CompTIA IT Fundamentals Certification Boot Camp (FC0-U61)

Description

Duration: 5 Days

About the Course

The CompTIA IT Fundamentals exam will certify the successful candidate has the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, application and software, software development, database fundamentals and security. In addition, candidates will have the ability to demonstrate their knowledge to:

  • Install software
  • Establish basic network connectivity
  • Identify/prevent basic security risks
  • Explain troubleshooting theory and preventative maintenance of devices

Audience Profile

CompTIA recommends this exam for students considering a career in IT, professionals working in fields that require a broad understanding of IT, marketing, sales and operations staff in IT-based organizations.

Learning Objective

IT CONCEPTS & TERMINOLOGY – Comprehend notational systems, illustrate the basics of computing and explain the value of data and troubleshooting

INFRASTRUCTURE – Know how to set up and install common peripheral devices to a laptop/PC or secure a basic wireless network

APPLICATIONS & SOFTWARE – Manage applications software, understand the various components of an operating system and explain the purpose of methods of application architecture

SOFTWARE DEVELOPMENT – Comprehend programming language categories, interpret logic, and understand the purpose of programming concepts

DATABASE FUNDAMENTALS – Able to explain database concepts, structures, and purpose, as well as understands methods used to interface

SECURITY – Understand confidentiality, integrity, and availability concerns of secure devices and best practice methods

Certification Exam

This training course prepares students for EXAM CODE FCO-U61

Prerequisites

This exam is intended for candidates who are advanced end users and/or are considering a career in IT.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic EnrollPrivate PricePrivate Enroll
12/12/202212/16/2022
1/2/20231/6/2023
1/23/20231/27/2023
2/13/20232/17/2023
3/6/20233/10/2023
3/27/20233/31/2023
4/17/20234/21/2023
5/8/20235/12/2023
5/29/20236/2/2023
6/19/20236/23/2023
7/10/20237/14/2023
7/31/20238/4/2023
8/21/20238/25/2023
9/11/20239/15/2023
10/2/202310/6/2023
10/23/202310/27/2023
11/13/202311/17/2023
12/4/202312/8/2023
12/25/202312/29/2023

Curriculum

1.0 IT Concepts and Terminology

1.1 Compare and contrast notational systems.

• Binary
• Hexadecimal
• Decimal
• Data representation
– ASCII
– Unicode

1.2 Compare and contrast fundamental data types and their characteristics.

• Char
• Strings
• Numbers
– Integers
– Floats
• Boolean

1.3 Illustrate the basics of computing and processing.

• Input
• Processing
• Output
• Storage

1.4 Explain the value of data and information. 

• Data and information as assets
• Importance of investing in security
• Relationship of data to creating information
• Intellectual property
– Trademarks
– Copyright
– Patents
• Digital products
• Data-driven business decisions
– Data capture and collection
– Data correlation
– Meaningful reporting

1.5 Compare and contrast common units of measure.

• Storage unit
– Bit
– Byte
– KB
– MB
– GB
– TB
– PB
• Throughput unit
– bps
– Kbps
– Mbps
– Gbps
– Tbps
• Processing speed
– MHz
– GHz

1.6 Explain the troubleshooting methodology.

• Identify the problem
– Gather information
– Duplicate the problem, if possible
– Question users
– Identify symptoms
– Determine if anything has changed
– Approach multiple problems individually
• Research knowledge base/Internet, if applicable
• Establish a theory of probable cause
– Question the obvious
– Consider multiple approaches
– Divide and conquer
• Test the theory to determine the cause
– Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem
– If the theory is not confirmed, establish a new theory or escalate
• Establish a plan of action to resolve the problem and identify potential effects
• Implement the solution or escalate as necessary
• Verify full system functionality and, if applicable, implement preventive measures
• Document findings/lessons learned, actions, and outcomes

2.0 Infrastructure

2.1 Classify common types of input/output device interfaces.

• Networking
– Wired
– Telephone connector (RJ-11)
– Ethernet connector (RJ-45)
– Wireless
– Bluetooth
– NFC
• Peripheral device
– USB
– FireWire
– Thunderbolt
– Bluetooth
– RF
• Graphic device
– VGA
– HDMI
– DVI
– DisplayPort
– Mini DisplayPort

2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC.

