Your IT Career starts here now. Whether you’re looking to launch a new career path or enhance your existing IT skills, our comprehensive courses provide the perfect starting point. With expertly crafted curriculum and hands-on learning experiences, you’ll gain the knowledge and confidence needed to succeed in the dynamic world of technology. Take the first step towards a rewarding career in IT by enrolling in our courses today. Don’t wait any longer to pursue your dreams – unlock endless opportunities and start shaping your future in the exciting field of Information Technology.
Overview for IT User Support Specialists
In our courses, we help you get ready for different tech jobs, like Desktop Support Specialist and Computer Support Specialist. You’ll learn how to deal with everyday tech problems, manage user accounts, help people remotely, and keep up with new tech stuff. We also have a special part where you learn how to fix common network problems, which is important for real IT jobs.
Our training is designed to teach you the basics of tech support so you can move up in your career. You’ll learn about managing networks, keeping systems running smoothly, and making sure everything is secure. This will set you up for a good career in tech support, where you’ll know exactly what you need to do.
Right now, there’s a big demand for skilled IT Support Specialists and Desktop Support Specialists. Our training programs are made to meet this demand and help you become an IT User Support Specialist or other important tech roles. We cover both practical skills and theory, so you’re ready to handle the complex tech stuff you’ll face in real jobs.
As an IT Support Specialist, you’ll do a lot of different things, like fixing computer problems and helping people with software. Our courses prepare you for various jobs, such as Computer Support Specialists and Technology Support Specialists. We focus on teaching you problem-solving skills, tech know-how, and how to communicate well. If you’re wondering what an IT Support Specialist does, our training shows you through hands-on practice and real-life situations.
Our series is also great if you want to start a career in IT support. We answer questions like “What is an IT Technical Support Specialist?” and “What do I need to become an IT Support Specialist?” Our training matches what employers are looking for and keeps you ahead of new tech trends, so you’re ready for future jobs.
We don’t just cover basics; we also show you all the different jobs you can do in IT support, like Computer User Support Specialist or IT Systems Support Specialist. By the end of our training, you’ll have the qualifications you need to succeed in your IT support career.
Our training series is perfect for anyone starting their career, switching careers, or wanting to move up in IT. It’s also great for students, freelancers, small business owners, and tech lovers who want to learn more about IT.
Here’s who can benefit the most from this training:
1. Career Starters: If you’re new to the workforce and interested in tech, this series gives you a strong start. It’s especially helpful if you want to become an IT Support Specialist or work in entry-level IT support.
2. Career Changers: If you’re already working but want to switch to IT, this training is for you. It covers all the basics you need to start a new career in IT support.
3. IT Professionals: If you’re already in IT but want to learn more or move up, our advanced modules and certifications can help. Roles like System Support Specialist or IT Technical Support Specialist often require the skills you’ll gain from this series.
4. Students and Recent Graduates: If you’re studying computer science or related fields, this training adds practical skills to your theoretical knowledge. It makes you more attractive to employers for jobs like Computer User Support Specialist.
5. Freelancers and Consultants: If you’re freelancing in IT or want to start your own IT business, this series gives you the knowledge and credentials you need to serve clients better.
6. Small Business Owners: If you run a small business and need to handle IT tasks yourself, this training teaches you the basics, saving you money on external support.
7. Enthusiasts: Even if you’re not pursuing IT as a career, if you love technology, you’ll enjoy this series. It gives you a deeper understanding of computers and IT systems.
In short, this training is for everyone—from beginners to experts—and it’s especially helpful for those aiming to start or advance their careers in IT support.
Understanding the Role of an IT User Support Specialist
An IT User Support Specialist is like the front line of defence for a company’s tech stuff. They make sure everything works smoothly and fix any problems that come up. This job needs both tech skills and good communication because they have to deal with all sorts of technical issues. They’re crucial for keeping the company running smoothly by fixing hardware, software, and network problems. They also help teach people how to use tech, keep everything secure, and stay up-to-date on new tech stuff.
Often called Desktop Support Specialists or Computer Support Specialists, they’re the ones you go to when your computer is acting up. They work hard to fix problems and make sure everything is working well. Whether it’s a small software glitch or a big system crash, they’re there to help, making sure the company can keep doing its thing.
Becoming an IT Support Specialist means becoming the backbone of a company’s tech setup. You’ll keep everything running smoothly, fix lots of different problems, and help out with hardware, software, and network stuff to keep the company growing and running well.
Here are some things IT Support Specialists do:
1. Helping Users: They’re the first ones people talk to when they have tech problems, and they fix software, hardware, and network issues to keep everything running smoothly.
