  •    1.10 Administrative Tools
  •    1.11 Manage Files in Windows
  •    1.12 System Hierarchies
  •    1.13 File Attributes
  •    1.14 Discussing Windows Features and Tools
  •    1.15 Manage Disks in Windows
  •    1.16 Discussing File Management in Windows
  •    1.17 The Windows Disk Management Console
  •    1.18 Discussing Windows Disk Management
  •    1.19 Manage Devices in Windows
  •    1.20 Device Manager
  •    1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS

  •    2.1 Configuring and Installing the OS
  •    2.2 Installation Boot Methods
  •    2.3 Disk Formatting and Partitioning
  •    2.4 Networking Considerations
  •    2.5 Post Installation Tasks
  •    2.6 OS Installation Types
  •    2.7 Unattended Installations
  •    2.8 Maintain OSs
  •    2.9 OS Updates
  •    2.10 Anti-Malware Updates
  •    2.11 Scheduled Backups
  •    2.12 Task Schedulers part 1
  •    2.13 Task Schedulers part 2
  •    2.14 Install Windows 10 Demonstration
  •    2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS

  •    3.1 Install and Manage Windows Applications
  •    3.2 Windows OS Tools
  •    3.3 Application and Print Services
  •    3.4 Task Manager
  •    3.5 Manage Windows Performance
  •    3.6 Windows Performance Management Tools
  •    3.7 Troubleshoot Windows
  •    3.8 Event Viewer
  •    3.9 The System Configuration Utility
  •    3.10 Troubleshooting Tips Boot Process
  •    3.11 Troubleshooting Tips for Windows System Issues
  •    3.12 Blue Screens and Spontaneous Shutdowns
  •    3.13 Troubleshooting Tips for File and Memory Corruption
  •    3.14 Safe Boot
  •    3.15 System Repair Disc
  •    3.16 System Restore
  •    3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools

  •    4.1 Network Management Tools
  •    4.2 Network Connectivity
  •    4.3 IP Addressing and Connection Types
  •    4.4 Proxy Settings
  •    4.5 Windows Client Configuration
  •    4.6 Location Services
  •    4.7 Firewalls
  •    4.8 Network Troubleshooting
  •    4.9 Remote Desktop Tools
  •    4.10 Desktop Management and Remote Monitoring Tools
  •    4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management

  •    5.1 Sharing Resources and Wrights Management
  •    5.2 User Group Accounts
  •    5.3 Local Secutity Policy
  •    5.4 SSO and Credential Manager
  •    5.5 Workgroups and Homegroups
  •    5.6 Network and Sharing Center
  •    5.7 Network Share Configuration
  •    5.8 NTSF File and Folder Permissions
  •    5.9 Configure Active Directory Accounts and Policies
  •    5.10 Domain Membership and Group Policy Objects
  •    5.11 Basic AD Functions
  •    5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures

  •    6.1 Threats and Security Measures
  •    6.2 Logical Security Concepts
  •    6.3 Encryption
  •    6.4 PKI and Certificates
  •    6.5 Execution Control
  •    6.6 NAC
  •    6.7 Discussing Logical Decurity Concepts
  •    6.8 Threats and Vulnerablilities
  •    6.9 Types of Password Attacks
  •    6.10 Discussing Threats and Vulnerabilities
  •    6.11 Physical Security Controls
  •    6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data

  •    7.1 Policies to Protect Data
  •    7.2 Implement Security Best Practices
  •    7.3 Guidlines for Implementing Security Best Practices
  •    7.4 Discussing Security Best Practices Implementation
  •    7.5 Implement Data Protection Policies
  •    7.6 ACLs and Directory Permissions
  •    7.7 Full Disk Encryption
  •    7.8 Guildlines for Implementing Data Protection Policies
  •    7.9 Discussing Data Protection Policies
  •    7.10 Protect Data During Incident Response
  •    7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats

