Atjaunināt sīkdatņu piekrišanu

IT Essentials Companion Guide v7 [Mīkstie vāki]

  • Formāts: Paperback / softback, 1152 pages, height x width x depth: 238x208x40 mm, weight: 1742 g
  • Sērija : Companion Guide
  • Izdošanas datums: 07-Jul-2020
  • Izdevniecība: Cisco Press
  • ISBN-10: 0135645379
  • ISBN-13: 9780135645376
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 85,26 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 1152 pages, height x width x depth: 238x208x40 mm, weight: 1742 g
  • Sērija : Companion Guide
  • Izdošanas datums: 07-Jul-2020
  • Izdevniecība: Cisco Press
  • ISBN-10: 0135645379
  • ISBN-13: 9780135645376
Citas grāmatas par šo tēmu:

IT Essentials v7 Companion Guide  supports the Cisco Networking Academy IT Essentials version 7 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.


As CompTIA Approved Quality Content, the course also helps you prepare for the CompTIA A+ certification exams. Students must pass both exams to earn the CompTIA A+ certification.


The features of the Companion Guide are designed to help you study and succeed in this course:


  • Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms—Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context.
  • Course section numbering—Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text.
  • Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.
Introduction xxxiii
Chapter 1 Introduction to Personal Computer Hardware
1(58)
Objectives
1(1)
Key Terms
1(3)
Introduction to Personal Computers (1.0)
4(1)
Personal Computers (1.1)
4(2)
What Is in a Computer? (1.1.1)
4(1)
Electrical and ESD Safety (1.1.2)
5(1)
Electrical Safety (1.1.2.1)
5(1)
ESD (1.1.2.2)
5(1)
PC Components (1.2)
6(47)
Case and Power Supplies (1.2.1)
6(1)
Cases (1.2.1.1)
6(3)
Power Supplies (1.2.1.2)
9(1)
Connectors (1.2.1.3)
9(2)
Power Supply Voltage (1.2.1.4)
11(1)
Motherboards (1.2.2)
12(1)
Motherboards (1.2.2.1)
12(1)
Motherboard Components (1.2.2.2)
12(2)
Motherboard Chipset (1.2.2.3)
14(1)
Motherboard Form Factors (1.2.2.4)
15(1)
CPUs and Cooling Systems (1.2.3)
16(1)
What Is a CPU? (1.2.3.1)
16(1)
Cooling Systems (1.2.3.2)
17(1)
Memory (1.2.4)
18(1)
Types of Memory (1.2.4.1)
18(1)
Types of ROM (1.2.4.2)
19(2)
Types of RAM (1.2.4.3)
21(1)
Memory Modules (1.2.4.4)
22(3)
Adapter Cards and Expansion Slots (1.2.5)
25(1)
Adapter Cards (1.2.5.1)
25(3)
Hard Disk Drives and SSDs (1.2.6)
28(1)
Types of Storage Devices (1.2.6.1)
29(1)
Storage Device Interfaces (1.2.6.2)
29(1)
Magnetic Media Storage (1.2.6.3)
30(1)
Semiconductor Storage (1.2.6.4)
31(1)
Optical Storage Devices (1.2.7)
32(1)
Types of Optical Storage Devices (1.2.7.1)
33(1)
Ports, Cables, and Adapters (1.2.8)
34(1)
Video Ports and Cables (1.2.8.1)
34(4)
Other Ports and Cables (1.2.8.2)
38(3)
Adapters and Converters (1.2.8.3)
41(1)
Input Devices (1.2.9)
42(1)
The Original Input Devices (1.2.9.1)
42(1)
New Input Devices (1.2.9.2)
43(3)
More New Input Devices (1.2.9.3)
46(2)
Most Recent Input Devices (1.2.9.4)
48(2)
Output Devices (1.2.10)
50(1)
What Are Output Devices? (1.2.10.1)
50(1)
Monitors and Projectors (1.2.10.2)
50(1)
VR and AR Headsets (1.2.10.3)
51(1)
Printers (1.2.10.4)
52(1)
Speakers and Headphones (1.2.10.5)
53(1)
Computer Disassembly (1.3)
53(1)
The Technician's Toolkit (1.3.1)
53(1)
Computer Disassembly (1.3.2)
53(1)
Summary (1.4)
54(1)
Practice
54(1)
Lab
54(1)
Check Your Understanding Questions
55(4)
Chapter 2 PC Assembly
59(36)
Objectives
59(1)
Key Terms
59(2)
Introduction to PC Assembly (2.0)
61(1)
Assemble the Computer (2.1)
61(29)
General and Fire Safety (2.1.1)
61(1)
Open the Case and Connect the Power Supply (2.1.2)
62(1)
Select the Case and Fans (2.1.2.3)
62(2)
Select a Power Supply (2.1.2.4)
64(1)
Install the Motherboard Components (2.1.3)
65(1)
Select the Motherboard (2.1.3.7)
66(1)
Select the CPU and CPU Cooling (2.1.3.8)
67(1)
Select the RAM (2.1.3.9)
68(1)
Install Internal Drives (2.1.4)
69(1)
Select Hard Drives (2.1.4.2)
69(1)
Select Optical Drives (2.1.4.3)
70(1)
Install the Hard Drive (2.1.4.4)
71(2)
Install f he Optical Drive (2.1.4.5)
73(1)
Install the Adapter Cards (2.1.5)
74(1)
Select Adapter Cards (2.1.5.2)
75(2)
Other Factors for Adapter Card Selection (2.1.5.3)
77(3)
Install the Adapter Cards (2.1.5.4)
80(1)
Select Additional Storage (2.1.6)
81(1)
Select a Media Reader (2.1.6.1)
81(2)
Select External Storage (2.1.6.2)
83(1)
Install the Cables (2.1.7)
84(1)
Install the Front Panel Cables (2.1.7.6)
85(5)
Summary (2.2)
90(1)
Practiced
91(1)
Labs
91(1)
Check Your Understanding Questions
91(4)
Chapter 3 Advanced Computer Hardware
95(68)
Objectives
95(1)
Key Terms
95(3)
Introduction to Advanced Computer Hardware (3.0)
98(1)
Boot the Computer (3.1)
98(9)
POST, BIOS, CMOS, and UEFI (3.1.1)
99(1)
POST (3.1.1.2)
99(2)
BIOS and CMOS (3.1.1.3)
101(1)
UEFI (3.1.1.4)
102(2)
BIOS/UEFI Configuration (3.1.2)
104(1)
BIOS and UEFI Security (3.1.2.2)
104(1)
Update the Firmware (3.12.3)
105(2)
Electrical Power (3.2)
107(4)
Wattage and Voltage (3.2.1)
107(1)
Wattage and Voltage (3.2.1.1)
108(1)
Power Supply Voltage Setting (3.2.1.2)
108(1)
Power Fluctuation and Protection (3.2.2)
109(1)
Power Fluctuation Types (3.2.2.1)
110(1)