2. Fixing Problems: They’re experts at figuring out and fixing tech problems, like system errors, bad connections, or broken hardware.
3. Assisting Users: They help people set up and use new tech tools, making sure everyone has what they need to do their job well.
4. Keeping Records: They keep track of all the tech problems and solutions to make sure everything is documented properly.
5. Doing Maintenance: They regularly check and fix stuff to make sure everything runs smoothly and stays secure.
6. Managing Networks: They help set up and fix the company’s network and fix any connection problems.
7. Keeping Things Secure: They make sure everything stays safe from things like viruses and hackers by setting up security measures.
8. Training Users: They teach people how to use new tech tools and follow company tech rules.
9. Working with Others: They often team up with other IT staff to fix big problems and improve the company’s tech setup.
10. Checking Performance: They regularly check how well everything is working and make changes to make things better.
11. Staying Updated: They keep learning about new tech stuff to make sure they can give the best advice and support.
12. Managing Accounts: They set up and manage user accounts to make sure everyone has the right access to tech stuff.
13. Offering Remote Help: They help people fix tech problems even if they’re not in the same place, which is especially important for people working from home.
Being an IT Support Specialist is all about keeping things running smoothly and helping people out with their tech problems, no matter where they are.
To achieve your Career path’s objective for an IT User Support Specialist, you must complete the 7 IT courses listed below.
Click on the arrow for each course to see the full course contents and topics.
This course is perfect for IT beginners. It covers all the basics you need to know about computers, networks, and cyber security and lays the groundwork for learning more advanced material later in the series.
CompTIA FC0-U61: IT Fundamentals
Module 1 – IT Concepts and Terminology
0.1 Instructor Intro
1.1 Compare and Contrast Notational Systems
1.1 Compare and Contrast Notational Systems Demo
1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
1.3 Illustrate the Basics of Computing and Processing
1.4 Explain the Value of Data and Information
1.5 Compare and Contrast Common Units of Measures
1.5 Compare and Contrast Common Units of Measures Demo
1.6 Explain the Troubleshooting Methodology
Module 2 – Infrastructure
2.1 Classify Common Types of Input-Output Device Interfaces
2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
2.3 Explain the Purpose of Common Internal Computing Components
2.4 Compare & Contrast Common Internet Service Types
2.5 Compare & Contrast Storage Types
2.6 Compare & Contrast Common Computing Devices & Their Purposes
2.7 Explain Basic Networking Concepts
2.7 Explain Basic Networking Concepts Demo
2.7 Explain Basic Networking Concepts Part 2
2.7 Explain Basic Networking Concepts Part 3
2.7 Explain Basic Networking Concepts Part 4
2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 – Applications and Software
3.1 Explain the Purpose of Operating Systems
3.1 Explain the Purpose of Operating Systems Demo
3.2 Compare & Contrast Components of an Operating System
3.2 Compare & Contrast Components of an Operating System Demo
3.3 Explain the Purpose & Proper Use of Software
3.4 Explain Methods of Application Architecture & Delivery Models
3.5 Given a Scenario Configure & Use Web Browsers
3.5 Given a Scenario Configure & Use Web Browsers FireFox
3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
3.6 Compare & Contrast General Application Concepts & Uses
O U T L I N E
Module 4 – Software Development
4.1 Compare & Contrast Programming Language Categories
4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic
4.3 Explain the Purpose & Use of Programming Concepts
4.3 HTML Demo
Module 5 – Database Fundamentals
5.1 Explain Database Concepts and the Purpose of Databases
5.2 Compare and Contrast Various Database Structures
5.3 Summarize Methods Used to Interface with Databases
5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 – Security
6.1 Summarize Confidentiality, Integrity, and Availability Concerns
6.2 Explain Methods to Secure Devices and Best Practices
6.3 Summarize Behavioral Security Concepts
6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
6.5 Explain Password Best Practices
6.6 Explain Common Uses of Encryption
6.7 Explain Business Continuity Concepts
6.8 Takeaways
6.9 ITF Fundamentals Conclusion
This course is an introduction to the fast-growing field of artificial intelligence (AI), with a focus on ChatGPT and how it’s used in business. IT specialists need to know how AI is used in today’s business world and how to use these tools to improve user support.
