Ch 1: Course Introduction
Chapter 1 introduces the TestOut PC Pro course. It introduces computer basics and how to interact with our simulated lab environment. It also introduces the TestOut PC Pro and CompTIA A+ certifications.
Ch 2: PC Technician Responsibilities
Chapter 2 covers core principles that enable students to navigate the essential tasks in entry level IT positions. It introduces the importance of documentation, the need for both asset and change management, as well as the fundamentals of professionalism. Students will learn how to use ticketing systems to create, resolve, and close tickets. Additionally, students will learn foundational skills for how to work with technology including protection and safety, environmental controls, PC maintenance, PC and networking tools, and the troubleshooting process.
Ch 3: Hardware
Chapter 3 addresses the essential hardware components that make computer systems operational. Students will get hands-on experience with the installation, configuration, and troubleshooting of these various devices. Covering the motherboard, memory, processor, power supply, video, audio, and even the BIOS/UEFI, students will be able to assemble and troubleshoot a computer and its various components.
Ch 4: Operating System Basics
Chapter 4 introduces the major desktop-class operating systems and the various features that differentiate them. Students will learn about the various Windows editions they may encounter, exploring the interface and features of each. Linux and macOS are also similarly explored.
Ch 5: Storage
Chapter 5 expounds on the various media storage types and storage configuration considerations. RAID levels are discussed along with the benefits and downsides of each. Students will learn about various file systems and formatting options for drives. They will also learn to format drives as well as create and convert volumes. Students will learn partitioning, extending volumes, and implementing storage spaces. Disk optimization is discussed across the various operating systems as well as troubleshooting the hardware and software configurations for storage devices.
Ch 6: System Implementation
Chapter 6 teaches students how to install and implement Windows systems. They’ll explore pre-installation planning, the installation process itself, and post-installation optimization. Additionally, cloud computing and virtualization will be addressed. Students will learn about hypervisors, such as Hyper-V and VMWare, and will learn how to create virtual machines and virtual hard drives.
Ch 7: System Management 1
Chapter 7 focuses on how to manage operating systems and usage. Students learn to use Windows system tools that allow them to configure, manage, and troubleshoot Windows systems. This includes tools such as control panel, task manager, Regedit, event viewer, and system commands. Students will get practice managing and troubleshooting applications on Windows and Linux systems. Digital rights management and virtual memory management are also explored. Scripting is outlined and students learn various scripting types as well as uses.
Ch 8: System Management 2
Chapter 8 continues to explore managing systems, through more advanced configurations and features. Active Directory, and users and groups teach students about organizational structuring and explore authentication. Students will learn how to use and configure remote desktop and remote assistance. They will practice setting up a VPN connection and configuring updates across various operating systems. As a part of system management, they will learn how to create, manage, and restore data from system backups. Windows boot errors will be addressed, and students will learn to configure the boot order and utilize advanced options to troubleshoot and configure startup issues.
Ch 9: File Management
Chapter 9 focuses on file management for both Windows and Linux systems. Learn to manage files from the command prompt or command line, including ownership, permissions, contents, or file location. NTFS and share permissions are used to configure folder sharing and security. Students will also learn about file encryption and how to use BitLocker.
Ch 10: Peripheral Devices
Chapter 10 explores the most common peripheral devices and how to manage them. Students learn how to configure external display settings. They will also focus on installing and managing device drivers, all across various operating systems. Troubleshooting focuses on common issues with devices and their drivers.
Ch 11: Networking
Chapter 11 takes students through a comprehensive introduction to networking. Students will learn about various network devices and their respective use cases. Introducing concepts such as TCP/IP protocols, SOHO configurations, and wireless security, students will start with basic networking concepts. Through this chapter, they will progress to network infrastructure, encryption and authentication, and command line utilities that will allow them to troubleshoot complex network issues.