•Devices
– Printer
– Scanner
– Keyboard
– Mouse
– Camera
– External hard drive
– Speakers
– Display
• Installation types
– Plug-and-play vs. driver installation
– Other required steps
– IP-based peripherals
– Web-based configuration steps

2.3 Explain the purpose of common internal computing components.

• Motherboard/system board
• Firmware/BIOS
• RAM
• CPU
– ARM
– Mobile phone
– Tablet
– 32-bit
– Laptop
– Workstation
– Server
– 64-bit
– Laptop
– Workstation
– Server
• Storage
– Hard drive
– SSD
• GPU
• Cooling
• NIC
– Wired vs. wireless
– On-board vs. add-on card

2.4 Compare and contrast common Internet service types.

• Fiber optic
• Cable
• DSL
• Wireless
– Radio frequency
– Satellite
– Cellular

2.5 Compare and contrast storage types.

• Volatile vs. non-volatile
• Local storage types
– RAM
– Hard drive
– Solid state vs. spinning disk
– Optical
– Flash drive
• Local network storage types
– NAS
– File server
• Cloud storage service

2.6 Compare and contrast common computing devices and their purposes.

• Mobile phones
• Tablets
• Laptops
• Workstations
• Servers
• Gaming consoles
• IoT
– Home appliances
– Home automation devices
– Thermostats
– Security systems
– Modern cars
– IP cameras
– Streaming media devices
– Medical devices

2.7 Explain basic networking concepts.

• Basics of network communication
– Basics of packet transmission
– DNS
– URL-to-IP translation
– LAN vs. WAN
• Device addresses
– IP address
– MAC address
• Basic protocols
– HTTP/S
– POP3
– IMAP
– SMTP
• Devices
– Modem
– Router
– Switch
– Access point
– Firewall

2.8 Given a scenario, install, configure and secure a basic wireless network.

• 802.11a/b/g/n/ac
– Older vs. newer standards
– Speed limitations
– Interference and attenuation factors
• Best practices
– Change SSID
– Change default password
– Encrypted vs. unencrypted
– Open
– Captive portal
– WEP
– WPA
– WPA2

3.0 Applications and Software

3.1 Explain the purpose of operating systems.

• Interface between applications and hardware
• Disk management
• Process management/scheduling
– Kill process/end task
• Application management
• Memory management
• Device management
• Access control/protection
• Types of OS
– Mobile device OS
– Workstation OS
– Server OS
– Embedded OS
– Firmware
– Hypervisor (Type 1)

3.2 Compare and contrast components of an operating system.

• File systems and features
– File systems
– NTFS
– FAT32
– HFS
– Ext4
• Features
– Compression
– Encryption
– Permissions
– Journaling
– Limitations
– Naming rules
• File management
– Folders/directories
– File types and extensions
– Permissions
• Services
• Processes
• Drivers
• Utilities
– Task scheduling
• Interfaces
– Console/command line
– GUI

3.3 Explain the purpose and proper use of software. 

• Productivity software
– Word processing software
– Spreadsheet software
– Presentation software
– Web browser
– Visual diagramming software
• Collaboration software
– Email client
– Conferencing software
– Instant messaging software
– Online workspace
– Document sharing
• Business software
– Database software
– Project management software
– Business-specific applications
– Accounting software

3.4 Explain methods of application architecture and delivery models.

• Application delivery methods
– Locally installed
– Network not required
– Application exists locally
– Files saved locally
– Local network hosted
– Network required
– Internet access not required
– Cloud hosted
– Internet access required
– Service required
– Files saved in the cloud
• Application architecture models
– One tier
– Two tier
– Three tier
– n-tier

3.5 Given a scenario, configure and use web browsers.

• Caching/clearing cache
• Deactivate client-side scripting
• Browser add-ons/extensions
– Add
– Remove
– Enable/disable
• Private browsing
• Proxy settings
• Certificates
– Valid
– Invalid
• Popup blockers
• Script blockers
• Compatible browser for application(s)

3.6 Compare and contrast general application concepts and uses.

• Single-platform software
• Cross-platform software
– Compatibility concerns
• Licensing
– Single use
– Group use/site license
– Concurrent license
– Open source vs. proprietary
– Subscription vs. one-time purchase
– Product keys and serial numbers
• Software installation best practices
– Reading instructions
– Reading agreements
– Advanced options

