Skip links

CompTIA IT Fundamentals+ (ITF+) FC0-U61

Certification

CompTIA IT Fundamentals+ (ITF+) FC0-U61

This CompTIA ITF+ course will prepare you to take the CompTIA ITF+ FC0-U61 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to prepare you for vendor-specific technical support qualifications and act as groundwork for more advanced training. This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.

Hours

45

Access Length

12 Months

Delivery

Mentor Supported

Share

$629.00

Course Overview

CompTIA IT Fundamentals Logo

This CompTIA ITF+ course will prepare you to take the CompTIA ITF+ FC0-U61 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to prepare you for vendor-specific technical support qualifications and act as groundwork for more advanced training.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

This course prepares students to take the CompTIA IT Fundamentals+ (ITF+) FC0-U61 certification exam.

Course Outline:

Lesson 1: Common Computing Devices

Lesson One is designed to illustrate and describe the basics of how a computer processes data, as well as the functions and capabilities of types of computing devices, such as PCs, servers, mobiles, and home automation.

Lesson 2: Using a Workstation

Lesson Two will demonstrate the best practices on how to set up a computer system with regard for safety and healthy working practices. This requires the ability to navigate an OS and use input devices effectively.

Lesson 3: Using an OS

Lesson Three delves deeply into how to effectively use an operating system. You will be able to distinguish between different types of operating systems designed for workstations, servers, mobiles, embedded systems, and virtualization. Operating systems (OS’s) may be either commonly used commercial and open source operating systems, such as Windows, macOS, iOS, Linux, Chrome, and Android. Additionally the ability to use a browser to view websites will be covered.

Lesson 4: Managing an OS

In order to administer a computer, you will need to be proficient in the use of both GUI and command-line management interfaces to configure an operating system. Additionally, you will learn the importance of access control features and configure user accounts.

Lesson 5: Troubleshooting and Support

As problems do occasionally arise, it is important to follow a standard methodology to resolve using  basic support and troubleshooting procedures. It is important to utilize websites and tools to obtain support and search for advice and help.

Lesson 6: Using Data Types and Units

Computers are mathematical processors utilizing various different notational systems, data types, and units of measure. Knowing and using the data allows a company to make effective business decisions

Lesson 7: Using Apps

Applications allow a computer to process both simple and complex tasks. The this Lesson, you will focus on how to install and uninstall software applications and configure compatibility settings. Prior to install, support personnel need to know the importance of software licensing and the types of license available, as well as the key features of different types of application and associated file formats.

Lesson 8: Programming and App Development

Lesson 8 focuses on programming organizational techniques and logic, different types of programming languages and the advantages and disadvantages of each type. Students in this lesson will also describe some of the main features of application code and Object-Oriented Programming, and how an application can be deployed.

Lesson 9: Using Databases

Databases allow data to be stored in a structure format, allowing for ease of entry and retrieval. In this Lesson, students will be able to describe databases and explain the purpose of a database, list the relational methods used by structured databases, and to list the ways that users and applications can interface with databases.

Lesson 10: System Components

Lesson 10 focuses on the core hardware components of a computer. Students will explain the way in which system components determine performance and how to specify an appropriate computer system. The types and functions of motherboards, processors, memory, and the expansion bus, as well as explain the importance of a cooling system and the components used, in addition to the role of PC firmware and access the firmware setup program.

Lesson 11: Using Device Interfaces

Connectors allow peripheral devices to be attached externally to a computer. The lesson focuses on distinguishing peripheral, graphics, and networking interfaces and their uses.

Lesson 12: Using Peripheral Devices

Peripherals allow Plug-and-Play to install devices and understand the use of device drivers such as  multimedia devices, such as sound cards, speakers, microphones, and webcams. The Lesson also covers the features and capabilities of different types of printers and scanners and their associated interfaces.

Lesson 13: Using Storage Devices

Storage can be either volatile and non-volatile storage types, such as hard Disk Drives, Solid State Drives, optical drives, and flash memory.

Lesson 14: Using File Systems

Lesson 14 describes the properties of file systems and an appropriate file system for a given OS and usage.

Lesson 15: Networking Concepts

Lesson 15 covers the components and functions of computer networks, including the protocols and technologies used for addressing on computer networks.

Lesson 16: Connecting to a Network

Lesson 16 covers the roles of different network devices in providing local and Internet network connectivity and how to connect a computer to a wired or wireless network.

Lesson 17: Secure Web Browsing

Browsing the Internet needs to be as secure as possible. This module covers the risks of using open Internet access methods, and how to utilize safe browsing practices and configure browser security/privacy features as well as the purpose of a firewall.

Lesson 18: Using Shared Storage

In addition to storing OS files, long-term storage allows ways to share files and storage on a local network as well as a means of sharing files and services on the Internet. Additionally, the importance of backups and configure simple backup options is stressed.

Lesson 19: Using Mobile Devices

This module will focus on how to Identify the key features of different types of mobile devices and mobile operating systems, as well as how to configure network, email, and data transfer settings on mobile devices.

Lesson 20: Security Concerns

Computer security concepts allows you to distinguish threats to the confidentiality, integrity, and availability of information processing systems. This is done via the ability to identify social engineering techniques as well as the importance of business continuity and how to make systems fault tolerant via disaster recovery plans.

Lesson 21: Using Best Practices

Best Practices covers the basic principles for hardening computer systems against attack, by identifying different types of malware and how to use anti-malware software. Since spam and phishing threats are the primary attack vector for malware, the importance of installing software patches and updates from secure sources is covered.

Lesson 22: Using Access Controls

Access controls ensure that only authorized users have access to systems and resources. Students will need to distinguish between identification, authentication, authorization, and accounting in access control systems, as well as different authentication factors and understand their use in providing strong authentication, by best practices when choosing passwords.

Lesson 23: Behavioral Security Concepts

Students will focus on the basic principles for handling confidential information and list some privacy and usage issues for corporate systems and Internet/social media sites.

All necessary course materials are included.

Certification(s):

This course prepares students to take the CompTIA IT Fundamentals+ (ITF+) FC0-U61 certification exam.

System Requirements.

View the general hardware, internet, and software needs you'll want to have covered before enrolling

Get Trained. Get Hired.

This program includes unparalleled training, career support, and coaching. It’s a faster, cheaper alternative to traditional schooling.

Begin your training right now.

Complete your training on your own terms.

Prepare to take certification exams.

Program Support

Focus and target your audience through the right channels.

Career Resources

Focus and target your audience through the right channels.

Payment Plans

Focus and target your audience through the right channels.

MyCAA Grants

Focus and target your audience through the right channels.