ChatGPT and AI Business Fundamentals
Module 1 – ChatGPT Fundamentals
1.1 Course Welcome
1.2 Instructor Introduction
1.3 Download Course Resources
1.4 ChatGPT Fundamentals
1.5 What is ChatGPT
1.6 Use Cases for ChatGPT
1.7 Role of ChatGPT
1.8 Future of ChatGPT
1.9 ChatGPT Statistics, Facts & Trends
1.10 Limitations
1.11 What is a Chatbot
1.12 Understanding AI-ML
1.13 Demonstration – Tools to Use with ChatGPT
1.14 Business Benefits
1.15 Whiteboard – How it all works
1.16 Demonstration – How to Get Started with ChatGPT
1.17 Demonstration – Example Prompts
1.18 Discussion – ChatGPT Performance Issues
1.19 Module Summary
Module 2 – ChatGPT Prompt Demonstrations
2.1 ChatGPT Prompt Demonstrations
2.2 What is a Prompt
2.3 Best Practices For Writing Prompts
2.4 Prompt Demonstration – Asking Questions
2.5 Prompt Demonstration – Top Ten Lists
2.6 Prompt Demonstration – Long Form Docs
2.7 Prompt Demonstration – Complex Form and Code
2.8 Prompt Demonstration – Feedback
2.9 Prompt Demonstration – Content Modification
2.10 Prompt Demonstration – Instruction Generation
2.11 Prompt Demonstration – Information Extraction
2.12 Prompt Demonstration – Writing Computer Code
2.13 Prompt Demonstration – Solving Math Problems
2.14 Prompt Demonstration – Create YT Video Outline
2.15 Prompt Demonstration – Write a Blog Article
2.16 Prompt Demonstration – SEO Keywords
2.17 Comparing Google Bard vs ChatGPT
2.18 Module Summary
2.19 Course Conclusion
This course covers the basics of hardware and technology, including mobile devices, networking, hardware, virtualization, and cloud computing. It’s really important for IT Support Specialists to know this stuff so they can fix hardware problems when they arise.
CompTIA A+ 220-1101 (Core 1)
Module 1 – Devices, Setups, and Installs
1.1 Introduction to the Course, Meet the Instructor
1.2 Appropriate Safety Procedures
1.3 PC Components
1.4 Guidlines for PC Disassembly
1.5 Motherboards
1.6 CPU Sockets
1.7 PCI Bus
1.8 Storage Bus (SATA and IDE)
1.9 Discussing PC Components
1.10 Common Connection Interfaces
1.11 Wired and Wireless Connection Standards
1.12 Install Peripheral Devices
1.13 Guidelines and Discussion for Installing Peripheral Devices
Module 2 – Displays and Multimedia Devices
2.1 Displays and Multimedia
2.2 Display Device Connections and Cables
2.3 Discussing Display Device Installation and Configuration
2.4 Troubleshoot Display Devices
2.5 Guidelines for Troubleshooting Display Devices
2.6 Discussing Display Device Troubleshooting
2.7 Install and Configure Multimedia Devices
2.8 Discussing Multimedia Device Installation and Configuration
Module 3 – Supporting Multiple Drive Types
3.1 Supporting Multiple Drive Types and Memory
3.2 Memory Types
3.3 RAM Types
3.4 Memory Modules
3.5 DIMM and SO-DIMM Technologies
3.6 Parity and ECC RAM
3.7 Memory Compatibility Issues
3.8 Discussing System Memory Installation
3.9 Install and Configure Mass Storage Devices
3.10 Storage Adapters and Cables
3.11 Solid State Drives
3.12 Guidelines for Installing Mass Storage Devices
O U T L I N E
3.13 Discussing Mass Storage Device Installation and Configuration
3.14 Install and Configure Removable Storage
3.15 Discussing Removable Storage Device Installation and Configuration
3.16 Configure RAID
3.17 RAID Configuration Options
3.18 Discussing RAID Configuration
3.19 Troubleshoot Storage Devices
3.20 Boot Failures
3.21 Discussing Storage Device Troubleshooting
Module 4 – Accounting for CPUs and Internal Components
4.1 Install Upgrade CPUs
4.2 Multiprocessing and Multicore Processors
4.3 Discussing CPU Upgrades
4.4 Configure and Update BIOS UEFI
4.5 Discussing BOIS-UEFI Configuration and Updates
4.6 Install Power Supplies
4.7 Discussing Power Supply Installation