Ch 12: Mobile Devices
Chapter 12 explores portable computing devices such as phones, tablets, and laptops. With a heavy focus on laptops, unique considerations for mobile devices, hardware repair or upgrades, and mobile device security are all essential topics in modern computing environments. This chapter helps students understand how to configure and manage mobile devices to mitigate the additional risks they can present. As connectivity becomes more prevalent, it is essential for students to learn how to manage and synchronize devices as covered here.
Ch 13: Printing
Chapter 13 covers the various nuances of printing, from connectivity to printer types. It walks though the most common types of printers including inkjet, thermal, laser, and 3D printers. Troubleshooting helps to identify the most common types of issues with printing, from physical issues in the print process to the software that manages print jobs.
Ch 14: Security
Chapter 14 covers an essential topic in our modern computing environment, security. Best practices are established to set the baseline for how to manage security concerns. Regulated data and data disposal are discussed to prepare students for the current cybersecurity climate. Social engineering and malware protections are explored to help prevent against a common attack vector. Software and hardware solutions are also featured to prevent as much danger as possible upstream from your users. Proxy servers, firewalls, browser security, and physical and logical security all play a large part in this chapter with the design of preventing security concerns as much as possible.
Ch 15: Capstone Exercises
Chapter 15 gives students the chance to put their knowledge into practice with cumulative activities that incorporate tasks taught throughout the course. Students will be able to take on these comprehensive exercises to show their mastery of skills and identify any areas that need additional support.
Ch 2: PC Technician Responsibilities
Protection and Safety
- Safety
- Safety Measures
- Electrostatic Discharge
- ESD Protection
Environmental Controls
- Environmental Concerns
- Power Concerns
- Configure UPS Settings
- Install a UPS
Professionalism
- Professionalism
Change Management
- Change Management Overview
PC Maintenance
- PC Maintenance Best Practices
PC and Networking Tools
- PC and Networking Tools
Troubleshooting Process Overview
- Troubleshooting Process
Support Systems
- Ticketing Systems
- Create and Close Tickets
- Ticketing System Settings
- Create a Ticket
- Close a Ticket
- Asset Management
- Explore Asset Tracking Systems
- View Warranty Information
Documentation
- Documentation Types
- Onboarding and Offboarding Checklists
Ch 3: Hardware
Network Media
- Network Cables
- Coaxial Cable
- Twisted Pair Cable
- Twisted Pair Connector
- Fiber Optic Cable
Cables and Connectors
- External Connectors
- Universal Serial Bus
- Install USB Devices
- Peripheral and Video Cables
- Hard Drive Cables
- Adapter and Converter
Cases and Motherboards
- Cases and Form Factors
- Motherboard Components
- Choose and Install a Motherboard
Motherboard Troubleshooting
- Motherboard Troubleshooting
- Troubleshoot System Power
- Troubleshoot Power Supply Problems
Memory
- DRAM Types
- Random Access Memory (RAM)
- Multi-Channel Memory Architecture
Memory Installation
- Memory Characteristics
- Select Memory by Sight
- Select the Correct Memory Module
- Install Memory
- Install Triple Channel Memory
Memory Troubleshooting
- Memory Troubleshooting
- Test Memory
- Troubleshoot Memory
BIOS/UEFI
- BIOS/UEFI
- PC Boot Process
- Edit BIOS/UEFI Settings
- Use Built-in System Diagnostics
- Flash the BIOS
- Find BIOS/UEFI Settings
- BIOS/UEFI Security
- Configure BIOS/UEFI Security Settings
- Configure BIOS/UEFI Security
Processors
- Processor Concepts
- CPU
- CPU Performance
- CPU Socket
- Install a Processor
- Select and Install a Processor
