Course Overview

Ch 1: Course Introduction

Chapter 1 introduces the TestOut PC Pro course. It introduces computer basics and how to interact with our simulated lab environment. It also introduces the TestOut PC Pro and CompTIA A+ certifications.

Ch 2: PC Technician Responsibilities

Chapter 2 covers core principles that enable students to navigate the essential tasks in entry level IT positions. It introduces the importance of documentation, the need for both asset and change management, as well as the fundamentals of professionalism. Students will learn how to use ticketing systems to create, resolve, and close tickets. Additionally, students will learn foundational skills for how to work with technology including protection and safety, environmental controls, PC maintenance, PC and networking tools, and the troubleshooting process.

Ch 3: Hardware

Chapter 3 addresses the essential hardware components that make computer systems operational. Students will get hands-on experience with the installation, configuration, and troubleshooting of these various devices. Covering the motherboard, memory, processor, power supply, video, audio, and even the BIOS/UEFI, students will be able to assemble and troubleshoot a computer and its various components.  

Ch 4: Operating System Basics

Chapter 4 introduces the major desktop-class operating systems and the various features that differentiate them. Students will learn about the various Windows editions they may encounter, exploring the interface and features of each. Linux and macOS are also similarly explored.

Ch 5: Storage

Chapter 5 expounds on the various media storage types and storage configuration considerations. RAID levels are discussed along with the benefits and downsides of each. Students will learn about various file systems and formatting options for drives. They will also learn to format drives as well as create and convert volumes. Students will learn partitioning, extending volumes, and implementing storage spaces. Disk optimization is discussed across the various operating systems as well as troubleshooting the hardware and software configurations for storage devices.

Ch 6: System Implementation

Chapter 6 teaches students how to install and implement Windows systems. They’ll explore pre-installation planning, the installation process itself, and post-installation optimization. Additionally, cloud computing and virtualization will be addressed. Students will learn about hypervisors, such as Hyper-V and VMWare, and will learn how to create virtual machines and virtual hard drives.  

Ch 7: System Management 1

Chapter 7 focuses on how to manage operating systems and usage. Students learn to use Windows system tools that allow them to configure, manage, and troubleshoot Windows systems. This includes tools such as control panel, task manager, Regedit, event viewer, and system commands. Students will get practice managing and troubleshooting applications on Windows and Linux systems. Digital rights management and virtual memory management are also explored. Scripting is outlined and students learn various scripting types as well as uses.  

Ch 8: System Management 2

Chapter 8 continues to explore managing systems, through more advanced configurations and features. Active Directory, and users and groups teach students about organizational structuring and explore authentication. Students will learn how to use and configure remote desktop and remote assistance. They will practice setting up a VPN connection and configuring updates across various operating systems. As a part of system management, they will learn how to create, manage, and restore data from system backups. Windows boot errors will be addressed, and students will learn to configure the boot order and utilize advanced options to troubleshoot and configure startup issues.

Ch 9: File Management

Chapter 9 focuses on file management for both Windows and Linux systems. Learn to manage files from the command prompt or command line, including ownership, permissions, contents, or file location. NTFS and share permissions are used to configure folder sharing and security. Students will also learn about file encryption and how to use BitLocker.

Ch 10: Peripheral Devices

Chapter 10 explores the most common peripheral devices and how to manage them. Students learn how to configure external display settings. They will also focus on installing and managing device drivers, all across various operating systems. Troubleshooting focuses on common issues with devices and their drivers.

Ch 11: Networking

Chapter 11 takes students through a comprehensive introduction to networking. Students will learn about various network devices and their respective use cases. Introducing concepts such as TCP/IP protocols, SOHO configurations, and wireless security, students will start with basic networking concepts. Through this chapter, they will progress to network infrastructure, encryption and authentication, and command line utilities that will allow them to troubleshoot complex network issues.

Ch 12: Mobile Devices

Chapter 12 explores portable computing devices such as phones, tablets, and laptops. With a heavy focus on laptops, unique considerations for mobile devices, hardware repair or upgrades, and mobile device security are all essential topics in modern computing environments. This chapter helps students understand how to configure and manage mobile devices to mitigate the additional risks they can present. As connectivity becomes more prevalent, it is essential for students to learn how to manage and synchronize devices as covered here.