  •    8.1 Prevent Malware and Security Threats
  •    8.2 Detect, Remove, and Prevent Malware
  •    8.3 Trojan Horses and Spyware
  •    8.4 Sources of Malware Infection
  •    8.5 Best Practices for Malware Removal
  •    8.6 Discussing Detecting, Removing, and Preventing Malware Infections
  •    8.7 Troubleshoot Common Workstation Security Issues
  •    8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices

  •    9.1 Supporting and Troubleshooting Mobile Devices
  •    9.2 Secure Mobile Devices
  •    9.3 IOT Internet of Things
  •    9.4 Discussing Mobile Device Security
  •    9.5 Troubleshoot Mobile Device Issues
  •    9.6 Mobile Device Security Troubleshooting
  •    9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures

  •    10.1 Implementing Operational Procedures
  •    10.2 Environmental Impacts and Controls
  •    10.3 Discussing Environmental Impact and Controls
  •    10.4 Create and Maintain Documentation
  •    10.5 Discussing Documentation Creation and Maintenance
  •    10.6 Use Basic Change Management Best Practices
  •    10.7 Discussing Change Management Best Practices
  •    10.8 Implement Disaster Prevention and Recovery Methods
  •    10.9 Discussing Implement Disaster Prevention and Recovery Methods
  •    10.10 Basic Scripting Concepts
  •    10.11 Discussing Scripting
  •    10.12 Professionalism and Communication
  •    10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing
  •    11.2 Resources and Testing
  •    11.3 Joining a Domain with Windows 10
  •    11.4 Boot Order and BIOS
  •    11.5 Virtual Machine Install & Configure
  •    11.6 PC Teardown
  •    11.7 Exploring the Laptop
  •    11.8 Install Windows 10 Demonstration

Module 0 - Course introduction

  •    0.1 Instructor Intro
  •    0.2 Course Overview

Module 1 - Networking Fundamentals

  •    1.1 Intro to Networking
  •    1.1.1 Activity: Creating a Network
  •    1.2 Common Terminology
  •    1.2.1 Activity: Examining Ports and Sockets
  •    1.3 OSI Model
  •    1.4 DoD Model
  •    1.4.1 Activity: Examining Network Layers
  •    1.5 TCP, UDP, IP
  •    1.5.1 Activity: Examining TCP
  •    1.5.2 Activity: Examining UDP
  •    1.5.3 Activity: Examining IP
  •    1.6 ICMP, IGMP, ARP
  •    1.6.1 Activity: Examining ICMP
  •    1.6.2 Activity: Examining ARP
  •    1.6.3 Activity: Examining IGMP
  •    1.7 Network Topologies
  •    1.8 Network Types
  •    1.9 Part 1: Network Characteristics
  •    1.9 Part 2: Network Characteristics
  •    1.10 Module 1 outro

Module 2 - Cables and Connectors

  •    2.1 Ethernet Standards
  •    2.2 Copper Cable Types
  •    2.3 Fiber Optic Cable Types
  •    2.4 Connector Types
  •    2.4.1 Activity: Selecting the Right Cable
  •    2.5 Media Converters and Transceivers
  •    2.6 Cable Management
  •    2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)

  •    3.1 IPv4 Basics
  •    3.2 IP Packet and Interface Types
  •    3.2.1 Activity: Configuring Client IP Settings
  •    3.3 Binary Numbering System
  •    3.4 Classful and Classless Addressing
  •    3.5 Understanding CIDR Notation
  •    3.6 IPv4 Subnetting Method
  •    3.7 Verifying with Binary
  •    3.8 Finding Subnet IDs
  •    3.8.1 Activity: Subnetting a Class C Network
  •    3.9 The Delta in Action
  •    3.9.1 Activity: Subnetting With the Delta
  •    3.10 Subnetting Based on Hosts
  •    3.11 Subnetting in Other Octets
  •    3.12 Supernetting
  •    3.12.1 Activity: Supernetting
  •    3.13 IPv6
  •    3.14 IPv4 - IPv6 Transition Mechanisms
  •    3.15 Module 3 Outro