Processor Troubleshooting
- Processor Troubleshooting
- Troubleshoot Processor Installation
Video and Expansion Cards
- Expansion Buses and Slots
- Expansion Bus Types
- Install an Expansion Card
- Install Expansion Cards
- Video Cards
- Video and Capture Card Facts
- Install a Video Card
- Configure Capture Card
- Upgrade a Video Card
Audio
- Digital Audio
- Sound Cards
- Manage Audio Devices
- Sound Card Connectors
- Select and Install a Sound Card
Cooling
- System Cooling
Power Supplies
- Power Supplies
- Identify Power Supply Components
- Change the Power Supply
- Install a Power Supply
Ch 4: Operating Systems Basics
Operating System
- Workstation Operating Systems
Windows Basics
- Windows Operating Systems
- Windows 10 Editions
- Windows 11 Editions
- Windows Features
- Use the Windows 10 Interface
- Use the Windows 11 Interface
- Windows Upgrade
Linux Basics
- Linux Operating Systems
- Navigate Linux in the GUI
macOS Basics
- macOS Introduction
- Installing and Uninstalling Apps
- macOS Interface System Preferences
- macOS Features and Settings
Ch 5: Storage
Storage Devices
- Storage Devices
SATA
- SATA
- Install a SATA Device
- Install SATA Devices
Optical Media
- CD Drives
- DVD Drives
- Blu-ray
RAID
- RAID
- Configure a RAID Array
- Create RAID Arrays
- Implement a RAID Solution
File Systems
- Partitions, Volumes, and File Systems
- View File System Components
- MBR Partitioning
- GPT Partitioning
- Create Volumes with Disk Management
- Create Volumes with Diskpart
- Convert Volumes
- Create Volumes
- Format Drives
- Disk Status
Storage Management
- Add Storage
- Create Mount Points and Extending Volumes
- Shrink and Split Partitions
- Add Space to Existing Volumes
Storage Spaces
- Storage Spaces
- Create Storage Spaces
- Implement Storage Spaces
Disk Optimization
- Storage Optimization
- Optimize Disks in Windows
- Optimize Disks in Linux
- Optimize Disks in macOS
- Perform Disk Maintenance
Storage and RAID Troubleshooting
- Storage and RAID Troubleshooting
- SSD Storage Issues
- SSD Maintenance
- Troubleshoot SATA Devices
Ch 6: System Implementation
Windows Pre-Installation
- Pre-Installation Planning
- Verify System Compatibility
Windows Installation
- Prepare Disks for Installation
- Create Bootable Media
- Configure Workstation for Network Boot
- Install a Workstation Image Using PXE
- Install Windows
- Post-Installation
Cloud Computing
- Cloud Computing Overview
Virtualization
- Virtualization Overview
- Use VMWare Player
- Use Hyper-V
- Create Virtual Machines
- Create Virtual Hard Disks
Ch 7: System Management 1
Windows System Tools
- Use Task Manager
- Use Control Panel
- Use Management Consoles
- View System Information
- System Configuration
- Use Regedit
- Use Event Viewer
- Explore System Commands
- Use System Commands
Windows Settings
- Personalize Windows
- Configure Region and Language Options
- Index Files
Performance Monitoring
- Performance Monitoring
- Monitor System Performance
Windows Application Management
- Windows Application Installation
- Manage Windows Applications
- Configure Application Compatibility
- Schedule Tasks
- Manage Microsoft Store Apps
- Manage Applications
- Repair Programs
Linux Application Management
- Install Linux Software
- Manage Apps on Linux
- Manage Processes on Linux
- Linux Application Management
Digital Content Management
- Software Licensing
- Digital Rights Management (DRM)
- Digital Content Management
Virtual Memory
- Windows Virtual Memory
- Manage Virtual Ram
- Configure Virtual Memory
Windows and Application Troubleshooting
- Troubleshooting Windows
- Troubleshoot Windows Applications
- Troubleshoot Windows Services
Scripting Basics
- Scripting
- Scripting Types
- Scripting Uses
Ch 8: System Management 2
Active Directory
- Workgroup vs. Domain Setup
- Active Directory Overview
- Join a Domain
- Join a Workstation to a Domain
- Manage Active Directory Objects
- Create User Accounts