4.8 Troubleshoot Internal System Components
4.9 POST and Boot Problems
4.10 Boot Troubleshooting and Log Entries
4.11 Motherboard Component Problems
4.12 Discussing System Component Troubleshooting
Module 5 – All About Network Theories
5.1 Wired Networks
5.2 Common Ethernet Network Implementations
5.3 Taps and Mirrors
5.4 Discussing Wired Networks
5.5 Network Hardware Devices
5.6 Switches
5.7 Power Over Ethernet
5.8 Discussing Network Hardware Devices
5.9 Wireless Networks
5.10 Access Points and Wireless Network Modes
5.11 Discussing Wireless Networks
5.12 Internet Connection Types
5.13 Wireless Internet Service Providers WISP
5.14 Discussing Internet Connection Types
5.15 Network Configuration Concepts
5.16 The TCIP-IP Protocol Suite
5.17 Internet Protocol and IP Addressing
5.18 Public and Private IP Addresses
5.19 IPv6
5.20 Discussing Network Configuration Concepts
5.21 Network Services
5.22 DNS
5.23 Dynamic and Static IP Configurations
5.24 DNS Records MX and A
5.25 Web Servers and HTTP-HTTPS
5.26 Discussing Network Services
Module 6 – Network Operations and Diagnostics
6.1 Configuring and Troubleshooting Networks
6.2 Network Connections in Windows
6.3 Install and Configure SOHO Networks
6.4 Configure SOHO Network Security
6.5 Firewalls
6.6 Port Fowarding and Port Triggering
6.7 Windows Firewall
6.8 Network Security and Embedded Appliances
6.9 Configure Remote Access
6.10 Discussing Remote Access Configuration
6.11 Troubleshoot Network Connections
6.12 IP Configuration Issues
6.13 Routing Issues
6.14 Discussing Network Connection Troubleshooting
Module 7 – Cloud and Virtualization Computing
7.1 Configure Client-Side Virtualization
7.2 Hypervisors
7.3 Processor Support and Resource Requirements
7.4 Virtual Networks
7.5 Client-Side Virtualization
7.6 Cloud Computing Concepts
7.7 Internal and External Shared Resources
7.8 Cloud Service Options
7.9 Virtual Desktops
7.10 Software-Defined Networking (SDN)
7.11 Discussing Cloud Computing Concepts
Module 8 – Laptop Features and Troubleshooting
8.1 Use Laptop Features
8.2 Expansion Options
8.3 Discussing Laptop Features
8.4 Install and Configure Laptop Hardware
8.5 Discussing Laptop Hardware Installation and Configuration
8.6 Troubleshoot Common Laptop Issues
8.7 Discussing Troubleshooting Common laptop Issues
Module 9 – Syncing and Setup of Mobile Devices
9.1 Syncing and Setup of Mobile Devices
9.2 Connect and Configure Mobile Devices
9.3 Configure Mobile Device Network Connectivity
9.4 Mobile VPN Configuration
9.5 Email Configuration Options
9.6 Discussing Mobile Device Network Connectivity Configuration
9.7 Support Mobile Apps
9.8 Discussing Mobile App Support
Module 10 – All Things Printing
10.1 All Things Printing
10.2 Discussing Laser Printer Maintenance
10.3 Maintain Inkjet Printers
10.4 Discussing Inkjet Printer Maintenance
10.5 Maintain Impact, Thermal, and 3D Printers
10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
10.7 Install and Configure Printers
10.8 Discussing Printer Installation and Configuration
10.9 Troubleshoot Print Device Issues
10.10 Install and Configure Imaging Devices
10.11 Discussing Device Installation and Configuration
Module 11 – Resources and Testing
11.1 Introduction to Resources and Testing
11.2 Resources and Testing
11.3 Joining a Domain with Windows 10
11.4 Boot Order and BIOS
11.5 Virtual Machine Install & Configure
11.6 PC Teardown
11.7 Exploring the Laptop
11.8 Install Windows 10 Demonstration
This course builds on the basics covered in Core 1. It zooms in on operating systems, security software troubleshooting, and operational procedures. It gives IT Support Specialists the skills they need to handle and oversee software systems well.