Power Protection Devices (3.2.2.2)
110(1)
Advanced Computer Functionality (3.3)
111(29)
CPU Architectures and Operation (3.3.1)
111(1)
CPU Architectures (3.3.1.1)
112(1)
Enhancing CPU Operation (3.3.1.2)
112(1)
Multicore Processors (3.3.1.3)
113(1)
CPU Cooling Mechanisms (3.3.1.4)
114(3)
RAID (3.3.2)
117(1)
What Do You Already Know? - RAID (3.3.2.1)
117(1)
RAID Concepts (3.3.2.2)
118(1)
RAID Levels (3.3.2.3)
119(1)
Ports, Connectors, and Cables (3.3.3)
119(1)
Legacy Ports (3.3.3.1)
120(3)
Video and Graphic Ports (3.3.3.2)
123(2)
USB Cables and Connectors (3.3.3.3)
125(3)
SATA Cables and Connectors (3.3.3.4)
128(2)
Twisted Pair Cables and Connectors (3.3.3.5)
130(1)
Coax Cables and Connectors (3.3.3.6)
131(2)
SCSI and IDE, Cables and Connectors (3.3.3.7)
133(2)
Monitors (3.3.4)
135(1)
Monitor Characteristics (3.3.4.1)
136(1)
Monitor Terms (3.3.4.2)
137(1)
Display Standards (3.3.4.3)
138(1)
Using Multiple Monitors (3.3.4.4)
138(2)
Computer Configuration (3.4)
140(15)
Upgrade Computer Hardware (3.4.1)
140(1)
Motherboard Upgrade (3.4.1.1)
140(1)
Steps to Upgrade a Motherboard (3.4.1.2)
141(1)
CPU, Upgrade (3.4.1.3)
142(1)
Storage Device Upgrade (3.4.1.4)
143(1)
Peripheral upgrades (3.4.1.5)
144(1)
Power Supply Upgrade (3.4.1.6)
145(1)
Configurations for Specialized Computers (3.4.2)
145(1)
What Do You Already Know? - Configure a CAx Workstation (3.4.2.1)
145(2)
What Do You Already Know? - Configure an Audio Video Editing Workstation (3.4.2.2)
147(3)
What Do You' Already Know? - Configure a Virtualization Workstation (3.4.2.3)
150(1)
What Do You Already Know? - Configure a Gaming PC (3.4.2.4)
151(2)
Thick and Thin Clients (3.4.2.6)
153(1)
NAS (3.4.2.7)
154(1)
Protecting the Environment (3.5)
155(3)
Safe Disposal of Equipment and Supplies (3.5.1)
155(1)
Safe Disposal Methods (3.5.1.1)
156(1)
Safety Data Sheets (3.5.1.2)
157(1)
Summary (3.6)
158(1)
Practice
159(1)
Labs
159(1)
Check Your Understanding Questions
159(4)
Chapter 4 Preventive Maintenance and Troubleshooting
163(30)
Objectives
163(1)
Key Terms
163(1)
Introduction (4.0)
164(1)
Preventive Maintenance (4.1)
164(3)
PC Preventive Maintenance Overview (4.1.1)
164(1)
Benefits to Preventive Maintenance (4.1.1.1)
164(1)
Preventive Maintenance - Dust (4.1.1.2)
165(1)
Preventive Maintenance - Internal Components (4.1:1.3)
165(1)
Preventive Maintenance - Environmental Concerns (4.1.1.4)
166(1)
Preventive Maintenance - Software (4.1.1.5)
167(1)
Troubleshooting Process (4.2)
167(21)
Troubleshooting Process Steps (4.2.1)
167(1)
Introduction to Troubleshooting (4.2.1.1)
167(2)
Troubleshooting Process Steps (4.2.1.2)
169(1)
Identify the Problem (4.2.1.3)
169(4)
Establish a Theory of Probable Cause (4.2.1.5)
173(1)
Test the Theory to Determine the Cause (4.2.1.6)
173(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (4.2.1.7)
174(1)
Verify Full Functionality and if Applicable, Implement Preventive Measures (4.2.1.8)
175(1)
Document Findings, Actions, and Outcomes (4.2.1.9)
176(1)
Common Problems and Solutions for PCs (4.2.2)
176(1)
PC Common Problems and Solutions (4.2.2.1)
176(1)
Common Problems and Solutions for Storage Devices (412.2.2)
177(1)
Common Problems and Solutions for Motherboards and Internal Components (4.2.2.3)
178(2)
Common Problems and Solutions for Power Supplies (4.2.2.4)
180(1)
Common Problems and Solutions for CPUs and Memory (4.2.2.5)
181(2)
Common Problems and Solutions for Displays (4.2.2.6)
183(2)
Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3)
185(1)
Personal Reference Tools (4.2.3.1)
185(1)
Internet Reference Tools (4.2.3.2)
185(1)
Advanced Problems and Solutions for Hardware (4.2.3.4)
186(2)
Summary (4.3)
188(1)
Practice
188(1)
Labs
188(1)
Check Your Understanding Questions
189(4)
Chapter 5 Networking Concepts
193(74)
Objectives
193(1)
Key Terms
193(3)
Introduction (5.0)
196(1)
Network Components and Types (5.1)
196(11)
Types of Networks (5.1.1)
196(1)
Network Icons (5.1.1.1)
196(2)
Network Topologies and Description (5.1.1.2)
198(5)
Internet Connection Types (5.1.2)
203(1)
Brief History of Connection Technologies (5.1.2.1)
203(1)
DSL, Cable, and Fiber (5.1.2.2)
204(1)
Line of Sight Wireless Internet Service (5.1.2.3)
205(1)
Satellite (5.1.2.4)
206(1)
Cellular (5.1.2.5)
206(1)
Mobile Hotspot and Tethering (5.1.2.6)
207(1)
Networking Protocols, Standards, and Services (5.2)
207(25)
Transport Layer Protocols (5.2.1)
208(1)
The TCP/IP Model (5.2.1.3)
208(1)
TCP (5.2.1.4)
209(2)
UDP (5.2.1.5)
211(2)
Application Port Numbers (5.2.2)
213(1)
Classify Application Port Numbers (5.2.2.2)
213(4)
Wireless Protocols (5.2.3)
217(1)
WLAN Protocols (5.2.3.1)
217(1)
Bluetooth, NFC, and RFID (5.2.3.2)
218(2)
Zigbee and Z-Wave (5.2.3.3)
220(1)
Cellular Generations (5.2.3.4)
221(1)
Network Services (5.2.4)
222(1)
Client - Server Roles (5.2.4.2)
222(3)
DHCP Server (5.2.4.3)
225(1)
DNS Server (5.2.4.4)
225(2)
Print Server (5.2.4.5)
227(1)
File Server (5.2.4.6)
227(1)
Web Server (5.2.4.7)
228(1)
Mail Server (5.2.4.8)
229(1)
Proxy Server (5.2.4.9)
230(1)
Authentication Server (5.2.4.10)
231(1)
Syslog Server (5.2.4.11)
232(1)
Network Devices (5.3)
232(14)
Basic Network Devices (5.3.1)
232(1)
Network Interface Card (5.3.1.2)