Module 4 - Layer 7 Protocols

  •    4.1 Remote Control Protocols
  •    4.2 File Sharing Protocols
  •    4.3 Web Protcols
  •    4.4 Email Protocols
  •    4.5 Database Protocols
  •    4.6 Voice Protocols
  •    4.7 Security Protocols
  •    4.8 Management Protocols
  •    4.9 Module 4 Outro

Module 5 - Network Services

  •    5.1 DHCP
  •    5.1.1 Activity: Configuring DHCP
  •    5.1.2 Activity: Configuring a DHCP Relay Agent
  •    5.2 DNS
  •    5.2.1 Activity: Configuring DNS - Part 1
  •    5.2.2 Activity: Configuring DNS - Part 2
  •    5.3 NTP
  •    5.4 Corporate and Datacenter Network Architecture
  •    5.5 Cloud Concepts and Connectivity Options
  •    5.6 Module 5 Outro

Module 6 - Networking Devices

  •    6.1 Introductory Concepts
  •    6.2 Repeaters and Hubs
  •    6.2.1 Activity: Connecting Devices with a Hub
  •    6.3 Bridges and Switches
  •    6.3.1 Activity: Connecting Devices with a Switch
  •    6.4 Routers and Multilayer Switches
  •    6.5 Security Devices
  •    6.6 Modems
  •    6.7 Module 6 Outro

Module 7 - Networked Devices

  •    7.1 IP Devices
  •    7.2 IoT
  •    7.2.1 Activity - Programming IoT Devices
  •    7.3 ICS/SCADA
  •    7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management

  •    8.1 Routing Basics
  •    8.1.1 Activity: Configuring Static Routes
  •    8.2 Packet Delivery on the Same Network
  •    8.3 IP Routing Across a Single Router
  •    8.4 IP Routing Across Multiple Hops
  •    8.4.1 Activity: Static Routes - CHALLENGE
  •    8.5 Route Selection
  •    8.6 RIP
  •    8.6.1 Activity: Configuring RIP - CHALLENGE
  •    8.7 OSPF
  •    8.8 EIGRP
  •    8.9 BGP
  •    8.10 NAT/PAT
  •    8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching

  •    9.1 Ethernet Basics
  •    9.2 Switching Overview
  •    9.2.1 Activity: Examining a MAC Table
  •    9.3 VLANs
  •    9.3.1 Activity: Creating VLANs
  •    9.4 VLAN Trunking
  •    9.4.1 Activity: Configuring VLAN Trunking
  •    9.5 VLAN Routing
  •    9.5.1 Activity: Configuring VLAN Routing
  •    9.6 Contention Management
  •    9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies

  •    10.1 Wireless Overview
  •    10.2 Radio Basics
  •    10.3 Modulation
  •    10.4 Wi-Fi Standards
  •    10.5 Antennas
  •    10.6 Wi-Fi Service Sets
  •    10.7 Wi-Fi Security
  •    10.8 Cellular

Module 11 Network Performance

  •    11.1 Monitoring Performance
  •    11.2 Common Metrics
  •    11.2.1 Activity: Examining Interface Statistics
  •    11.3 SNMP
  •    11.4 Netflow
  •    11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery

  •    12.1 HA and DR Concepts
  •    12.2 High Availability Mechanisms
  •    12.3 Disaster Recovery Mechanisms
  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents

  •    13.1 Plans and Procedures
  •    13.2 Security Policies
  •    13.3 Loss Prevention
  •    13.4 Common Agreements
  •    13.5 Common Documentation
  •    13.6 Structured Cabling - MDF and IDF
  •    13.7 Horizontal and Vertical Cabling
  •    13.7.1 Activity - Implementing Cable Management
  •    13.8 Labeling
  •    13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security