CompTIA A+ 220-1102 (Core 2)
Module 1 – Operating System Management
1.1 Introduction to the Course, Meet the Instructor
1.2 Identify Common Operating Systems
1.3 Microsoft Windows
1.4 Work and Education Features
1.5 Windows System Limits
1.6 Apple Operating Systems
1.7 Linux Disk and File Management
1.8 Discussing OS Types
1.9 Use Windows Features and Tools
1.10 Administrative Tools
1.11 Manage Files in Windows
1.12 System Hierarchies
1.13 File Attributes
1.14 Discussing Windows Features and Tools
1.15 Manage Disks in Windows
1.16 Discussing File Management in Windows
1.17 The Windows Disk Management Console
1.18 Discussing Windows Disk Management
1.19 Manage Devices in Windows
1.20 Device Manager
1.21 Discussing Windows Device Manager
Module 2 – Configuring and installing the OS
2.1 Configuring and Installing the OS
2.2 Installation Boot Methods
2.3 Disk Formatting and Partitioning
2.4 Networking Considerations
2.5 Post Installation Tasks
2.6 OS Installation Types
2.7 Unattended Installations
2.8 Maintain OSs
2.9 OS Updates
2.10 Anti-Malware Updates
2.11 Scheduled Backups
2.12 Task Schedulers part 1
2.13 Task Schedulers part 2
2.14 Install Windows 10 Demonstration
2.15 Discussing OS Maintenance
O U T L I N E
Module 3 – Tools to Troubleshoot and Maintain the OS
3.1 Install and Manage Windows Applications
3.2 Windows OS Tools
3.3 Application and Print Services
3.4 Task Manager
3.5 Manage Windows Performance
3.6 Windows Performance Management Tools
3.7 Troubleshoot Windows
3.8 Event Viewer
3.9 The System Configuration Utility
3.10 Troubleshooting Tips Boot Process
3.11 Troubleshooting Tips for Windows System Issues
3.12 Blue Screens and Spontaneous Shutdowns
3.13 Troubleshooting Tips for File and Memory Corruption
3.14 Safe Boot
3.15 System Repair Disc
3.16 System Restore
3.17 Guidelines for Troubleshooting Windows Issues
Module 4 – Network Management Tools
4.1 Network Management Tools
4.2 Network Connectivity
4.3 IP Addressing and Connection Types
4.4 Proxy Settings
4.5 Windows Client Configuration
4.6 Location Services
4.7 Firewalls
4.8 Network Troubleshooting
4.9 Remote Desktop Tools
4.10 Desktop Management and Remote Monitoring Tools
4.11 Discussion Topics
Module 5 – Sharing Resources and Wrights Management
5.1 Sharing Resources and Wrights Management
5.2 User Group Accounts
5.3 Local Security Policy
5.4 SSO and Credential Manager
5.5 Workgroups and Homegroups
5.6 Network and Sharing Centre
5.7 Network Share Configuration
5.8 NTSF File and Folder Permissions
5.9 Configure Active Directory Accounts and Policies
5.10 Domain Membership and Group Policy Objects
5.11 Basic AD Functions
5.12 Account Locks and Password Resets
Module 6 – Threats and Security Measures
6.1 Threats and Security Measures
6.2 Logical Security Concepts
6.3 Encryption
6.4 PKI and Certificates
6.5 Execution Control
6.6 NAC
6.7 Discussing Logical Security Concepts
6.8 Threats and Vulnerabilities
6.9 Types of Password Attacks
6.10 Discussing Threats and Vulnerabilities
6.11 Physical Security Controls
6.12 Discussing Physical Security Measures
Module 7 – Policies to Protect Data
7.1 Policies to Protect Data
7.2 Implement Security Best Practices
7.3 Guidelines for Implementing Security Best Practices
7.4 Discussing Security Best Practices Implementation
7.5 Implement Data Protection Policies
7.6 ACLs and Directory Permissions
7.7 Full Disk Encryption
7.8 Guidelines for Implementing Data Protection Policies
7.9 Discussing Data Protection Policies
7.10 Protect Data During Incident Response
7.11 Discussing Data Protection During Incident Response
Module 8 – Prevent Malware and Security Threats
8.1 Prevent Malware and Security Threats
8.2 Detect, Remove, and Prevent Malware
8.3 Trojan Horses and Spyware
8.4 Sources of Malware Infection
8.5 Best Practices for Malware Removal
8.6 Discussing Detecting, Removing, and Preventing Malware Infections
8.7 Troubleshoot Common Workstation Security Issues
8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 – Supporting and Troubleshooting Mobile Devices
9.1 Supporting and Troubleshooting Mobile Devices
9.2 Secure Mobile Devices
9.3 IOT Internet of Things
9.4 Discussing Mobile Device Security
9.5 Troubleshoot Mobile Device Issues
9.6 Mobile Device Security Troubleshooting
9.7 Discussing Troubleshooting Mobile Devices
Module 10 – Implementing Operational Procedures
10.1 Implementing Operational Procedures
10.2 Environmental Impacts and Controls
10.3 Discussing Environmental Impact and Controls
10.4 Create and Maintain Documentation
10.5 Discussing Documentation Creation and Maintenance
10.6 Use Basic Change Management Best Practices
10.7 Discussing Change Management Best Practices
10.8 Implement Disaster Prevention and Recovery Methods
10.9 Discussing Implement Disaster Prevention and Recovery Methods
10.10 Basic Scripting Concepts
10.11 Discussing Scripting
10.12 Professionalism and Communication
10.13 Discussing Professionalism and Communication Skills
Module 11 – Resources and Testing
11.1 Introduction to Resources and Testing
11.2 Resources and Testing
11.3 Joining a Domain with Windows 10
11.4 Boot Order and BIOS
11.5 Virtual Machine Install & Configure
11.6 PC Teardown
11.7 Exploring the Laptop
11.8 Install Windows 10 Demonstration
This course is all about handling and improving Windows 10 in a business setting. It’s really important for IT Support Specialists to learn these skills so they can manage, secure, and keep an eye on devices and apps in a modern office.