233(1)
Repeaters, Bridges, and Hubs (5.3.1.3)
233(2)
Switches (5.3.1.4)
235(2)
Wireless Access Points (5.3.1.5)
237(1)
Routers (5.3.1.6)
237(1)
Security-Devices (5.3.2)
238(1)
Firewalls {5.3.2.2)
238(1)
IDS and IPS (5.3.2.3)
239(2)
UTMs (5.3.2.4)
241(1)
Endpoint Management Server (5.3.2.5)
241(1)
Other Network Devices (5.3.3)
242(1)
Legacy and Embedded Systems (5.3.3.1)
242(1)
Patch Panel (5.3.3.2)
243(1)
Power over Ethernet and Ethernet over Power (5.3.3.3)
244(1)
Cloud-Based Network Controller (5.3.3.4)
245(1)
Network Cables (5.4)
246(16)
Network Tools (5.4.1)
246(1)
Network Tools and Descriptions (5.4.1.2)
247(4)
Copper Cables and Connectors (5.4.2)
251(1)
Cable Types (5.4.2.1)
251(1)
Coaxial Cables (5.4.2.2)
252(1)
Twisted-Pair Cables (5.4.2.3)
252(2)
Twisted-Pair Category Ratings (5.4.2.4)
254(1)
Twisted-Pair Wire Schemes (5.4.2.5)
255(1)
Fiber Cables and Connectors (5.4.3)
256(1)
Fiber-Optic Cables (5.4.3.1}
257(1)
Types of Fiber Media (5.4.3.2)
258(1)
Fiber-Optic Connectors (5.4.3.3)
259(3)
Summary (5.5)
262(1)
Practice
263(1)
Lab
263(1)
Check Your Understanding Questions
263(4)
Chapter 6 Applied Networking
267(58)
Objectives
267(1)
Key Terms
267(2)
Introduction (6.0)
269(1)
Device to Network Connection (6.1)
269(40)
Network Addressing (6.1.1)
269(1)
Two Network Addresses (6.1.1.4)
270(2)
Displaying the Addresses (6.1.1.5)
272(1)
IPv4 Address Format (6.1.1.6)
273(1)
IPv6 Address Formats (6.1.1.7)
274(2)
Static Addressing (6.1.1.8)
276(1)
Dynamic Addressing (6.1.1.9)
277(1)
Link-Local IPv4 and IPv6 Addresses (6.1.1.10)
278(2)
Configure a NIC (6.1.2)
280(1)
Network Design (6.1.2.2)
280(1)
Selecting a NIC (6.1.2.3)
281(1)
Installing and Updating a NIC (6.1.2.4)
282(1)
Configure a NIC (6.1.2.5)
283(2)
ICMP (6.1.2.6)
285(1)
Configure a Wired and Wireless Network (6.1.3)
286(1)
Connecting Wired Devices to the Internet (6.1.3.2)
287(2)
Logging in to the Router (6.1.3.3)
289(1)
Basic Network Setup (6.1.3.4)
290(3)
Basic Wireless Settings (6.1.3.5)
293(3)
Configure a Wireless Mesh Network (6.1.3.6)
296(1)
NAT for IPu4 (6.1.3.7)
297(1)
Quality of Service (6.1.3.8)
298(1)
Firewall Settings (6.1.4)
299(1)
UPnP (6.1.4.2)
300(1)
DMZ (6.1.4.3)
300(2)
Port Forwarding (6.1.4.4)
302(1)
MAC Address Filtering (6.1.4.5)
303(3)
Whitelisting and Blacklisting (6.1.4.6)
306(1)
IoT Device Configuration (6.1.5)
307(1)
Internet of Things (6.1.5.1)
308(1)
IoT Devices in Packet Tracer (6.1.5.2)
308(1)
Basic Troubleshooting Process for Networks (6.2)
309(10)
Applying the Troubleshooting Process to Networks (6.2.1)
310(1)
The Six Steps of the Troubleshooting Process (6.2.1.1)
310(1)
Identify the Problem (6.2.1.2)
310(1)
Establish a Theory of Probable Cause (6.2.1.3)
311(1)
Test the Theory to Determine the Cause (6.2.1.4)
311(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (6.2.1.5)
312(1)
Verify Full Functionality and, if Applicable, Implement Preventive Measures (6.2.1.6)
312(1)
Document Findings; Actions, and Outcomes (6.2.1.7)
313(1)
Network Problems and Solutions (6.2.2)
313(1)
Common Problems and Solutions for Networking (6.2.2.1)
314(1)
Advanced Problems and Solutions for Network Connections (6.2.2.2)
315(1)
Advanced Problems and Solutions for FTP and Secure Internet Connections (6.2.2.3)
316(1)
Advanced Problems and Solutions Using Network Tools (6.2.2.4)
317(2)
Summary (6.3)
319(1)
Practice
319(1)
Labs
319(1)
Packet Tracer Activities
320(1)
Check Your Understanding Questions
320(5)
Chapter 7 Laptops and Other Mobile Devices
325(82)
Objectives
325(1)
Key Terms
325(3)
Introduction (7.0)
328(1)
Characteristics of Laptops and Other Mobile Devices (7.1)
328(16)
Mobile Device Overview (7.1.1)
329(1)
What Do You Already Know? - Mobile Devices (7.1.1.1)
329(1)
Mobility (7.1.1.2)
330(1)
Laptops (7.1.1.3)
330(1)
Smartphone Characteristics (7.1.1.4)
331(1)
Smartphone Features (7.1.1.5)
332(1)
Tablets and E-readers (7.1:1.6)
332(1)
Wearables: Smartwatches and Fitness Trackers (7.1.1.7)
333(1)
Wearables: Augmented and Virtual Realities (7.1.1.8)
334(2)
Laptop Components (7.1.2)
336(1)
Motherboards (7.1.2.3)
336(1)
Internal Components (7.1.2.4)
337(3)
Special Function Keys (7.1.2.6)
340(1)
Laptop Display Components (7.1.3)
341(1)
LCD, LED, and OLED Displays (7.1.3.1)
341(1)
Laptop Display Features (7.1.3.2)
341(2)
Backlights and Inverters (7.1.3.3)
343(1)
Wi-Fi Antenna Connectors (7.1.3.5)
344(1)
Webcam and Microphone (7.1.3.6)
344(1)
Laptop Configuration (7.2)
344(6)
Power Settings Configuration (7.2.1)
344(1)
Power Management (7.2.1.1)
344(1)
Managing ACPI Settings in the BIOS (7.2.1.2)
345(1)
Wireless Configuration (7.2.2)
346(1)
Bluetooth (7.2.2.1)
347(1)
Bluetooth Laptop Connections (7.2.2.2)
348(1)
Cellular WAN (7.2.2.4)
348(1)
Wi-Fi (7.2.2.5)
349(1)
Laptop Hardware and Component Installation and Configuration (7.3)
350(10)
Expansion Slots (7.3.1)
351(1)
Expansion Cards (7.3.1.1)
351(1)
Flash Memory (7.3.1.2)
352(1)
Smart Card Reader (7.3.1.3)
353(1)
SODIMM Memory (7.3.1.4)
354(2)
Replacing Laptop Components (7.3.2)
356(1)
Overview of Hardware Replacement (7.3.2.1)
356(1)
Power (7.3.2.5)
357(2)
Internal Storage and Optical Drive (7.3.2.8)
359(1)
Other Mobile Device Hardware Overview (7.4)
360(8)
