About the Course
Part 1: Domain 1.0 – IT Concepts and Terminology
Lesson 2: How Computers Store Data: Notational Systems
Lesson 3: Compare and Contrast Fundamental Data Types and Their Characteristics
Lesson 4: Input, Output, and More: The Basic of Computing and Processing
Lesson 5: Explain the Value of Data and Information
Lesson 6: Common Units of Measure: Storage, Throughput, and Speed
Lesson 7: Explain the Troubleshooting Methodology
Part 2: Domain 2.0 - Infrastructure
Lesson 8: I/O: Input/Output Device Interfaces
Lesson 9: Connecting and Configuring Peripherals
Lesson 10: Explain the Purpose of Common Internal Computer Components
Lesson 11: Internet Service Types
Lesson 12: Compare and Contrast Storage Types
Lesson 13: Compare and Contrast Common Computing Devices and Their Purpose
Lesson 14: Explain Basic Networking Concepts
Lesson 15: Given a Scenario, Install, Configure, and Secure a Basic Wireless Network
Part 3: Domain 3.0 – Applications and Software
Lesson 16: Explain the Purpose of Operating Systems
Lesson 17: Operating Systems 101: Features, Processes, UI, and Management
Lesson 18: Purpose and Proper Use of Software
Lesson 19: Getting Apps From Source to Your Device
Lesson 20: Configuring and Using Web Browsers
Lesson 21: Compare and Contrast General Application Concepts and Uses
Part 4: Domain 4.0 – Software Development Concepts
Lesson 22: Compare and Contrast Programming Language Categories
Lesson 23: Using Programming Organizational Techniques and Interpret Logic
Lesson 24: Explain the Purpose and Use of Programming Concepts
Part 5: Domain 5.0 – Database Fundamentals
Lesson 25: Explain Database Concepts and the Purpose of a Database
Lesson 26: Compare and Contrast Various Database Structures
Lesson 27: Summarize Methods Used to Interface with Databases
Part 6: Domain 6.0 – Security
Lesson 28: Confidentiality, Integrity, and Availability Concerns
Lesson 29: Device Security Best Practices
Lesson 30: Summarize Behavioral Security Concepts
Lesson 31: Compare and Contrast Authentication, Authorization, Accounting, and Non-Repudiation
Lesson 32: Explain Password Best Practices
Lesson 33: Explain Common Uses of Encryption
Lesson 34: Explain Business Continuity Concepts