| 1.1 |
Compare and contrast common operating system types and their purposes. |
Lessons
|
| 1.2 |
Compare and contrast features of Microsoft Windows versions |
Lessons
|
| 1.3 |
Summarize general OS installation considerations and upgrade methods. |
Lessons
|
| 1.4 |
Given a scenario, use appropriate Microsoft command line tools. |
Lessons
|
| 1.5 |
Given a scenario, use Microsoft operating system features and tools. |
Lessons
|
| 1.6 |
Given a scenario, use Microsoft Windows Control Panel utilities |
Lessons
|
| 1.7 |
Summarize application installation and configuration concepts. |
Lessons
|
| 1.8 |
Given a scenario, configure Microsoft Windows networking on a client/desktop. |
Lessons
|
| 1.9 |
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems. |
Lessons
|
| 2.1 |
Summarize the importance of physical security measures. |
Lessons
|
| 2.2 |
Explain logical security concepts. |
Lessons
|
| 2.3 |
Compare and contrast wireless security protocols and authentication methods. |
Lessons
|
| 2.4 |
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. |
Lessons
|
| 2.5 |
Compare and contrast social engineering, threats, and vulnerabilities. |
Lessons
|
| 2.6 |
Compare and contrast the differences of basic Microsoft Windows OS security settings. |
Lessons
|
| 2.7 |
Given a scenario, implement security best practices to secure a workstation. |
Lessons
|
| 2.8 |
Given a scenario, implement methods for securing mobile devices. |
Lessons
|
| 2.9 |
Given a scenario, implement appropriate data destruction and disposal methods. |
Lessons
|
| 2.10 |
Given a scenario, configure security on SOHO wireless and wired networks. |
Lessons
|
| 3.1 |
Given a scenario, troubleshoot Microsoft Windows OS problems. |
Lessons
|
| 3.2 |
Given a scenario, troubleshoot and resolve PC security issues. |
Lessons
|
| 3.3 |
Given a scenario, use best practice procedures for malware removal. |
Lessons
|
| 3.4 |
Given a scenario, troubleshoot mobile OS and application issues. |
Lessons
|
| 3.5 |
Given a scenario, troubleshoot mobile OS and application security issues. |
Lessons
|
| 4.1 |
Compare and contrast best practices associated with types of documentation. |
Lessons
|
| 4.2 |
Given a scenario, implement basic change management best practices. |
Lessons
|
| 4.3 |
Given a scenario, implement basic disaster prevention and recovery methods. |
Lessons
|
| 4.4 |
Explain common safety procedures. |
Lessons
|
| 4.5 |
Explain environmental impacts and appropriate controls |
Lessons
|
| 4.6 |
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts. |
Lessons
|
| 4.7 |
Given a scenario, use proper communication techniques and professionalism |
Lessons
|
| 4.8 |
Identify the basics of scripting. |
Lessons
|
| 4.9 |
Given a scenario, use remote access technologies. |
Lessons
|