  •    14.1 Common Security Concepts
  •    14.2 Common Attack Types
  •    14.3 Spoofing-based Attacks
  •    14.4 Hijacking and MITM
  •    14.5 Social Engineering
  •    14.6 Network Segmentation
  •    14.7 Private VLANs
  •    14.8 Single Organization Authentication
  •    14.9 Extending Authentication
  •    14.10 Authorization
  •    14.11 Network Device Hardening
  •    14.12 Wireless Security
  •    14.13 Remote Access Security
  •    14.14 IoT Security
  •    14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting

  •    15.1 Troubleshooting Methodology
  •    15.2 Physical Connectivity Issues
  •    15.3 Hardware Testing Tools
  •    15.3.1 Activity - Testing an Ethernet Cable
  •    15.3.2 Activity - Crimping on an RJ-45 Connector
  •    15.3.3 Activity - Punching Down Twisted Pair
  •    15.3.4 Activity - Using a Telephone Toner
  •    15.4 Understanding Electricity
  •    15.4.1 Activity - Checking Cable Continuity
  •    15.4.2 Activity - Testing DC Voltage
  •    15.4.3 Activity - Testing AC Voltage
  •    15.5 Twisted Pair Pinout Problems
  •    15.6 Twisted Pair Termination Problems
  •    15.7 Repairing Damaged Twisted Pair Cable
  •    15.8 Fiber Optic Connectivity Issues
  •    15.8.1 Activity - Testing a Fiber Optic Cable
  •    15.9 Common Port Problems
  •    15.9.1 Working with Ports and Their Devices
  •    15.10 Common Software Testing Tools
  •    15.10.1 Activity - Scanning for Open Ports
  •    15.11 Common Command Line Utilities
  •    15.12 Troubleshooting Basic IP Networking Issues
  •    15.13 Common Switching Issues
  •    15.14 Switching Test Tools and Techniques
  •    15.15 Common IP Routing Issues
  •    15.16 Wi-Fi Access Point Issues
  •    15.17 Wirelss Interference
  •    15.17.1 Activity - Using a Spectrum Analyzer
  •    15.18 Wireless Antenna Issues
  •    15.18.1 Activity - Configuring a Wi-Fi Router
  •    15.19 WAP Placement Strategies
  •    15.20 Infrastructure Service Issues (DHCP)
  •    15.21 Infrastructure Service Issues (DNS)
  •    15.22 Infrastructure Service Issues (NTP)
  •    15.23 Fireall / ACL Issues
  •    15.24 VPN Issues
  •    15.25 Additional Network Security Troubleshooting and Tips
  •    15.26 Advanced Networking Issues
  •    15.27 Troubleshooting Server Services (with Module 15 Outro)
  •    CompTIA Network+ N10-008 Course Outro

Module 1 - IT Concepts and Terminology

  •    Module 1 Notes
  •    0.1 Instructor Intro
  •    1.1 Compare and Contrast Notational Systems
  •    1.1 Compare and Contrast Notational Systems Demo
  •    1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
  •    1.3 Illustrate the Basics of Computing and Processing
  •    1.4 Explain the Value of Data and Information
  •    1.5 Compare and Contrast Common Units of Measures
  •    1.5 Compare and Contrast Common Units of Measures Demo
  •    1.6 Explain the Troubleshooting Methodology

Module 2 - Infrastructure

  •    Module 2 Notes
  •    2.1 Classify Common Types of Input-Output Device Interfaces
  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  •    2.3 Explain the Purpose of Common Internal Computing Components
  •    2.4 Compare & Contrast Common Internet Service Types-
  •    2.5 Compare & Contrast Storage Types
  •    2.6 Compare & Contrast Common Computing Devices & Their Purposes
  •    2.7 Explain Basic Networking Concepts
  •    2.7 Explain Basic Networking Concepts Demo
  •    2.7 Explain Basic Networking Concepts Part 2
  •    2.7 Explain Basic Networking Concepts Part 3
  •    2.7 Explain Basic Networking Concepts Part 4
  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