4.0 Software Development Concepts

4.1 Compare and contrast programming language categories. 

• Interpreted
– Scripting languages
– Scripted languages
– Markup languages
• Compiled programming languages
• Query languages
• Assembly language

4.2 Given a scenario, use programming organizational techniques and interpret logic.

• Organizational techniques
– Pseudocode concepts
– Flow-chart concepts
– Sequence
• Logic components
– Branching
– Looping

4.3 Explain the purpose and use of programming concepts.

• Identifiers
– Variables
– Constants
• Containers
– Arrays
– Vectors
• Functions
• Objects
– Properties
– Attributes
– Methods

5.0 Database Fundamentals

5.1 Explain database concepts and the purpose of a database.

• Usage of database
– Create
– Import/input
– Query
– Reports
• Flat file vs. database
– Multiple concurrent users
– Scalability
– Speed
– Variety of data
• Records
• Storage
– Data persistence

5.2 Compare and contrast various database structures.

• Structured vs. semi-structured vs. non-structured
• Relational databases
– Schema
– Tables
– Rows/records
– Fields/columns
– Primary key
– Foreign key
– Constraints
• Non-relational databases
– Key/value databases
– Document databases

5.3 Summarize methods used to interface with databases.

• Relational methods
– Data manipulation
– Select
– Insert
– Delete
– Update
– Data definition
– Create
– Alter
– Drop
– Permissions
• Database access methods
– Direct/manual access
– Programmatic access
– User interface/utility access
– Query/report builders
• Export/import
– Database dump
– Backup

6.0 Security

6.1 Summarize confidentiality, integrity and availability concerns.

• Confidentiality concerns
– Snooping
– Eavesdropping
– Wiretapping
– Social engineering
– Dumpster diving
• Integrity concerns
– Man-in-the-middle
– Replay attack
– Impersonation
– Unauthorized information alteration
• Availability concerns
– Denial of service
– Power outage
– Hardware failure
– Destruction
– Service outage

6.2 Explain methods to secure devices and best practices.

• Securing devices (mobile/workstation)
– Antivirus/Anti-malware
– Host firewall
– Changing default passwords
– Enabling passwords
– Safe browsing practices
– Patching/updates
• Device use best practices
– Software sources
– Validating legitimate sources
– Researching legitimate sources
– OEM websites vs. third-party websites
– Removal of unwanted software
– Removal of unnecessary software
– Removal of malicious software

6.3 Summarize behavioral security concepts.

• Expectations of privacy when using:
– The Internet
– Social networking sites
– Email
– File sharing
– Instant messaging
– Mobile applications
– Desktop software
– Business software
– Corporate network
• Written policies and procedures
• Handling of confidential information
– Passwords
– Personal information
– Customer information
– Company confidential information

6.4 Compare and contrast authentication, authorization, accounting and non-repudiation concepts.

• Authentication
– Single factor
– Multifactor
– Examples of factors
– Password
– PIN
– One-time password
– Software token
– Hardware token
– Biometrics
– Specific location
– Security questions
– Single sign-on
• Authorization
– Permissions
– Least privilege model
– Role-based access
– User account types
– Rule-based access
– Mandatory access controls
– Discretionary access controls
• Accounting
– Logs
– Tracking
– Web browser history
• Non-repudiation
– Video
– Biometrics
– Signature
– Receipt

6.5 Explain password best practices.

• Password length
• Password complexity
• Password history
• Password expiration
• Password reuse across sites
• Password managers
• Password reset process

6.6 Explain common uses of encryption.

• Plain text vs. cipher text
• Data at rest
– File level
– Disk level
– Mobile device
• Data in transit
– Email
– HTTPS
– VPN
– Mobile application

6.7 Explain business continuity concepts.

• Fault tolerance
– Replication
– Redundancy
– Data
– Network
– Power
– Backup considerations
– Data
– File backups
– Critical data
– Database
– OS backups
– Location
– Stored locally
– Cloud storage
– On-site vs. off-site
– Contingency plan
• Disaster recovery
– Data restoration
– Prioritization
– Restoring access