Skip links

CompTIA IT Fundamentals+ (ITF+) FC0-U61 – Live Online

Certification

CompTIA IT Fundamentals+ (ITF+) FC0-U61 – Live Online

This CompTIA ITF+ course will prepare you to take the CompTIA ITF+ FC0-U61 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to prepare you for vendor-specific technical support qualifications and act as groundwork for more advanced training. This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.

Hours

36

Access Length

Length Varies

Delivery

Instructor Led

Share

Course Overview

Course Offerings

Sessions:

Mondays & Wednesdays

February 6 – March 15, 2023
 
Tuesdays & Thursdays

May 9 – June 15, 2023
 
Mondays & Wednesdays

August 21 – October 4, 2023
 

Time:
7 pm – 10 pm ET
6 pm – 9 pm CT
4 pm – 7 pm PT

Tuition Includes:
Book(s)
Materials

Enrollment requests submitted later than one week prior to a course launch date are subject to approval. Advertised dates do not reflect available slots in a cohort.

36 Hours Synchronous Learning

Recommended Prerequisites:  High School Graduate or GED holder.

Course Certification Exam:

This course prepares students to take the CompTIA IT Fundamentals+ (ITF+) FC0-U61 certification exam.

Course Outline:

Lesson 1: Common Computing Devices

Lesson One is designed to illustrate and describe the basics of how a computer processes data, as well as the functions and capabilities of types of computing devices, such as PCs, servers, mobiles, and home automation.

Lesson 2: Using a Workstation

Lesson Two will demonstrate the best practices on how to set up a computer system with regard for safety and healthy working practices. This requires the ability to navigate an OS and use input devices effectively.

Lesson 3: Using an OS

Lesson Three delves deeply into how to effectively use an operating system. You will be able to distinguish between different types of operating systems designed for workstations, servers, mobiles, embedded systems, and virtualization. Operating systems (OS’s) may be either commonly used commercial and open source operating systems, such as Windows, macOS, iOS, Linux, Chrome, and Android. Additionally the ability to use a browser to view websites will be covered.

Lesson 4: Managing an OS

In order to administer a computer, you will need to be proficient in the use of both GUI and command-line management interfaces to configure an operating system. Additionally, you will learn the importance of access control features and configure user accounts.

Lesson 5: Troubleshooting and Support

As problems do occasionally arise, it is important to follow a standard methodology to resolve using  basic support and troubleshooting procedures. It is important to utilize websites and tools to obtain support and search for advice and help.

Lesson 6: Using Data Types and Units

Computers are mathematical processors utilizing various different notational systems, data types, and units of measure. Knowing and using the data allows a company to make effective business decisions

Lesson 7: Using Apps

Applications allow a computer to process both simple and complex tasks. The this Lesson, you will focus on how to install and uninstall software applications and configure compatibility settings. Prior to install, support personnel need to know the importance of software licensing and the types of license available, as well as the key features of different types of application and associated file formats.

Lesson 8: Programming and App Development

Lesson 8 focuses on programming organizational techniques and logic, different types of programming languages and the advantages and disadvantages of each type. Students in this lesson will also describe some of the main features of application code and Object-Oriented Programming, and how an application can be deployed.

Lesson 9: Using Databases

Databases allow data to be stored in a structure format, allowing for ease of entry and retrieval. In this Lesson, students will be able to describe databases and explain the purpose of a database, list the relational methods used by structured databases, and to list the ways that users and applications can interface with databases.

Lesson 10: System Components

Lesson 10 focuses on the core hardware components of a computer. Students will explain the way in which system components determine performance and how to specify an appropriate computer system. The types and functions of motherboards, processors, memory, and the expansion bus, as well as explain the importance of a cooling system and the components used, in addition to the role of PC firmware and access the firmware setup program.

Lesson 11: Using Device Interfaces

Connectors allow peripheral devices to be attached externally to a computer. The lesson focuses on distinguishing peripheral, graphics, and networking interfaces and their uses.

Lesson 12: Using Peripheral Devices

Peripherals allow Plug-and-Play to install devices and understand the use of device drivers such as  multimedia devices, such as sound cards, speakers, microphones, and webcams. The Lesson also covers the features and capabilities of different types of printers and scanners and their associated interfaces.

Lesson 13: Using Storage Devices

Storage can be either volatile and non-volatile storage types, such as hard Disk Drives, Solid State Drives, optical drives, and flash memory.

Lesson 14: Using File Systems

Lesson 14 describes the properties of file systems and an appropriate file system for a given OS and usage.

