36 Hours Synchronous Learning
Recommended Prerequisites: High School Graduate or GED holder.
Course Certification Exam:
This course prepares students to take the CompTIA IT Fundamentals+ (ITF+) FC0-U61 certification exam.
Lesson 1: Common Computing Devices
Lesson One is designed to illustrate and describe the basics of how a computer processes data, as well as the functions and capabilities of types of computing devices, such as PCs, servers, mobiles, and home automation.
Lesson 2: Using a Workstation
Lesson Two will demonstrate the best practices on how to set up a computer system with regard for safety and healthy working practices. This requires the ability to navigate an OS and use input devices effectively.
Lesson 3: Using an OS
Lesson Three delves deeply into how to effectively use an operating system. You will be able to distinguish between different types of operating systems designed for workstations, servers, mobiles, embedded systems, and virtualization. Operating systems (OS’s) may be either commonly used commercial and open source operating systems, such as Windows, macOS, iOS, Linux, Chrome, and Android. Additionally the ability to use a browser to view websites will be covered.
Lesson 4: Managing an OS
In order to administer a computer, you will need to be proficient in the use of both GUI and command-line management interfaces to configure an operating system. Additionally, you will learn the importance of access control features and configure user accounts.
Lesson 5: Troubleshooting and Support
As problems do occasionally arise, it is important to follow a standard methodology to resolve using basic support and troubleshooting procedures. It is important to utilize websites and tools to obtain support and search for advice and help.
Lesson 6: Using Data Types and Units
Computers are mathematical processors utilizing various different notational systems, data types, and units of measure. Knowing and using the data allows a company to make effective business decisions
Lesson 7: Using Apps
Applications allow a computer to process both simple and complex tasks. The this Lesson, you will focus on how to install and uninstall software applications and configure compatibility settings. Prior to install, support personnel need to know the importance of software licensing and the types of license available, as well as the key features of different types of application and associated file formats.
Lesson 8: Programming and App Development
Lesson 8 focuses on programming organizational techniques and logic, different types of programming languages and the advantages and disadvantages of each type. Students in this lesson will also describe some of the main features of application code and Object-Oriented Programming, and how an application can be deployed.
Lesson 9: Using Databases
Databases allow data to be stored in a structure format, allowing for ease of entry and retrieval. In this Lesson, students will be able to describe databases and explain the purpose of a database, list the relational methods used by structured databases, and to list the ways that users and applications can interface with databases.
Lesson 10: System Components
Lesson 10 focuses on the core hardware components of a computer. Students will explain the way in which system components determine performance and how to specify an appropriate computer system. The types and functions of motherboards, processors, memory, and the expansion bus, as well as explain the importance of a cooling system and the components used, in addition to the role of PC firmware and access the firmware setup program.
Lesson 11: Using Device Interfaces
Connectors allow peripheral devices to be attached externally to a computer. The lesson focuses on distinguishing peripheral, graphics, and networking interfaces and their uses.
Lesson 12: Using Peripheral Devices
Peripherals allow Plug-and-Play to install devices and understand the use of device drivers such as multimedia devices, such as sound cards, speakers, microphones, and webcams. The Lesson also covers the features and capabilities of different types of printers and scanners and their associated interfaces.
Lesson 13: Using Storage Devices
Storage can be either volatile and non-volatile storage types, such as hard Disk Drives, Solid State Drives, optical drives, and flash memory.
Lesson 14: Using File Systems
Lesson 14 describes the properties of file systems and an appropriate file system for a given OS and usage.
Lesson 15: Networking Concepts
Lesson 15 covers the components and functions of computer networks, including the protocols and technologies used for addressing on computer networks.
Lesson 16: Connecting to a Network
Lesson 16 covers the roles of different network devices in providing local and Internet network connectivity and how to connect a computer to a wired or wireless network.
Lesson 17: Secure Web Browsing
Browsing the Internet needs to be as secure as possible. This module covers the risks of using open Internet access methods, and how to utilize safe browsing practices and configure browser security/privacy features as well as the purpose of a firewall.
Lesson 18: Using Shared Storage
In addition to storing OS files, long-term storage allows ways to share files and storage on a local network as well as a means of sharing files and services on the Internet. Additionally, the importance of backups and configure simple backup options is stressed.
Lesson 19: Using Mobile Devices
This module will focus on how to Identify the key features of different types of mobile devices and mobile operating systems, as well as how to configure network, email, and data transfer settings on mobile devices.
Lesson 20: Security Concerns
Computer security concepts allows you to distinguish threats to the confidentiality, integrity, and availability of information processing systems. This is done via the ability to identify social engineering techniques as well as the importance of business continuity and how to make systems fault tolerant via disaster recovery plans.
Lesson 21: Using Best Practices
Best Practices covers the basic principles for hardening computer systems against attack, by identifying different types of malware and how to use anti-malware software. Since spam and phishing threats are the primary attack vector for malware, the importance of installing software patches and updates from secure sources is covered.
Lesson 22: Using Access Controls
Access controls ensure that only authorized users have access to systems and resources. Students will need to distinguish between identification, authentication, authorization, and accounting in access control systems, as well as different authentication factors and understand their use in providing strong authentication, by best practices when choosing passwords.
Lesson 23: Behavioral Security Concepts
Students will focus on the basic principles for handling confidential information and list some privacy and usage issues for corporate systems and Internet/social media sites.
- Self-Directed Study
- Skills Demonstration
- Online Activities
Methods of Evaluation:
- Quizzes & Exams
- Skills Demonstration
- Learner-Centered Activities
Student must pass all quizzes, exams, and national exam (if applicable) at a passing rate to be eligible for a Certificate of Training Completion. If an internship is included in your course you will be required to complete the internship prior to receiving a Certificate of Training Completion.
Students are expected to arrive on time and participate in course discussions. Successful completion of the course of study recommends 100% attendance. If during the course period the student’s attendance level drops below 80%, they will be encouraged and given the opportunity to attend the next scheduled class for the course they enrolled in. Should materials change, student is responsible for all additional cost.
Payment Plan Policy:
Students may withdraw from the program for any reason up to 1 week prior to the start of program. In this case, the student’s payment plan agreement shall be rescinded. If the payment plan has begun a non-refundable administrative fee of $25.00 will be assessed and remaining funds will be returned to payer in check form by mail.
There can be no refund for the course, once the first class has been concluded; or if any course material, including the eBook, is accessed. If extenuating circumstances exist, case by case situations will be reviewed by ProTrain. If a refund is issued, the refunded amount (- a $25 processing fee) will be dependent upon books being returned in excellent condition (i.e. no writing, missing pages; ripped or damage to pages and/or binding).
Any student who has dropped out of the program, or has been suspended from the program for nonattendance may be readmitted within one year by completing a personal interview with the director of education and paying any applicable fees at the time of readmission. Students who were terminated due to conduct issues are not eligible to be readmitted.
Policy on Student Conduct:
Appropriate Conduct: All students are expected to conduct themselves in an orderly and professional manner. Any student not conducting themselves in an orderly and professional manner, which includes use of drugs and alcohol during school hours, dishonesty, disrupting classes, use of profanity, excessive tardiness, insubordination, violation of safety rules, improper usage of lab or classroom computers, or not abiding by the school rules will lead to either probation or dismissal from classes.