Ch 13: Printing

Chapter 13 covers the various nuances of printing, from connectivity to printer types. It walks though the most common types of printers including inkjet, thermal, laser, and 3D printers. Troubleshooting helps to identify the most common types of issues with printing, from physical issues in the print process to the software that manages print jobs.

Ch 14: Security

Chapter 14 covers an essential topic in our modern computing environment, security. Best practices are established to set the baseline for how to manage security concerns. Regulated data and data disposal are discussed to prepare students for the current cybersecurity climate. Social engineering and malware protections are explored to help prevent against a common attack vector. Software and hardware solutions are also featured to prevent as much danger as possible upstream from your users. Proxy servers, firewalls, browser security, and physical and logical security all play a large part in this chapter with the design of preventing security concerns as much as possible.  

Ch 15: Capstone Exercises

Chapter 15 gives students the chance to put their knowledge into practice with cumulative activities that incorporate tasks taught throughout the course. Students will be able to take on these comprehensive exercises to show their mastery of skills and identify any areas that need additional support.

Ch 2: PC Technician Responsibilities

Protection and Safety

  • Safety
  • Safety Measures
  • Electrostatic Discharge
  • ESD Protection

Environmental Controls

  • Environmental Concerns
  • Power Concerns
  • Configure UPS Settings
  • Install a UPS


  • Professionalism

Change Management

  • Change Management Overview

PC Maintenance

  • PC Maintenance Best Practices

PC and Networking Tools

  • PC and Networking Tools

Troubleshooting Process Overview

  • Troubleshooting Process

Support Systems

  • Ticketing Systems
  • Create and Close Tickets
  • Ticketing System Settings
  • Create a Ticket
  • Close a Ticket
  • Asset Management
  • Explore Asset Tracking Systems
  • View Warranty Information


  • Documentation Types
  • Onboarding and Offboarding Checklists

Ch 3: Hardware

Network Media

  • Network Cables
  • Coaxial Cable  
  • Twisted Pair Cable  
  • Twisted Pair Connector  
  • Fiber Optic Cable  

Cables and Connectors

  • External Connectors
  • Universal Serial Bus
  • Install USB Devices
  • Peripheral and Video Cables
  • Hard Drive Cables
  • Adapter and Converter

Cases and Motherboards

  • Cases and Form Factors
  • Motherboard Components
  • Choose and Install a Motherboard

Motherboard Troubleshooting

  • Motherboard Troubleshooting
  • Troubleshoot System Power
  • Troubleshoot Power Supply Problems


  • DRAM Types
  • Random Access Memory (RAM)
  • Multi-Channel Memory Architecture

Memory Installation

  • Memory Characteristics
  • Select Memory by Sight
  • Select the Correct Memory Module
  • Install Memory
  • Install Triple Channel Memory

Memory Troubleshooting

  • Memory Troubleshooting
  • Test Memory
  • Troubleshoot Memory


  • PC Boot Process
  • Edit BIOS/UEFI Settings
  • Use Built-in System Diagnostics
  • Flash the BIOS
  • Find BIOS/UEFI Settings
  • BIOS/UEFI Security
  • Configure BIOS/UEFI Security Settings
  • Configure BIOS/UEFI Security


  • Processor Concepts
  • CPU
  • CPU Performance
  • CPU Socket
  • Install a Processor
  • Select and Install a Processor

Processor Troubleshooting

  • Processor Troubleshooting
  • Troubleshoot Processor Installation

Video and Expansion Cards

  • Expansion Buses and Slots
  • Expansion Bus Types
  • Install an Expansion Card
  • Install Expansion Cards
  • Video Cards
  • Video and Capture Card Facts
  • Install a Video Card
  • Configure Capture Card  
  • Upgrade a Video Card


  • Digital Audio
  • Sound Cards
  • Manage Audio Devices
  • Sound Card Connectors
  • Select and Install a Sound Card


  • System Cooling

Power Supplies

  • Power Supplies
  • Identify Power Supply Components
  • Change the Power Supply
  • Install a Power Supply