Module 3 - Applications and Software

  •    Module 3 Notes
  •    3.1 Explain the Purpose of Operating Systems
  •    3.1 Explain the Purpose of Operating Systems Demo
  •    3.2 Compare & Contrast Components of an Operating System
  •    3.2 Compare & Contrast Components of an Operating System Demo
  •    3.3 Explain the Purpose & Proper Use of Software
  •    3.4 Explain Methods of Application Architecture & Delivery Models
  •    3.5 Given a Scenario Configure & Use Web Browsers
  •    3.5 Given a Scenario Configure & Use Web Browsers FireFox
  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
  •    3.6 Compare & Contrast General Application Concepts & Uses

Module 4 - Software Development

  •    Module 4 Notes
  •    4.1 Compare & Contrast Programming Language Categories-
  •    4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
  •    4.3 Explain the Purpose & Use of Programming Concepts-
  •    4.3 HTML Demo

Module 5 - Database Fundamentals

  •    Module 5 Notes
  •    5.1 Explain Database Concepts and the Purpose of Databases
  •    5.2 Compare and Contrast Various Database Structures
  •    5.3 Summarize Methods Used to Interface with Databases
  •    5.3 Summarize Methods Used to Interface with Databases Demo

Module 6 - Security

  •    Module 6 Notes
  •    6.1 Summarize Confidentiality, Integrity, and Availability Concerns
  •    6.2 Explain Methods to Secure Devices and Best Practices
  •    6.3 Summarize Behavioral Security Concepts
  •    6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
  •    6.5 Explain Password Best Practices
  •    6.6 Explain Common Uses of Encryption
  •    6.7 Explain Business Continuity Concepts
  •    6.8 Takeaways-
  •    6.9 ITF Fundamentals Conclusion

Module 1 Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

Module 3 Managing Storage

Module 4 Monitoring and Troubleshooting Servers

Module 5 Essential Services

Module 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

Mod 8 Key Takeaways

Mod 9 Terms to Know

Mod 10 Hands on Labs

Module 1 Understanding Security Layers

Module 2 Authentication, Authorization, and Accounting

Module 3 Understanding Security Policies

Module 4 Understanding Network Security

Module 5 Locking Down Server and Client

Module 6 Key Takeaways

Module 7 Terms to Know

Module 1 Understanding Local Area Networking

Module 2 Defining Networks with the OSI Model

Module 3 Understanding Wired and Wireless Networks

Module 4 Understanding Internet Protocol

Module 5 Implementing TCP-IP in the command line

Module 6 Working with Networking Services

Module 7 Understanding Wide Area Networks

Module 8 Defining Network Infrastructure and Security

Module 9 Key Takeaways

Module 10 Terms to Know

Module 1 : Prepare for installation requirements

Module 2 : Install Windows

Module 3 : Configure devices and device drivers

Module 4 : Perform post-installation configuration

Module 5 : Implement Windows in an enterprise environment

Module 6 : Configure networking

Module 7 : Configure storage

Module 8 : Configure data access and usage

Module 9 : Implement Apps

Module 10 : Configure remote management

Module 11 : Configure Updates

Module 12 : Monitor Windows

Module 13 : Configure System and Data Recovery

Module 14 : Configure Authorization and Authentication

Module 15 : Configure Advanced Management Tools

Module 1: Getting Started With Windows 10

Module 2: Using File Explorer

Module 3: Using Windows Applications

Module 4: Browsing the Web With Microsoft Edge

Module 5: Customizing Windows

Module 6: Connecting Devices And Devices

Module 7: Managing User Accounts

Module 8: Backing Up Important Data

Module 9: Maintaining Windows

Module 10: Protecting Windows

Module 11: Monitoring Performance

Module 12: Working With Control Panel And Settings