Microsoft MD-101: Managing Modern Desktops
Module 1: Deploy and Update Operating Systems
1.1 Instructor and Course Introduction
1.2 Exam Information
1.3 Deploy and Update Operating Systems Introduction
1.4 Plan and Implement Windows 10 by Using Dynamic Deployment
1.5 Plan and Implement Windows 10 by Using Windows Autopilot
1.6 Upgrade Devices to Windows 10
1.7 Manage Updates
1.8 Manage Device Authentication
1.9 Install VMware Workstation 15 in Windows 10 Demo
1.10 Performing a Clean Install of Windows 10 Demo
1.11 Upgrading Windows 8.1 to Windows 10 Demo
1.12 Configuring Locales Demo
1.13 Troubleshooting Failed Installation with Setup Logs Demo
1.14 Installing Windows 16 Server Demo
1.15 Installing Microsoft Deployment Toolkits (MDT) Part 1 Demo
1.16 Installing Microsoft Deployment Toolkits (MDT) Part 2 Demo
1.17 Setting Up an On-Site Domain Controller Demo
1.18 Joining Windows 10 Client Machine to an On-Site Domain Controller Demo
1.19 Getting Started with Free Azure Subscription Demo
1.20 Getting Familiarized with Azure Portal Options Demo
1.21 Create a Virtual Machine Demo
Module 2: Manage Policies and Profiles
2.1 Managing Policies and Profiles Introduction
2.2 Plan and Implement Co-Management
2.3 Implement Conditional Access and Compliance Policies
2.4 Configure Device Profiles
2.5 Manage User Profiles
2.6 Deploy Azure Container Instances Demo
2.7 Manage Access with RBAC Demo
2.8 Secure Network Traffic Demo
2.9 Installing OneDrive Demo
Module 3: Manage and Protect Devices
3.1 Manage and Protect Devices Introduction
3.2 Manage Windows Defender
3.3 Manage Intune Device Enrolment and Inventory
3.4 Monitor Devices
O U T L I N E
3.5 Windows Defender Security Centre Overview Demo
3.6 Installing Windows Defender Application Guard Demo
3.7 Creating a New Inbound Rule Demo
Module 4: Manage Apps and Data
4.1 Manage Apps and Data Introduction
4.2 Deploy and Update Applications
4.3 Implement Mobile Application Management
4.4 Setting up a Microsoft Intune Account Demo
4.5 Create a New Group Demo
4.6 Confirm the Version of Windows Demo
This course broadens the IT Support Specialist’s understanding of networking concepts and practices. Knowing how networks work and fixing network problems are essential skills for giving users complete support.
CompTIA Network+ N10-008
Module 0 – Course introduction
0.1 Instructor Intro
0.2 Course Overview
Module 1 – Networking Fundamentals
1.1 Intro to Networking
1.1.1 Activity: Creating a Network
1.2 Common Terminology
1.2.1 Activity: Examining Ports and Sockets
1.3 OSI Model
1.4 DoD Model
1.4.1 Activity: Examining Network Layers
1.5 TCP, UDP, IP
1.5.1 Activity: Examining TCP
1.5.2 Activity: Examining UDP
1.5.3 Activity: Examining IP
1.6 ICMP, IGMP, ARP
1.6.1 Activity: Examining ICMP
1.6.2 Activity: Examining ARP
1.6.3 Activity: Examining IGMP
1.7 Network Topologies
1.8 Network Types
1.9 Part 1: Network Characteristics
1.9 Part 2: Network Characteristics
1.10 Module 1 outro
Module 2 – Cables and Connectors
2.1 Ethernet Standards
2.2 Copper Cable Types
2.3 Fiber Optic Cable Types
2.4 Connector Types
2.4.1 Activity: Selecting the Right Cable
2.5 Media Converters and Transceivers
2.6 Cable Management
2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
O U T L I N E
3.1 IPv4 Basics
3.2 IP Packet and Interface Types
3.2.1 Activity: Configuring Client IP Settings
3.3 Binary Numbering System
3.4 Classful and Classless Addressing
3.5 Understanding CIDR Notation
3.6 IPv4 Subnetting Method
3.7 Verifying with Binary
3.8 Finding Subnet IDs
3.8.1 Activity: Subnetting a Class C Network
3.9 The Delta in Action
3.9.1 Activity: Subnetting With the Delta
3.10 Subnetting Based on Hosts
3.11 Subnetting in Other Octets
3.12 Supernetting
3.12.1 Activity: Supernetting
3.13 IPv6
3.14 IPv4 – IPv6 Transition Mechanisms
3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
4.1 Remote Control Protocols
4.2 File Sharing Protocols
4.3 Web Protocols
4.4 Email Protocols
4.5 Database Protocols
4.6 Voice Protocols
4.7 Security Protocols
4.8 Management Protocols
4.9 Module 4 Outro
Module 5 – Network Services
5.1 DHCP
5.1.1 Activity: Configuring DHCP
5.1.2 Activity: Configuring a DHCP Relay Agent
5.2 DNS
5.2.1 Activity: Configuring DNS – Part 1
5.2.2 Activity: Configuring DNS – Part 2
5.3 NTP
5.4 Corporate and Datacentre Network Architecture