Other Mobile Device Hardware (7.4.1)
360(1)
Cell Phone Parts (7.4.1.1)
360(1)
Wired Connectivity (7.4.1.2)
361(3)
Wireless Connections and Shared Internet Connections (7.4.1.3)
364(1)
Specialty Mobile Devices (7.4.2)
364(1)
Wearable Devices (7.4.2.1)
365(1)
Specialty Devices (7.4.2.2)
366(2)
Network Connectivity and Email (7.5)
368(20)
Wireless and Cellular Data Networks (7.5.1)
368(1)
Wireless Data Networks (7.5.1.1)
369(1)
Cellular Communication Standards (7.5.1.3)
370(1)
Airplane Mode (7.5.1.4)
371(2)
Hotspot (7.5.1.5)
373(1)
Bluetooth (7.5.2)
374(1)
Bluetooth for Mobile Devices (7.5.2.1)
375(2)
Bluetooth Pairing (7.5.2.2)
377(1)
Configuring Email (7.5.3)
378(1)
Introduction to Email (7.5.3.1)
378(3)
Android Email Configuration (7.5.3.3)
381(1)
iOS Email Configuration (7.5.3.4)
382(1)
Internet Email (7.5.3.5)
382(1)
Mobile Device Synchronization (7.5.4)
383(1)
Types of Data to Synchronize (7.5.4.1)
383(1)
Enabling Synchronization (7.5.4.2)
384(3)
Synchronization Connection Types (7.5.4.3)
387(1)
Preventive Maintenance for Laptops and Other Mobile Devices (7.6)%
388(3)
Scheduled Maintenance for Laptops and Other Mobile Devices % (7.6.1)
388(1)
What Do You Already Know? - Preventive Maintenance (7.6.1.1)
388(1)
The Reason for Maintenance (7.6.1.2)
389(1)
Laptop Preventive Maintenance Program (7.6.1.3)
389(1)
Mobile Device Preventive Maintenance Program (7.6.1.4)
390(1)
Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7)
391(10)
Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1)
391(1)
The Troubleshooting Process (7.7.1.1)
391(1)
Identify the Problem (7.7.1.2)
391(1)
Establish a Theory of Probable Cause (7.7.1.3)
392(1)
Test the Theory to Determine Cause (7.7.1.4)
393(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (7.7.1.5)
393(1)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (7.7.1.6)
394(1)
Document Findings, Actions, and Outcomes (7.7.1.7)
395(1)
Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2)
395(1)
Identify Common Problems and Solutions (7.7.2.1)
395(1)
Common Problems and Solutions for Laptops (7.7.2.2)
395(3)
Common Problems and Solutions for Other Mobile Devices (7.7.2.3)
398(3)
Summary (7.8)
401(1)
Practice
402(1)
Labs
402(1)
Check Your Understanding Questions
402(5)
Chapter 8 Printers
407(66)
Objectives
407(1)
Key Terms
407(2)
Introduction (8.0)
409(1)
Common Printer Features (8.1)
409(8)
Characteristics and Capabilities (8.1.1)
409(1)
Characteristics of Printers (8.1.1.1)
409(1)
Printer Speed, Quality, and Color (8.1.1.2)
410(1)
Reliability and Total Cost of Ownership (8.1.1.3)
411(1)
Automatic Document Feeder (8.1.1.4)
412(1)
Printer Connections (8.1.2)
413(1)
Printer Connection Types (8.1.2.1)
413(4)
Printer Type Comparison (8.2)
417(21)
Inkjet Printers (8.2.1)
417(1)
Inkjet Printer Characteristics (8.2.1.1)
418(1)
Inkjet Printer Parts (8:2.1.2)
418(5)
Laser Printers (8.2.2)
423(1)
Laser Printer Characteristics (8.2.2.1)
423(1)
Laser Printer Parts (8.2.2.2)
424(3)
Laser Printing Process, (8.2.3)
427(1)
How Laser Printing Works (8.2.3.1)
427(7)
Thermal Printers and Impact Printers (8.2.4)
434(1)
Thermal Printer Characteristics (8.2.4.1)
435(1)
Impact Printer Characteristics (8.2.4.2)
436(1)
Virtual Printers (8.2.5)
437(1)
Virtual Printer Characteristics (8.2.5.1)
437(1)
Cloud Printing (8.2.5.2)
438(1)
3D Printers (8.2.6)
438(1)
3D Printer Characteristics (8.2.6.1)
439(1)
3D Printer Parts (8.2.6.2)
439(3)
Installing and Configuring Printers (8.3)
442(6)
Installing and Updating a Printer (8.3.1)
442(1)
Installing a Printer (8.3.1.1)
442(1)
Test Printer Functions (8.3.1.2)
443(1)
Configuring Options and Default Settings (8.3.2)
444(1)
Common Configuration Settings (8.3.2.1)
444(2)
Optimizing Printer Performance (8.3.3)
446(1)
Software Optimization (8.3.3.1)
446(1)
Hardware Optimization (8.3.3.2)
447(1)
Sharing Printers (8.4)
448(6)
Operating System Settings for Sharing Printers (8.4.1)
448(1)
Configuring Printer Sharing (8.4.1.1)
448(2)
Wireless Printer Connections (8.4.1.2)
450(1)
Print Servers (8.4.2)
451(1)
Purposes of Print Servers (8.4.2.1)
451(1)
Software Print Servers (8.4.2.2)
452(1)
Hardware Print Servers (8.4.2.3)
452(1)
Dedicated Print Servers (8.4.2.4)
453(1)
Maintaining and Troubleshooting, Printers (8.5)
454(6)
Printer Preventive Maintenance (8.5.1)
454(1)
Vendor Guidelines (8.5.1.1)
455(1)
What Do You Already Know? - Printer Operating Environment (8.5.1.2)
455(1)
Inkjet Printer Preventive Maintenance (8.5.2)
456(1)
Laser Printer Preventive Maintenance (8.5.3)
456(1)
Thermal Printer Preventive Maintenance (8.5.4)
457(1)
Preventive Maintenance on a Thermal Printer (8.5.4.1)
458(1)
Impact Printer Preventive Maintenance (8.5.5)
459(1)
Preventive Maintenance of an Impact Printer (8.5.5.1)
459(1)
3D Printer Preventive Maintenance (8.5.6)
460(8)
Applying the Troubleshooting Process to Printers (8.5.7)
461(1)
The Six Steps of the Troubleshooting Process (8.5.7.1)
461(1)
Identify the Problem (8.5.7.2)
461(1)
Establish a Theory of Probable Cause (8.5.7.3)
462(1)
Test the Theory to Determine Cause (8.5.7.4)
462(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (8.5.7.5)
463(1)
Verify Full System Functionality and if Applicable, Implement Preventive Measures (8.5.7.6)