Lesson 15: Networking Concepts

Lesson 15 covers the components and functions of computer networks, including the protocols and technologies used for addressing on computer networks.

Lesson 16: Connecting to a Network

Lesson 16 covers the roles of different network devices in providing local and Internet network connectivity and how to connect a computer to a wired or wireless network.

Lesson 17: Secure Web Browsing

Browsing the Internet needs to be as secure as possible. This module covers the risks of using open Internet access methods, and how to utilize safe browsing practices and configure browser security/privacy features as well as the purpose of a firewall.

Lesson 18: Using Shared Storage

In addition to storing OS files, long-term storage allows ways to share files and storage on a local network as well as a means of sharing files and services on the Internet. Additionally, the importance of backups and configure simple backup options is stressed.

Lesson 19: Using Mobile Devices

This module will focus on how to Identify the key features of different types of mobile devices and mobile operating systems, as well as how to configure network, email, and data transfer settings on mobile devices.

Lesson 20: Security Concerns

Computer security concepts allows you to distinguish threats to the confidentiality, integrity, and availability of information processing systems. This is done via the ability to identify social engineering techniques as well as the importance of business continuity and how to make systems fault tolerant via disaster recovery plans.

Lesson 21: Using Best Practices

Best Practices covers the basic principles for hardening computer systems against attack, by identifying different types of malware and how to use anti-malware software. Since spam and phishing threats are the primary attack vector for malware, the importance of installing software patches and updates from secure sources is covered.

Lesson 22: Using Access Controls

Access controls ensure that only authorized users have access to systems and resources. Students will need to distinguish between identification, authentication, authorization, and accounting in access control systems, as well as different authentication factors and understand their use in providing strong authentication, by best practices when choosing passwords.

Lesson 23: Behavioral Security Concepts

Students will focus on the basic principles for handling confidential information and list some privacy and usage issues for corporate systems and Internet/social media sites.

Instructional Strategies:

  • Lecture
  • Self-Directed Study
  • Skills Demonstration
  • Simulation
  • Online Activities

Methods of Evaluation:

  • Quizzes & Exams
  • Skills Demonstration
  • Learner-Centered Activities

Instructor Biography:

Coming soon!

Grading System:

Student must pass all quizzes, exams, and national exam (if applicable) at a passing rate to be eligible for a Certificate of  Training Completion. If an internship is included in your course you will be required to complete the internship prior to receiving a Certificate of Training Completion.

Attendance:

Students are expected to arrive on time and participate in course discussions. Successful completion of the course of study recommends 100% attendance. If during the course period the student’s attendance level drops below 80%, they will be encouraged and given the opportunity to attend the next scheduled class for the course they enrolled in. Should materials change, student is responsible for all additional cost.

Payment Plan Policy:

Students may withdraw from the program for any reason up to 1 week prior to the start of program. In this case, the student’s payment plan agreement shall be rescinded. If the payment plan has begun a non-refundable administrative fee of $25.00 will be assessed and remaining funds will be returned to payer in check form by mail. 

Refund Policy: 

There can be no refund for the course, once the first class has been concluded; or if any course material, including the eBook, is accessed. If extenuating circumstances exist, case by case situations will be reviewed by ProTrain. If a refund is issued, the refunded amount (- a $25 processing fee) will be dependent upon books being returned in excellent condition (i.e. no writing, missing pages; ripped or damage to pages and/or binding).

Re-Admission Policy:

Any student who has dropped out of the program, or has been suspended from the program for nonattendance may be readmitted within one year by completing a personal interview with the director of education and paying any applicable fees at the time of readmission. Students who were terminated due to conduct issues are not eligible to be readmitted.

Policy on Student Conduct:

Appropriate Conduct: All students are expected to conduct themselves in an orderly and professional manner. Any student not conducting themselves in an orderly and professional manner, which includes use of drugs and alcohol during school hours, dishonesty, disrupting classes, use of profanity, excessive tardiness, insubordination, violation of safety rules, improper usage of lab or classroom computers, or not abiding by the school rules will lead to either probation or dismissal from classes.

Get Trained. Get Hired.

This program includes unparalleled training, career support, and coaching. It’s a faster, cheaper alternative to traditional schooling.

Begin your training right now.

Complete your training on your own terms.

Prepare to take certification exams.

Program Support

Focus and target your audience through the right channels.

Career Resources

Focus and target your audience through the right channels.

Payment Plans

Focus and target your audience through the right channels.

MyCAA Grants

Focus and target your audience through the right channels.