- Create OUs
- Delete OUs
- Group Policy
- Use Group Policy
Users and Groups
- Users and Groups
- Login Options
- Manage Local Users and Groups
- Authenticate with Online User Accounts
- Manage Users and Groups
- Manage UAC Settings
Remote Services
- Remote Access Technologies
- Remote Desktop
- Use Remote Desktop
- Remote Assistance
- Use Remote Assistance
- Configure Remote Services
- Screen Sharing
- Use Video Conferencing Software
VPN
- Virtual Private Networks (VPN)
- Set Up a VPN Connection
- Configure a VPN Connection
Updates
- Use Windows Update
- Configure Windows Update
- Update Linux
- Update macOS
System Backup
- System Backup
- Create Backups in Windows
- Create Backups in Linux
- Restore Data on Linux
- Use Time Machine on macOS
- Restore Data on macOS
- Back Up the Computer
- Configure File History
- Restore Data from File History
System Recovery
- Windows System Recovery
- Use Restore Points
- Create a Restore Point
- Use Windows System Recovery Tools
- Boot into the Windows Recovery Environment
- Use File Recovery Tools
Windows Boot Errors
- Windows Boot Process
- Modify the Boot Order
- Configure the Boot Order
- Use Advanced Boot Options
- Windows Boot Options
- Use the bootrec Command
- Startup Error
- Troubleshoot System Startup
Ch 9: File Management
Manage Files on Windows
- Windows File and Folder Properties
- System File Locations
- Manage Files on Windows
- Manage Files
- Manage Directories from the Command Prompt
- Manage Files from the Command Prompt
- File Management Commands
- Manage Files and Folders
NTFS and Share Permissions
- NTFS and Share Permissions
- Configure Basic Folder Sharing on Windows
- Configure Advanced Folder Sharing on Windows
- Configure Share and NTFS Permissions
- Configure NTFS Permissions
- Share and Secure Folders
- Configure NTFS Permissions
File Encryption
- File Encryption
- BitLocker
Linux File Management
- Use Linux Shell Commands
- Use Shell Commands
- Manage the Linux File System
- View File Contents
- Edit File Contents
- Manage Ownership and Permissions
- Manage the Linux File System
- Manage Linux File Ownership
Ch 10: Peripheral Devices
Peripheral Devices
- Peripheral Devices
Display Devices
- Configure Display Settings in Windows
- Configure Advanced Display Settings in Windows
- Select and Configure Dual Monitors
- Configure Display Settings in Linux
- Configure Display Settings in macOS
Display, Video, and Projector Troubleshooting
- Video Troubleshooting
- Projector Troubleshooting
Device Driver Management
- Device Installation
- Install and Manage Device Drivers on Windows
- Manage Devices on Linux
- Manage Devices on macOS
- Manage Devices
Device Driver Troubleshooting
- Device Driver Troubleshooting
- Troubleshoot Devices
- Work with Legacy Devices and Drivers
- Manage Devices
Ch 11: Networking
Networking Overview
- Networking Introduction
- Network Types
Networking Ports and Protocols
- TCP and UDP
- Ports and Protocols
Client-Side Network Configuration
- Device Addressing
- IPv4 Addressing
- IP Version 6
- Configure TCP/IP Properties
- Configure TCP/IP Settings on Windows 10
- Configure TCP/IP Settings on Window 11
Services Provided by Network Devices
- Server Roles
- Explore Server Roles
- Configure DHCP on a Windows Server
- Configure DNS on a Windows Server
- Internet Appliances
- Internet of Things
- Smart Devices
- Configure Smart Devices
- Embedded Systems (SCADA)
Wireless Networking
- Wireless Networking
- Install a Wireless Network Adapter
- Wireless Security
- Wireless Encryption and Authentication
- Configure a Wireless Connection
- Connect to a Wireless Network
- Create a Home Wireless Network
- Secure Home Wireless Network
- Configure a Wireless Profile
- Infrared, Bluetooth, and NFC
- Configure Bluetooth Connections
SOHO Configuration
- SOHO Configuration
- Configure a SOHO Router
- Configure a Wireless Router
- Perform a Firmware Update
- Update Firmware