463(1)
Document Findings, Actions, and Outcomes (8.5.7.7)
463(1)
Problems and Solutions (8.5.8)
464(1)
Identify Printer Problems and Solutions (8.5.8.1)
464(1)
Common Problems and Solutions for Printers (8.5.8.2)
464(3)
Advanced Problems and Solutions for Printers (8.5.8.3)
467(1)
Summary (8.6)
468(1)
Practice
469(1)
Labs
469(1)
Check Your Understanding Questions
469(4)
Chapter 9 Virtualization and Cloud Computing
473(20)
Objectives
473(1)
Key Terms
473(1)
Introduction (9.0)
474(1)
Virtualization (9.1)
474(9)
Virtualization (9.1.1)
474(1)
Cloud Computing and Virtualization (9.1.1.2)
475(1)
Traditional Server Deployment (9.1.1.3)
475(1)
Server Virtualization (9.1.1.4)
476(1)
Advantages of Server Virtualization (9.1.1.5)
477(1)
Client-Side Virtualization (9.1.2)
478(1)
Client-Side Virtualization (9.1.2.1)
478(2)
Type 1 and Type 2 Hypervisors (9.1.2.2)
480(1)
Virtual Machine Requirements (9.1.2.3)
481(2)
Cloud Computing (9.2)
483(5)
Cloud Computing Applications (9.2.1)
483(1)
How We Use the Cloud (9.2.1.1)
483(1)
Cloud Services (9.2.2)
484(1)
Cloud Services (9.2.2.1)
484(1)
What Do You Already Know? - Cloud Models (9.2.2.2)
485(2)
Cloud Computing Characteristics (9.2.2.4)
487(1)
Summary (9.3)
488(1)
Practice
488(1)
Lab
488(1)
Check Your Understanding Questions
489(4)
Chapter 10 Windows Installation
493(40)
Objectives
493(1)
Key Terms
493(2)
Introduction (10.0)
495(1)
Modern Operating Systems (10.1)
495(14)
Operating System Features (10.1.1)
495(1)
Terms (10.1.1.1)
496(1)
Basic Functions of an Operating System (10.1.1.2)
497(3)
Windows Operating Systems (10.1.1.3)
500(1)
Customer Requirements for an Operating System (10.1.2)
500(1)
Compatible System Software and Hardware Requirements (10.1.2.1)
501(1)
Minimum Hardware Requirements and Compatibility with OS (10.1.2.2)
501(1)
32-bit vs. 64-bit Processor Architecture (10.1.2.3)
502(1)
What Do You Already Know? - Choosing a Windows Edition (10.1.2.4)
503(1)
Operating System Upgrades (10.1.3)
504(1)
Checking OS Compatibility (10.1.3.1)
505(1)
Windows OS Upgrades (10.1.3.2)
505(1)
Data Migration (10.1.3.3)
506(3)
Disk Management (10.2)
509(6)
Disk Management (10.2.1)
509(1)
Storage Device Types (10.2.1.1)
509(1)
Hard Drive Partitioning (10.2.1.2)
510(1)
Partitions and Logical Drives (10.2.1.3)
511(2)
File Systems (10.2.1.5)
513(2)
Installation and Boot Sequence (10.3)
515(13)
Basic Windows Installation (10.3.1)
515(1)
Account Creation (10.3.1.2)
515(1)
Finalize the Installation (10.3.1.3)
516(1)
Custom Installation Options (10.3.2)
517(1)
Disk Cloning (10.3.2.1)
517(1)
Other Installation Methods (10.3.2.2)
518(1)
Remote Network Installation (10.3.2.3)
519(1)
Unattended Network Installation (10.3.2.4)
520(2)
Recovery Partition (10.3.2.6)
522(1)
Upgrade Methods (10.3.2.7)
522(2)
Windows Boot Sequence (10.3.3)
524(1)
Windows Boot Sequence (10.3.3.1)
524(1)
Windows 7 Startup Modes (10.3.3.2)
525(1)
Windows 8 and 10 Startup Modes (10.3.3.3)
526(2)
Summary (10.4)
528(1)
Practice
528(1)
Labs
528(1)
Check Your Understanding Questions
529(4)
Chapter 11 Windows Configuration
533(194)
Objectives
533(1)
Key Terms
534(4)
Introduction (11.0)
538(1)
Windows Desktop and File Explorer (11.1)
538(29)
Comparing Windows Versions (11.1.1)
539(1)
Windows Versions (11.1.1.1)
539(1)
Windows 7 (11.1.1.2)
540(1)
Windows 8 (11.1.1.3)
540(1)
Windows 8.1 (11.1.1.4)
540(1)
Windows 10 (11.1.1.5)
540(2)
The Windows Desktop (11.1.2)
542(1)
The Windows 7 Desktop (11.1.2.1)
542(1)
The Windows 8 Desktop (11.1.2.2)
543(1)
The Windows 8.1 Desktop (11.1.2.3)
544(1)
Personalizing the Windows Desktop (11.1.2.4)
545(3)
The Windows 10 Start Menu (11.1.2.6)
548(1)
The Windows 8.1 and 8.0 Start Menu (11.1.2.7)
548(2)
The Windows 7 Start Menu (11.1.2.8)
550(2)
The Taskbar (11.1.2.9)
552(2)
Windows Task Manager (11.1.3)
554(1)
Windows 10 Task Manager Functions (11.1.3.2)
554(1)
Task Manager in Windows 7 (11.1.3.3)
555(1)
Windows File Explorer (11.1.4)
556(1)
File Explorer (11.1.4.1)
557(1)
This PC (11.1.4.3)
558(1)
Run as Administrator (11.1.4.4)
559(1)
Windows Libraries (11.1.4.5)
560(1)
Directory Structures (11.1.4.6)
560(2)
User and System File Locations (11.1.4.7)
562(2)
File Extensions (11.1.4.8)
564(1)
File Attributes (11.1.4.9)
565(2)
Configure Windows with Control Panels (11.2)
567(47)
Control Panel Utilities (11.2.1)
567(1)
Windows 10: Settings and Control Panels (11.2.1.1)
567(2)
Introduction to Control Panel (11.2.1.2)
569(1)
Control Panel Views (11.2.1.3)
570(2)
Define Control Panel Categories (11.2.1.4)
572(3)
User and Account Control Panel Items (11.2.2)
575(1)
User Accounts (11.2.2.1)
575(1)
User Account Control Settings (11.2.2.2)
576(1)
Credential Manager (11.2.2.4)
577(1)
Sync Center (11.2.2.5)
578(1)
Network and Internet Control Panels (11.2.3)
579(1)
Network Settings (11.2.3.1)
579(1)
Internet Options (11.2.3.2)
580(4)
Network and Sharing Center (11.2.3.3)
584(2)
HomeGroup (11.2.3.4)
586(2)
Display Settings and Control Panel (11.2.4)
588(1)
Display Settings and Configuration (11.2.4.1)
588(2)
Display Features (11.2.4.2)
590(1)
Power and System Control Panels (11.2.5)
591(1)
Power Options (11.2.5.1)
591(1)