5.5 Cloud Concepts and Connectivity Options
5.6 Module 5 Outro
Module 6 – Networking Devices
6.1 Introductory Concepts
6.2 Repeaters and Hubs
6.2.1 Activity: Connecting Devices with a Hub
6.3 Bridges and Switches
6.3.1 Activity: Connecting Devices with a Switch
6.4 Routers and Multilayer Switches
6.5 Security Devices
6.6 Modems
6.7 Module 6 Outro
Module 7 – Networked Devices
7.1 IP Devices
7.2 IoT
7.2.1 Activity – Programming IoT Devices
7.3 ICS/SCADA
7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
8.1 Routing Basics
8.1.1 Activity: Configuring Static Routes
8.2 Packet Delivery on the Same Network
8.3 IP Routing Across a Single Router
8.4 IP Routing Across Multiple Hops
8.4.1 Activity: Static Routes – CHALLENGE
8.5 Route Selection
8.6 RIP
8.6.1 Activity: Configuring RIP – CHALLENGE
8.7 OSPF
8.8 EIGRP
8.9 BGP
8.10 NAT/PAT
8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
9.1 Ethernet Basics
9.2 Switching Overview
9.2.1 Activity: Examining a MAC Table
9.3 VLANs
9.3.1 Activity: Creating VLANs
9.4 VLAN Trunking
9.4.1 Activity: Configuring VLAN Trunking
9.5 VLAN Routing
9.5.1 Activity: Configuring VLAN Routing
9.6 Contention Management
9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
10.1 Wireless Overview
10.2 Radio Basics
10.3 Modulation
10.4 Wi-Fi Standards
10.5 Antennas
10.6 Wi-Fi Service Sets
10.7 Wi-Fi Security
10.8 Cellular
Module 11 Network Performance
11.1 Monitoring Performance
11.2 Common Metrics
11.2.1 Activity: Examining Interface Statistics
11.3 SNMP
11.4 Netflow
11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
12.1 HA and DR Concepts
12.2 High Availability Mechanisms
12.3 Disaster Recovery Mechanisms
12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
13.1 Plans and Procedures
13.2 Security Policies
13.3 Loss Prevention
13.4 Common Agreements
13.5 Common Documentation
13.6 Structured Cabling – MDF and IDF
13.7 Horizontal and Vertical Cabling
13.7.1 Activity – Implementing Cable Management
13.8 Labeling
13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
14.1 Common Security Concepts
14.2 Common Attack Types
14.3 Spoofing-based Attacks
14.4 Hijacking and MITM
14.5 Social Engineering
14.6 Network Segmentation
14.7 Private VLANs
14.8 Single Organization Authentication
14.9 Extending Authentication
14.10 Authorization
14.11 Network Device Hardening
14.12 Wireless Security
14.13 Remote Access Security
14.14 IoT Security
14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
15.1 Troubleshooting Methodology
15.2 Physical Connectivity Issues
15.3 Hardware Testing Tools
15.3.1 Activity – Testing an Ethernet Cable
15.3.2 Activity – Crimping on an RJ-45 Connector
15.3.3 Activity – Punching Down Twisted Pair
15.3.4 Activity – Using a Telephone Toner
15.4 Understanding Electricity
15.4.1 Activity – Checking Cable Continuity
15.4.2 Activity – Testing DC Voltage
15.4.3 Activity – Testing AC Voltage
15.5 Twisted Pair Pinout Problems
15.6 Twisted Pair Termination Problems
15.7 Repairing Damaged Twisted Pair Cable
15.8 Fiber Optic Connectivity Issues
15.8.1 Activity – Testing a Fiber Optic Cable
15.9 Common Port Problems
15.9.1 Working with Ports and Their Devices
15.10 Common Software Testing Tools
15.10.1 Activity – Scanning for Open Ports
15.11 Common Command Line Utilities
15.12 Troubleshooting Basic IP Networking Issues
15.13 Common Switching Issues
15.14 Switching Test Tools and Techniques
15.15 Common IP Routing Issues
15.16 Wi-Fi Access Point Issues
15.17 Wirelss Interference
15.17.1 Activity – Using a Spectrum Analyzer
15.18 Wireless Antenna Issues
15.18.1 Activity – Configuring a Wi-Fi Router
15.19 WAP Placement Strategies
15.20 Infrastructure Service Issues (DHCP)
15.21 Infrastructure Service Issues (DNS)
15.22 Infrastructure Service Issues (NTP)
15.23 Fireall / ACL Issues
15.24 VPN Issues
15.25 Additional Network Security Troubleshooting and Tips
15.26 Advanced Networking Issues
15.27 Troubleshooting Server Services (with Module 15 Outro)
CompTIA Network+ N10-008 Course Outro
This course concentrates on cybersecurity, which is crucial for IT Support Specialists to grasp in order to protect devices and networks from threats. It teaches important security ideas and the best ways to keep things safe, so specialists can offer advice and help with security problems.