Ch 4: Operating Systems Basics

Operating System

  • Workstation Operating Systems

Windows Basics

  • Windows Operating Systems
  • Windows 10 Editions
  • Windows 11 Editions
  • Windows Features
  • Use the Windows 10 Interface
  • Use the Windows 11 Interface  
  • Windows Upgrade

Linux Basics

  • Linux Operating Systems
  • Navigate Linux in the GUI

macOS Basics

  • macOS Introduction
  • Installing and Uninstalling Apps
  • macOS Interface System Preferences
  • macOS Features and Settings

Ch 5: Storage

Storage Devices

  • Storage Devices


  • SATA
  • Install a SATA Device
  • Install SATA Devices

Optical Media

  • CD Drives
  • DVD Drives
  • Blu-ray


  • RAID
  • Configure a RAID Array
  • Create RAID Arrays
  • Implement a RAID Solution

File Systems

  • Partitions, Volumes, and File Systems
  • View File System Components
  • MBR Partitioning
  • GPT Partitioning
  • Create Volumes with Disk Management
  • Create Volumes with Diskpart
  • Convert Volumes
  • Create Volumes
  • Format Drives
  • Disk Status

Storage Management

  • Add Storage
  • Create Mount Points and Extending Volumes
  • Shrink and Split Partitions  
  • Add Space to Existing Volumes

Storage Spaces

  • Storage Spaces
  • Create Storage Spaces
  • Implement Storage Spaces

Disk Optimization

  • Storage Optimization
  • Optimize Disks in Windows
  • Optimize Disks in Linux
  • Optimize Disks in macOS
  • Perform Disk Maintenance

Storage and RAID Troubleshooting

  • Storage and RAID Troubleshooting
  • SSD Storage Issues
  • SSD Maintenance
  • Troubleshoot SATA Devices

Ch 6: System Implementation

Windows Pre-Installation

  • Pre-Installation Planning
  • Verify System Compatibility

Windows Installation

  • Prepare Disks for Installation
  • Create Bootable Media
  • Configure Workstation for Network Boot
  • Install a Workstation Image Using PXE
  • Install Windows
  • Post-Installation

Cloud Computing

  • Cloud Computing Overview


  • Virtualization Overview
  • Use VMWare Player
  • Use Hyper-V
  • Create Virtual Machines
  • Create Virtual Hard Disks

Ch 7: System Management 1

Windows System Tools

  • Use Task Manager
  • Use Control Panel
  • Use Management Consoles
  • View System Information
  • System Configuration
  • Use Regedit
  • Use Event Viewer
  • Explore System Commands
  • Use System Commands

Windows Settings

  • Personalize Windows
  • Configure Region and Language Options
  • Index Files

Performance Monitoring

  • Performance Monitoring
  • Monitor System Performance

Windows Application Management

  • Windows Application Installation
  • Manage Windows Applications
  • Configure Application Compatibility
  • Schedule Tasks
  • Manage Microsoft Store Apps
  • Manage Applications
  • Repair Programs

Linux Application Management

  • Install Linux Software
  • Manage Apps on Linux
  • Manage Processes on Linux
  • Linux Application Management

Digital Content Management

  • Software Licensing
  • Digital Rights Management (DRM)
  • Digital Content Management

Virtual Memory

  • Windows Virtual Memory
  • Manage Virtual Ram
  • Configure Virtual Memory

Windows and Application Troubleshooting

  • Troubleshooting Windows
  • Troubleshoot Windows Applications
  • Troubleshoot Windows Services

Scripting Basics

  • Scripting
  • Scripting Types
  • Scripting Uses

Ch 8: System Management 2

Active Directory

  • Workgroup vs. Domain Setup
  • Active Directory Overview
  • Join a Domain
  • Join a Workstation to a Domain
  • Manage Active Directory Objects
  • Create User Accounts
  • Create OUs
  • Delete OUs
  • Group Policy
  • Use Group Policy

Users and Groups

  • Users and Groups
  • Login Options
  • Manage Local Users and Groups  
  • Authenticate with Online User Accounts
  • Manage Users and Groups
  • Manage UAC Settings

Remote Services

  • Remote Access Technologies
  • Remote Desktop
  • Use Remote Desktop  
  • Remote Assistance
  • Use Remote Assistance
  • Configure Remote Services
  • Screen Sharing
  • Use Video Conferencing Software


