1.1 |
Compare and contrast common operating system types and their purposes. |
Lessons
|
1.2 |
Compare and contrast features of Microsoft Windows versions |
Lessons
|
1.3 |
Summarize general OS installation considerations and upgrade methods. |
Lessons
|
1.4 |
Given a scenario, use appropriate Microsoft command line tools. |
Lessons
|
1.5 |
Given a scenario, use Microsoft operating system features and tools. |
Lessons
|
1.6 |
Given a scenario, use Microsoft Windows Control Panel utilities |
Lessons
|
1.7 |
Summarize application installation and configuration concepts. |
Lessons
|
1.8 |
Given a scenario, configure Microsoft Windows networking on a client/desktop. |
Lessons
|
1.9 |
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems. |
Lessons
|
2.1 |
Summarize the importance of physical security measures. |
Lessons
|
2.2 |
Explain logical security concepts. |
Lessons
|
2.3 |
Compare and contrast wireless security protocols and authentication methods. |
Lessons
|
2.4 |
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. |
Lessons
|
2.5 |
Compare and contrast social engineering, threats, and vulnerabilities. |
Lessons
|
2.6 |
Compare and contrast the differences of basic Microsoft Windows OS security settings. |
Lessons
|
2.7 |
Given a scenario, implement security best practices to secure a workstation. |
Lessons
|
2.8 |
Given a scenario, implement methods for securing mobile devices. |
Lessons
|
2.9 |
Given a scenario, implement appropriate data destruction and disposal methods. |
Lessons
|
2.10 |
Given a scenario, configure security on SOHO wireless and wired networks. |
Lessons
|
3.1 |
Given a scenario, troubleshoot Microsoft Windows OS problems. |
Lessons
|
3.2 |
Given a scenario, troubleshoot and resolve PC security issues. |
Lessons
|
3.3 |
Given a scenario, use best practice procedures for malware removal. |
Lessons
|
3.4 |
Given a scenario, troubleshoot mobile OS and application issues. |
Lessons
|
3.5 |
Given a scenario, troubleshoot mobile OS and application security issues. |
Lessons
|
4.1 |
Compare and contrast best practices associated with types of documentation. |
Lessons
|
4.2 |
Given a scenario, implement basic change management best practices. |
Lessons
|
4.3 |
Given a scenario, implement basic disaster prevention and recovery methods. |
Lessons
|
4.4 |
Explain common safety procedures. |
Lessons
|
4.5 |
Explain environmental impacts and appropriate controls |
Lessons
|
4.6 |
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts. |
Lessons
|
4.7 |
Given a scenario, use proper communication techniques and professionalism |
Lessons
|
4.8 |
Identify the basics of scripting. |
Lessons
|
4.9 |
Given a scenario, use remote access technologies. |
Lessons
|