Power Options Settings (11.2.5.2)
592(1)
Power Options Actions (11.2.5.3)
593(2)
System Control Panel Item (11.2.5.5)
595(1)
System Properties (11.2.5.6)
595(3)
Increasing Performance (11.2.5.7)
598(2)
Hardware and Sound Control Panels (11.2.6)
600(1)
Device Manager (11.2.6.1)
600(1)
Devices and Printers (11.2.6.3)
601(2)
Sound (11.2.6.4)
603(1)
Clock, Region, and Language (11.2.7)
604(1)
Clock (11.2.7.1)
604(1)
Region (11.2.7.2)
604(2)
Language (11.2.7.3)
606(2)
Programs and Features Control Panels (11.2.8)
608(1)
Programs (11.2.8.1)
608(1)
Windows Features and Updates (11.2.8.2)
609(1)
Default Programs (11.2.8.3)
609(1)
Other Control Panels (11.2.9)
610(1)
Troubleshooting (11.2.9.1)
611(1)
BitLocker Drive Encryption (11.2.9.2)
611(1)
File Explorer and Folder Options (11.2.9.3)
612(2)
System Administration (11.3)
614(30)
Administrative Tools (11.3.1)
614(1)
Administrative Tools Control Panel Item (11.3.1.1)
614(1)
Computer Management (11.3.1.2)
615(1)
Event Viewer (11.3.1.3)
616(2)
Local Users and Groups (11.3.1.4)
618(1)
Performance Monitor (11.3.1.5)
619(1)
Component Services and Data Sources (11.3.1.6)
620(1)
Services (11.3.1.7)
620(2)
Data Sources (11.3.1.8)
622(1)
Print Management (11.3.1.9)
622(1)
Windows Memory Diagnostics (11.3.1.10)
623(1)
System Utilities (11.3.2)
624(1)
System Information (11.3.2.1)
624(1)
System Configuration (11.3.2.2)
625(2)
The Registry (11.3.2.3)
627(1)
Regedit (11.3.2.4)
628(1)
Microsoft Management Console (11.3.2.5)
629(1)
DxDiag (11.3.2.6)
630(1)
Disk Management (11.3.3)
631(1)
What Do You Already Know? - Disk Operations (11.3.3.1)
631(1)
Disk Management Utility (11.3.3.2)
632(1)
Drive Status (11.3.3.3)
633(1)
Mounting a Drive (11.3.3.4)
634(1)
Adding Arrays (11.3.3.5)
635(1)
Disk Optimization (11.3.3.6)
636(2)
Disk Error-Checking (11.3.3.7)
638(1)
Application Installation and Configuration (11.3.4)
639(1)
System Requirements (11.3.4.1)
639(1)
Installation Methods (11.3.4.2)
640(1)
Installing an Application (11.3.4.3)
640(2)
Compatibility Mode (11.3.4.4)
642(1)
Uninstalling or Changing a Program (11.3.4.5)
642(1)
Security Considerations (11.3.4.7)
643(1)
Command-Line Tools (11.4)
644(36)
Using Windows CLI (11.4.1)
644(1)
PowerShell (11.4.1.1)
645(1)
The Command Shell (11.4.1.2)
645(1)
Basic Commands (11.4.1.3)
646(4)
File System CLI Commands (11.4.2)
650(1)
Command Syntax Conventions (11.4.2.1)
650(1)
File System Navigation (11.4.2.2)
651(1)
File System Navigation - Commands (11.4.2.3)
651(3)
Manipulating Folders - Commands (11.4.2.5)
654(4)
Manipulating Files - Commands (11.4.2.6)
658(8)
Disk CLI Commands (11.4.3)
666(1)
Disk Operations - Commands (11.4.3.1)
666(4)
Task and System CLI Commands (11.4.4)
670(1)
System CLI Commands (11.4.4.1)
670(5)
Other Useful CLI Commands (11.4.5)
675(1)
Other Useful Commands (11.4.5.1)
675(4)
Running System Utilities (11.4.5.2)
679(1)
Windows Networking (11.5)
680(20)
Network Sharing and Mapping Drives (11.5.1)
680(1)
Domain and Workgroup (11.5.1.1)
680(1)
HomeGroup (11.5.1.2)
681(2)
Network Shares and Mapping Drives (11.5.1.4)
683(1)
Administrative Shares (11.5.1.5)
684(1)
Sharing Local Resources with Others (11.5.2)
685(1)
Sharing Local Resources (11.5.2.1)
685(1)
Printer Sharing vs. Network Printer Mapping (11.5.2.2)
686(2)
Configure a Wired Network Connection (11.5.3)
688(1)
Configuring Wired Network Interfaces in Windows 10 (11.5.3.1)
688(1)
Configuring a Wired NIC (11.5.3.2)
689(3)
Setting a Network Profile (11.5.3.3)
692(1)
Verify Connectivity with the Windows GUI (11.5.3.4)
693(1)
Ipconfig Command (11.5.3.5)
694(1)
Network CLI Commands (11.5.3.6)
695(1)
Configure a Wireless Network Interface in Windows (11.5.4)
695(1)
Wireless Settings (11.5.4.1)
696(1)
Remote Access Protocols (11.5.5)
697(1)
VPN Access in Windows (11.5.5.1)
697(1)
Telnet and SSH (11.5.5.2)
698(1)
Remote Desktop and Assistance (11.5.6)
699(1)
Common Preventive Maintenance Techniques for Operating Systems (11.6)
700(7)
OS Preventive Maintenance Plan (11.6.1)
700(1)
Preventive Maintenance Plan Contents (11.6.1.1)
700(2)
Windows Updates (11.6.1.3)
702(2)
Backup and Restore (11.6.2)
704(1)
Restore Points (11.6.2.1)
704(1)
Hard Drive Backup (11.6.2.2)
705(2)
Basic Troubleshooting Process for Windows Operating Systems (11.7)
707(13)
Applying Troubleshooting Process to Windows Operating Systems (11.7.1)
707(1)
The Six Steps of the Troubleshooting Process (11.7.1.1)
707(1)
Identify the Problem (11.7.1.2)
707(1)
Establish a Theory of Provable Cause (11.7.1.3)
708(1)
Test the Theory to Determine the Cause (11.7.1.4)
708(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (11.7.1.5)
709(1)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (11.7.1.6)
710(1)
Document Findings, Actions, and Outcomes (11.7.1.7)
710(1)
Common Problems and Solutions for Windows Operating Systems (11.7.2)
711(1)
Common Problems and Solutions for Windows Operating Systems (11.7.2.1)
711(5)
Advanced Troubleshooting for Windows Operating Systems (11.7.3)
716(1)
Advanced Problems and Solutions for Windows Operating Systems (11.7.3.1)
716(4)
Summary (11.8)
720(1)
Practice
721(1)
Labs
721(1)
Packet Tracer Activity
722(1)
Check Your Understanding Questions
722(5)