  • Virtual Private Networks (VPN)
  • Set Up a VPN Connection
  • Configure a VPN Connection


  • Use Windows Update
  • Configure Windows Update
  • Update Linux
  • Update macOS

System Backup

  • System Backup
  • Create Backups in Windows
  • Create Backups in Linux
  • Restore Data on Linux
  • Use Time Machine on macOS
  • Restore Data on macOS
  • Back Up the Computer
  • Configure File History
  • Restore Data from File History

System Recovery

  • Windows System Recovery
  • Use Restore Points
  • Create a Restore Point
  • Use Windows System Recovery Tools
  • Boot into the Windows Recovery Environment
  • Use File Recovery Tools

Windows Boot Errors

  • Windows Boot Process
  • Modify the Boot Order
  • Configure the Boot Order
  • Use Advanced Boot Options
  • Windows Boot Options
  • Use the bootrec Command
  • Startup Error
  • Troubleshoot System Startup

Ch 9: File Management

Manage Files on Windows

  • Windows File and Folder Properties
  • System File Locations
  • Manage Files on Windows
  • Manage Files
  • Manage Directories from the Command Prompt
  • Manage Files from the Command Prompt
  • File Management Commands
  • Manage Files and Folders

NTFS and Share Permissions

  • NTFS and Share Permissions
  • Configure Basic Folder Sharing on Windows
  • Configure Advanced Folder Sharing on Windows
  • Configure Share and NTFS Permissions
  • Configure NTFS Permissions
  • Share and Secure Folders
  • Configure NTFS Permissions

File Encryption

  • File Encryption
  • BitLocker

Linux File Management

  • Use Linux Shell Commands
  • Use Shell Commands
  • Manage the Linux File System
  • View File Contents
  • Edit File Contents
  • Manage Ownership and Permissions
  • Manage the Linux File System
  • Manage Linux File Ownership

Ch 10: Peripheral Devices

Peripheral Devices

  • Peripheral Devices

Display Devices

  • Configure Display Settings in Windows
  • Configure Advanced Display Settings in Windows
  • Select and Configure Dual Monitors
  • Configure Display Settings in Linux
  • Configure Display Settings in macOS

Display, Video, and Projector Troubleshooting

  • Video Troubleshooting
  • Projector Troubleshooting

Device Driver Management

  • Device Installation
  • Install and Manage Device Drivers on Windows
  • Manage Devices on Linux
  • Manage Devices on macOS
  • Manage Devices

Device Driver Troubleshooting

  • Device Driver Troubleshooting
  • Troubleshoot Devices
  • Work with Legacy Devices and Drivers
  • Manage Devices

Ch 11: Networking

Networking Overview

  • Networking Introduction
  • Network Types

Networking Ports and Protocols

  • TCP and UDP
  • Ports and Protocols

Client-Side Network Configuration

  • Device Addressing
  • IPv4 Addressing
  • IP Version 6
  • Configure TCP/IP Properties
  • Configure TCP/IP Settings on Windows 10
  • Configure TCP/IP Settings on Window 11

Services Provided by Network Devices

  • Server Roles
  • Explore Server Roles
  • Configure DHCP on a Windows Server
  • Configure DNS on a Windows Server
  • Internet Appliances
  • Internet of Things
  • Smart Devices
  • Configure Smart Devices
  • Embedded Systems (SCADA)

Wireless Networking

  • Wireless Networking
  • Install a Wireless Network Adapter
  • Wireless Security
  • Wireless Encryption and Authentication
  • Configure a Wireless Connection
  • Connect to a Wireless Network
  • Create a Home Wireless Network
  • Secure Home Wireless Network
  • Configure a Wireless Profile
  • Infrared, Bluetooth, and NFC
  • Configure Bluetooth Connections

SOHO Configuration

  • SOHO Configuration
  • Configure a SOHO Router
  • Configure a Wireless Router
  • Perform a Firmware Update
  • Update Firmware

Networking Hardware

  • Network Infrastructure
  • Explore Network Switch Settings
  • Internet Connection Types
  • Select and Install a Network Adapter
  • Configure a Wireless Infrastructure
  • Configure a DSL Internet Connection
  • Connect to a VPN