CompTIA Security+ SY0-601 (2022)
Module 1 – Introduction to Security
1.1 Introduction to Security
Module 2 – Malware and Social Engineering Attacks
2.1 Malware and Social Engineering Attacks
Module 3 – Basic Cryptography
3.1 Basic Cryptography
Module 4 – Advanced Cryptography and PKI
4.1 Advanced Cryptography and PKI
Module 5 – Networking and Server Attacks
5.1 Networking and Server Attacks
Module 6 – Network Security Devices, Designs and Technology
6.1 Network Security Devices, Designs and Technology
Module 7 – Administering a Secure Network
7.1 Administering a Secure Network
Module 8 – Wireless Network Security
8.1 Wireless Network Security
Module 9 – Client and Application Security
9.1 Client and Application Security
Module 10 – Mobile and Embedded Device Security
10.1 Mobile and Embedded Device Security
O U T L I N E
Module 11 – Authentication and Account Management
11.1 Authentication and Account Management
Module 12 – Access Management
12.1 Access Management
Module 13 – Vulnerability Assessment and Data Security
13.1 Vulnerability Assessment and Data Security
Module 14 – Business Continuity
14.1 Business Continuity
Module 15 – Risk Mitigation
15.1 Risk Mitigation
Module 16 – Security Plus Summary and Review
16.1 – Security Plus Summary and Review
Module 17 – Hands-On Training
17.1 Hands-On Scanning Part 1
17.2 Hands-On Scanning Part 2
17.3 Hands-On Advanced Scanning
17.4 Hands-On MetaSploit
17.5 Hands-On BurpSuite
17.6 Hands-On Exploitation Tools Part 1
17.7 Hands-On Exploitation Tools Part 2
17.8 Hands-On Invisibility Tools
17.9 Hands-On Connect to Tor
Don’t miss out on this opportunity to kickstart your career in IT with our Certificate in IT User Support Specialist course. Enrol now and take advantage of our massive 50% discount, making it more accessible than ever before. Worried about upfront costs? No problem! We offer a convenient weekly payment plan, allowing you to pay your course fee in manageable instalments. Don’t delay your journey to becoming a certified information security professional. Join us today and secure your future in cybersecurity!
The $490 discounted course fee is for 12 months access only. Offer ends soon, so, don’t miss out on this incredible special offer.
The $590 discounted course fee is for 12 months access only. Offer ends soon, so, don’t miss out on this incredible special offer.
What an IT User Support Specialist Does?
An IT Support Specialist takes care of computer systems, fixes network problems, helps users with technical issues, and makes sure everything runs smoothly in a company’s IT setup.
Qualifications for an IT User Support Specialist:
To become an IT Support Specialist, you usually need a good background in computer science or a related field. It’s also helpful to have certifications or training in specific areas of IT support, like the ones we offer in our training series.
Specific Job Requirements for IT Support:
Yes, IT Support jobs usually need you to know a lot about tech, be good at solving problems, and be able to talk to people about tech stuff. Our training series teaches you all these things thoroughly.
Opportunities for Computer User Support Specialists:
Computer User Support Specialists can work in different places like IT departments in big companies, tech companies, or even in non-tech companies as part of their IT support teams.
How This Training Series Gets You Ready for an IT Support Career:
Our training series prepares you for an IT support career by teaching you everything you need to know about tech support, from basic to advanced stuff.