Chapter 12 Mobile, Linux, and macOS Operating Systems
727(87)
Objectives
727(1)
Key Terms
727(2)
Introduction (12.0)
729(1)
Mobile Operating Systems (12.1)
729(26)
Android Vs iOS (12.1.1)
729(1)
Open Source vs. Closed Source (12.1.1.1)
730(2)
Applications and Content Sources (12.1.1.2)
732(2)
Android Touch Interface (12.1.2)
734(1)
Home Screen Items (12.1.2.1)
734(3)
iOS Touch Interface (12.1.3)
737(1)
Home Screen Items (12.1.3.1)
737(4)
Common Mobile Device Features (12.1.4)
741(1)
Screen Orientation (12.1.4.1)
741(2)
Screen Calibration (12.1.4.2)
743(2)
GPS (12.1.4.3)
745(2)
Wi-Fi Calling (12.1.4.5)
747(2)
NFC Payment (12.1.4.6)
749(1)
Virtual Private Network (12.1.4.7)
749(4)
Virtual Assistants (12.1.4.8)
753(2)
Methods for Securing Mobile Devices (12.2)
755(12)
Screen Locks and Biometric Authentication (12.2.1)
755(1)
What Do You Already Know? - Locks (12.2.1.1)
755(1)
Restrictions on Failed Login Attempts (12.2.1.3)
756(2)
Cloud-Enabled Services for Mobile Devices (12.2.2)
758(1)
Remote Backup (12.2.2.1)
758(1)
Locator Applications (12.2.2.2)
759(2)
Remote Lock and Remote Wipe (12.2.2.3)
761(2)
Software Security (12.2.3)
763(1)
Antivirus (12.2.3.1)
763(1)
Rooting and Jailbreaking (12.2.3.2)
764(1)
Patching and Updating Operating Systems (12.2.3.3)
765(2)
Linux and macOS Operating Systems (12.3)
767(26)
Linux and macOS Tools and Features (12.3.1)
767(1)
Introduction to Linux and macOS Operating Systems (12.3.1.1)
767(3)
Overview of Linux GUI (12.3.1.2)
770(1)
Overview of macOS GUI (12.3.1.3)
771(2)
Overview of Linux and macOS CLI (12.3.1.4)
773(2)
Linux Backup and Recovery (12.3.1.5)
775(1)
macOS Backup and Recovery (12.3.1.6)
776(1)
Overview of Disk Utilities (12.3.1.7)
777(1)
Linux and macOS Best Practices (12.3.2)
778(1)
Scheduled Tasks (12.3.2.1)
778(2)
Operating System Updates (12.3.2.2)
780(1)
Security (12.3.23)
781(2)
Basic CLI Commands (12.3.3)
783(1)
The ls --l Command Output (12.3.3.3)
783(1)
Basic Unix File and Directory Permissions (12.3.3.4)
784(2)
Linux Administrative Commands (12.3.3.7)
786(4)
Linux Administrative Commands Requiring Root Access (12.3.3.8)
790(3)
Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4)
793(12)
Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1)
794(1)
The Six Steps of the Troubleshooting Process (12.4.1.1)
794(1)
Identify the Problem (12.4.1.2)
794(1)
Establish a Theory of Probable Cause (12.4.1.3)
795(1)
Test the Theory to Determine the Cause (12.4.1.4)
796(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (12.4.1.5)
796(1)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12.4.1.6)
797(1)
Document Findings, Actions, and Outcomes (12.4.1.7)
797(1)
Common Problems and Solutions for Other Operating Systems (12.4.2)
798(1)
Common Problems and Solutions for Mobile Operating Systems (12.4.2.1)
798(3)
Common Problems and Solutions for Mobile OS Security (12.4.2.2)
801(2)
Common Problems and Solutions for Linux and macOS Operating Systems (12.4.2.3)
803(2)
Summary (12.5)
805(1)
Practice
805(1)
Labs
806(1)
Check Your Understanding Questions
806(8)
Chapter 13 Security
814(99)
Objectives
811(1)
Key Terms
811(3)
Introduction (13.0)
814(1)
13.1 Security Threats (13.1)
814(20)
Malware (13.1.1)
814(1)
Malware (13.M.1)
815(1)
What Do You Already Know? - Malware (13.1.1.2)
815(2)
Viruses and Trojan Horses (13.1.1.3)
817(1)
Types of Malware (13.1:1.4)
818(2)
Preventing Malware (13.1.2)
820(1)
Anti-Malware Programs (13.1.2.1)
820(2)
Signature File Updates (13.1.2.2)
822(1)
Remediating Infected Systems (13.1.2.4)
823(2)
Network Attacks (13.1.3)
825(1)
Networks Are Targets (13.1.3.1)
825(1)
Types of TCP/IP Attacks (13.1.3.2)
826(1)
Zero-Day (13.1.3.4)
827(1)
Protecting Against Network Attacks (13.1.3.5)
828(2)
Social Engineering Attacks (13.1.4)
830(1)
Social Engineering (13.1.4.1)
830(1)
What Do You Already Know? - Social Engineering Techniques (13.1.4.2)
830(2)
Social Engineering Techniques (13.1.4.3)
832(1)
Protecting Against Social Engineering (13.1.4.4)
833(1)
Security Procedures (13.2)
834(15)
Security Policy (13.2.1)
834(1)
What Is a Security Policy? (13.2.1.1)
834(1)
Security Policy Category (13.2.1.2)
835(1)
Securing Devices and Data (13.2.1.3)
835(1)
Protecting Physical Equipment (13.2.2)
835(1)
Physical Security (13.2.2.1)
835(1)
Types of Secure Locks (13.2.2.2)
836(3)
Mantraps (13.2.2.3)
839(1)
Securing Computers and Network Hardware (13.2.2.4)
840(1)
Protecting Data (13.2.3)
841(1)
Data - Your Greatest Asset (13.2.3.1)
841(1)
Data Backups (13.2.3.2)
842(1)
File and Folder Permissions (13.2.3.3)
842(2)
File and Folder Encryption (13.2.3.4)
844(1)
Windows BitLocker and BitLocker To Go (13.2.3.5)
844(3)
Data Destruction (13.2.4)
847(1)
Data Wiping Magnetic Media (13.2.4.1)
847(1)
Data Wiping Other Media (13.2.4.2)
848(1)
Hard Drive Recycling and Destruction (13.2.4.3)
848(1)
Securing Windows Workstations (13.3)
849(36)
Securing a Workstation (13.3.1)
849(1)
Securing a Computer (13.3.1.1)
849(1)
Securing BIOS (13.3.1.2)
850(1)
Securing Windows Login (13.3.1.3)
851(2)
Local Password Management (13.3.1.4)
853(1)
Usernames and Passwords (13.3.1.5)
854(1)
Windows Local Security Policy (13.3.2)
855(1)
The Windows Local Security Policy (13.3.2.1)