Command Line Network Utilities

  • Command Line Network Utilities
  • Use ping and pathping
  • Use ipconfig Command
  • Use ip Command (Linux)
  • Use tracert and traceroute
  • Use nslookup
  • Use dig (Linux)
  • Other Network Command Line Utilities
  • Use the Linux ip Command
  • Explore Configuration Information

Network Troubleshooting

  • Network Troubleshooting
  • Troubleshoot Network Connectivity
  • Fix a Network Connection  

Ch 12: Mobile Devices


  • Laptops
  • External Laptop Ports and Functions
  • Laptop Special Keys
  • Change a Laptop Hard Drive
  • Install Laptop Memory
  • Install a Laptop Keyboard  
  • Replace Internal Laptop Components  

Mobile Device Displays and Components

  • Display Components
  • Replace LCD Components

Laptop Power Management

  • Portable Power
  • Batteries
  • Configure Power Options
  • Edit Power Options
  • Create a Power Plan

Mobile Devices

  • Mobile Device Overview
  • Mobile Device Connection Methods
  • Mobile Device Accessories

Mobile Device Network Connectivity

  • Wireless and Cellular Data Connections
  • Networking Mobile Devices
  • MDM and Synchronization
  • Synchronize Mobile Devices
  • Configure MDM Solution
  • Configure Email on Mobile Devices
  • Manage Mobile Devices

Mobile Device Security

  • Mobile Device Security
  • Secure Mobile Devices
  • Configure iPad Access Control and Authentication

Laptop and Mobile Device Troubleshooting

  • Common Laptop Issues
  • Laptop Maintenance
  • Battery Recalibration  
  • Laptop Troubleshooting  
  • Mobile Device Troubleshooting
  • Maintain Mobile Devices  

Ch 13: Printing

Printer Overview

  • Printing Overview
  • Install a Local Printer
  • Select and Install a Printer
  • Configure Printer Properties
  • Manage Print Jobs
  • Add a Printer
  • Manage Printing

Print Connectivity

  • Printer Connectivity Methods
  • Share a Printer
  • Configure a Wireless Network Printer
  • Network Scanning Methods
  • Configure Network Printing

Printer Types and Components

  • Laser Printers
  • Inkjet Printers  
  • Thermal Printers  
  • Impact Printers
  • 3D Printers

Printer Troubleshooting

  • Printer Troubleshooting

Ch 14: Security

Security Best Practices

  • Best Practices for Securing Workstations
  • Best Practices for Account Management

Incident Response and Regulated Data

  • Incident Response
  • Regulated Data

Physical Security

  • Building Physical Access Measures
  • Use a Biometric Scanner

Logical Security Measures

  • Logical Security Measures
  • Configure a Screen Saver Password
  • Require a Screen Saver Password
  • Elevate Privileges on Linux
  • Configure Password Policies on Window
  • Enforce Password Settings
  • Manage Linux Passwords
  • Manage Authentication on Windows
  • Use Windows Certificate Manager

Social Engineering Attacks

  • Social Engineering
  • Threats
  • Vulnerabilities

Data Destruction and Disposal

  • Data Disposal and Destruction
  • Wipe a Disk
  • Configure Remote Wipe

Malware Protection

  • Malware
  • Implement Malware Protection on Windows
  • Configure Microsoft Defender Antivirus
  • Implement Malware Protection on Linux
  • Implement Malware Protection on macOS
  • Malware Removal Best Practice


  • Firewalls
  • Configure Windows Firewall
  • Configure Microsoft Defender Firewall
  • Network Appliances

Proxy Servers

  • Proxy Settings
  • Configure Proxy Settings
  • Use a Proxy Server

Install, Configure, and Secure Browsers

  • Browsers
  • Install Browser and Extensions
  • Browser Settings
  • Configure Browser Settings

Security Troubleshooting

  • Troubleshoot PC Security Issues
  • Troubleshoot Mobile OS Security Issues

Ch 15: Capstone Exercises

Build a Computer From Scratch

Troubleshoot a Malfunctioning Computer

Troubleshoot System Startup

Create a Home Office Network

Configure the Windows Operating System

Troubleshoot a Mobile Device

Configure Linux

Lab Sandbox