Networking Hardware
- Network Infrastructure
- Explore Network Switch Settings
- Internet Connection Types
- Select and Install a Network Adapter
- Configure a Wireless Infrastructure
- Configure a DSL Internet Connection
- Connect to a VPN
Command Line Network Utilities
- Command Line Network Utilities
- Use ping and pathping
- Use ipconfig Command
- Use ip Command (Linux)
- Use tracert and traceroute
- Use nslookup
- Use dig (Linux)
- Other Network Command Line Utilities
- Use the Linux ip Command
- Explore Configuration Information
Network Troubleshooting
- Network Troubleshooting
- Troubleshoot Network Connectivity
- Fix a Network Connection
Ch 12: Mobile Devices
Laptops
- Laptops
- External Laptop Ports and Functions
- Laptop Special Keys
- Change a Laptop Hard Drive
- Install Laptop Memory
- Install a Laptop Keyboard
- Replace Internal Laptop Components
Mobile Device Displays and Components
- Display Components
- Replace LCD Components
Laptop Power Management
- Portable Power
- Batteries
- Configure Power Options
- Edit Power Options
- Create a Power Plan
Mobile Devices
- Mobile Device Overview
- Mobile Device Connection Methods
- Mobile Device Accessories
Mobile Device Network Connectivity
- Wireless and Cellular Data Connections
- Networking Mobile Devices
- MDM and Synchronization
- Synchronize Mobile Devices
- Configure MDM Solution
- Configure Email on Mobile Devices
- Manage Mobile Devices
Mobile Device Security
- Mobile Device Security
- Secure Mobile Devices
- Configure iPad Access Control and Authentication
Laptop and Mobile Device Troubleshooting
- Common Laptop Issues
- Laptop Maintenance
- Battery Recalibration
- Laptop Troubleshooting
- Mobile Device Troubleshooting
- Maintain Mobile Devices
Ch 13: Printing
Printer Overview
- Printing Overview
- Install a Local Printer
- Select and Install a Printer
- Configure Printer Properties
- Manage Print Jobs
- Add a Printer
- Manage Printing
Print Connectivity
- Printer Connectivity Methods
- Share a Printer
- Configure a Wireless Network Printer
- Network Scanning Methods
- Configure Network Printing
Printer Types and Components
- Laser Printers
- Inkjet Printers
- Thermal Printers
- Impact Printers
- 3D Printers
Printer Troubleshooting
- Printer Troubleshooting
Ch 14: Security
Security Best Practices
- Best Practices for Securing Workstations
- Best Practices for Account Management
Incident Response and Regulated Data
- Incident Response
- Regulated Data
Physical Security
- Building Physical Access Measures
- Use a Biometric Scanner
Logical Security Measures
- Logical Security Measures
- Configure a Screen Saver Password
- Require a Screen Saver Password
- Elevate Privileges on Linux
- Configure Password Policies on Window
- Enforce Password Settings
- Manage Linux Passwords
- Manage Authentication on Windows
- Use Windows Certificate Manager
Social Engineering Attacks
- Social Engineering
- Threats
- Vulnerabilities
Data Destruction and Disposal
- Data Disposal and Destruction
- Wipe a Disk
- Configure Remote Wipe
Malware Protection
- Malware
- Implement Malware Protection on Windows
- Configure Microsoft Defender Antivirus
- Implement Malware Protection on Linux
- Implement Malware Protection on macOS
- Malware Removal Best Practice
Firewalls
- Firewalls
- Configure Windows Firewall
- Configure Microsoft Defender Firewall
- Network Appliances
Proxy Servers
- Proxy Settings
- Configure Proxy Settings
- Use a Proxy Server
Install, Configure, and Secure Browsers
- Browsers
- Install Browser and Extensions
- Browser Settings
- Configure Browser Settings
Security Troubleshooting
- Troubleshoot PC Security Issues
- Troubleshoot Mobile OS Security Issues
Ch 15: Capstone Exercises
Build a Computer From Scratch
Troubleshoot a Malfunctioning Computer
Troubleshoot System Startup
Create a Home Office Network
Configure the Windows Operating System
Troubleshoot a Mobile Device
Configure Linux
Lab Sandbox