855(1)
Account Policies Security Settings (13.3.2.2)
856(2)
Local Policies Security Settings (13.3.2.3)
858(1)
Exporting the Local Security Policy (13.3.2.4)
859(1)
Managing Users and Groups (13.3.3)
860(1)
Maintaining Accounts (13.3.3.1)
860(1)
Managing User Account Tools and User Account Tasks (13.3.3.2)
861(1)
Local Users and Groups Manager (13.3.3.3)
862(2)
Managing Groups (13.3.3.4)
864(3)
Active Directory Users and Computers (13.3.3.5)
867(2)
Windows Firewall (13.3.4)
869(1)
Firewalls (13.3.4.1)
869(2)
Software Firewalls (13.3.4.2)
871(1)
Windows Firewall (13.3.4.3)
872(2)
Configuring Exceptions in Windows Firewall (13.3.4.4)
874(1)
Windows Firewall with Advanced Security (13.3.4.5)
875(1)
Web Security (13.3.5)
876(1)
Web Security (13.3.5.1)
876(1)
InPrivate Browsing (13.3.5.2)
877(2)
Pop-up Blocker (13.3.5.3)
879(1)
SmartScreen Filter (13.3.5.4)
880(1)
ActiveX Filtering (13.3.5.5)
881(1)
Security Maintenance (13.3.6)
882(1)
Restrictive Settings (13.3.6.1)
883(1)
Disable Auto-Play (13.3.6.2)
883(1)
Operating System Service Packs and Security Patches (13.3.6.3)
884(1)
Wireless Security (13.4)
885(15)
Configure Wireless Security (13.4.1)
886(1)
What Do You Already Know? - Wireless Security (13.4.1.1)
886(1)
Common Communication Encryption Types (13.4.1.2)
887(2)
Wi-Fi Configuration Best Practices (13.4.1.3)
889(2)
Authentication Methods (13.4.1.4)
891(1)
Wireless Security Modes (13.4.1.5)
892(1)
Firmware Updates (13.4.1.6)
893(1)
Firewalls (13.4.1.7)
894(2)
Port Forwarding and Port Triggering (13.4.1.8)
896(2)
Universal Plug and Play (13.4.1.9)
898(2)
Basic Troubleshooting Process for Security (13.5)
900(6)
Applying the Troubleshooting Process to Security (13.5.1)
900(1)
The Six Steps of the Troubleshooting Process (13.5.1.1)
900(1)
Identify the Problem (13.5.1.2)
901(1)
Establish a Theory of Probable Cause (13.5.1.3)
901(1)
Test the Theory to Determine Cause (13.5.1.4)
902(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (13.5.1.5)
903(1)
Verify Full System Functionality and, if Applicable Implement Preventive Measures (13.5.1.6)
903(1)
Document Findings, Actions, and Outcomes (13.5.1.7)
904(1)
Common problems and Solutions for Security (13.5.2)
904(1)
Common Problems and Solutions for Security (13.5.2.1)
904(2)
Summary (13.6)
906(1)
Practice
907(1)
Tabs
907(1)
Packet Tracer Activity
907(1)
Check Your Understanding Questions
908(5)
Chapter 14 The IT Professional
913(52)
Objectives
913(1)
Key Terms
913(2)
Introduction (14.0)
915(1)
Communication Skills and the IT Professional (14.1)
915(10)
Communication Skills, Troubleshooting, and Professional Behavior (14.1.1)
915(1)
Relationship Between Communication Skills and Troubleshooting (14.1:1.1)
916(1)
Relationship Between Communication Skills and Professional Behavior (14.1.1.3)
917(1)
Working with a Customer (14.1.2)
917(1)
Know, Relate, and Understand (14.1.2.1)
917(1)
Active Listening (14.1.2.2)
918(1)
Professional Behavior (14.1.3)
919(1)
Using Professional Behavior with the Customer (14.1.3.1)
919(1)
Tips for Hold and Transfer (14.1.3.2)
920(1)
14.1.3.4 What Do You Already Know? - Netiquette (14.1.3.4)
921(1)
The Customer Call (14.1.4)
922(1)
Keeping the Customer Call Focused (14.1.4.1)
922(3)
Operational Procedures (14.2)
925(9)
Documentation (14.2.1)
925(1)
Documentation Overview (14.2.1.1)
925(1)
IT Department Documentation (14.2.1.2)
926(1)
Regulatory Compliance Requirements (14.2.1.3)
927(1)
Change Management (14.2.2)
928(1)
Change Control Process (14.2.2.1)
928(3)
Disaster Prevention and Recovery (14.2.3)
931(1)
Disaster Recovery Overview (14.2.3.1)
931(1)
Preventing Downtime and Data Loss (14.2.3.2)
931(2)
Elements of a Disaster Recovery Plan (14.2.3.3)
933(1)
Ethical and Legal Considerations (14.3)
934(10)
Ethical and Legal Considerations in the IT Profession (14.3.1)
935(1)
Ethical and Legal Considerations in IT (14.3.1.1)
935(1)
Personally Identifiable Information (PII) (14.3.1.2)
935(1)
Payment Card Industry (PCI) (14.3.1.3)
936(1)
Protected Health Information (PHI) (14.3.1.4)
936(1)
Legal Considerations in IT (14.3.1.6)
937(1)
Licensing (14.3.1.7)
938(2)
Legal Procedures Overview {14.3.2)
940(1)
Computer Forensics (14.3.2.1)
940(1)
Data Collected in Computer Forensics (14.3.2.2)
941(1)
Cyber Law (14.3.2.3)
942(1)
First Response (14.3.2.4)
942(1)
Documentation (14.3.2.5)
942(1)
Chain of Custody (14.3.2.6)
943(1)
Call Center Technicians (14.4)
944(14)
Call Centers, Level One and Level Two Technicians (14.4.1)
944(1)
Call Centers (14.4.1.1)
944(2)
Level One Technician Responsibilities (14.4.1.2)
946(1)
Level Two Technician Responsibilities (14.4.1.3)
947(2)
Basic Scripting and the IT Professional (14.4.2)
949(1)
Script Examples (14.4.2.1)
949(1)
Scripting Languages (14.4.2.2)
950(1)
Basic Script Commands (14.4.2.3)
951(1)
Variables/Environmental Variables (14.4.2.4)
952(1)
Conditional Statements (14.4.2.5)
953(2)
Loops (14.4.2.6)
955(3)
Summary (14.5)
958(1)
Practice
959(1)
Labs
959(1)
Check Your Understanding Questions
959(6)
Appendix A Answers to "Check Your Understanding" Questions 965(20)
Glossary 985(56)
Index 1041
Cisco Networking Academy  is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.