Instructor Background

A+ 900 Series Updates

Module 1.1 - Configure and apply BIOS Settings

Module 1.2 - Differentiate Between Motherboards

Module 1.3 - Compare and Contrast RAM

Module 1.4 - Install and Configure Expansion Cards

Module 1.5 - Install and Configure Storage Devices

Module 1.6 - Differentiate CPU Types

Module 1.7 - Compare Connection Interfaces

Module 1.8 - Install Appropriate Power Supply

Module 1.9 - Custom Configurations

Module 1.10 - Evaluate Display Devices

Module 1.11 - Identify Connectors & Cables

Module 1.12 - Install Peripheral Devices

Module 2.1 - Network Cables and Connectors

Module 2.2 - Characteristics or Connectors / Cables

Module 2.3 - TCP/IP

Module 2.4 - Common TCP and UDP

Module 2.5 - Wireless Standards / Encryption

Module 2.6 - Install and Configure a SOHO Router

Module 2.7 - Internet Connection Types / Features

Module 2.8 - Identify Network Types

Module 2.9 - Compare Network Devices

Module 2.10 - Use Appropriate Networking Tools

Module 3.1 - Laptop Hardware and Components

Module 3.2 - Compare Laptop Display Types

Module 3.3 - Compare Laptop Features

Module 4.1 - Printer Imaging Processes

Module 4.2 - Install / Configure Printers

Module 4.3 - Printer Maintenance

Module 5.1 - Appropriate Safety Procedures

Module 5.2 - Environmental Impacts / Controls

Module 5.3 - Communication & Professionalism

Module 5.4 - Dealing with Prohibited Content

Exam Module

Module 1.1 - Windows Operating Systems

Module 1.2 - Installing & Configuring Operating Systems

Module 1.3 - Screen Capture Labs

Module 1.4 - OS Features - Administrative Tools

Module 1.5 - Control Panel

Module 1.6 - Network Connections on Client Desktop

Module 1.7 - Preventative Maintenance Tools

Module 1.8 - OS Security Settings

Module 1.9 - Virtualization

Module 2.1 - Security

Module 2.2 - Security Threats

Module 2.3 - Securing A Work Station Best Practices

Module 2.4 - Data Destruction Methods

Module 2.5 - Securing a Wireless Network

Module 2.6 - Securing Home Office Wired Network

Module 3.1 - Mobile Operating Systems

Module 3.2 - Configuring Network Connectivity and Email on Mobile

Module 3.3 - Securing Mobile Devices

Module 3.4 - Tablets vs Laptops

Module 3.5 - Mobile Device Synchronization

Module 4.1 - Troubleshooting Theory

Module 4.2 - Motherboard, RAM, CPU and Power Issues

Module 4.3 - Troubleshooting Hard Drives and RAID Arrays

Module 4.4 - Troubleshooting Display Issues

Module 4.5 - Troubleshooting Wireless and Wired Connections

Module 4.6 - Troubleshooting Operating System Problems

Module 4.7 - Troubleshooting Security Issues

Module 4.8 - Troubleshooting Laptop Issues

Module 4.9 - Troubleshooting Printers

Exam Module

Input Output Ports

Invite Friends
Facebook Twitter Google+ LinkedIn Email
Description
Virtual Practice Lab
Practice Test
Resources
Input Output Ports

Now that we’ve learned about motherboard and their varying form factors, we can explore the components on the motherboard and we must start with input/output ports.

For demonstration purposes, we revisit a motherboard and explain some of the additional component parts that facilitate the input/output of data.

The purpose of input/output ports is to have the built-in capacity to interface with/connect to mouse, keyboard and monitor, etc.

We’ll diagram and show you how to build a motherboard from scratch and why it’s also essential to have USB, audio, power button, reset button, as part of the motherboard inherent functionality regardless of what the form factor is for that motherboard.

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Practice Labs and Exam Vouchers

Congratulations! You're taking the first step to getting certified. Get some hands on experience with available practice labs OR save some money, support Cybrary, and purchase discounted exam vouchers. Ready to earn your next industry certification? Join cyber security's largest community and start learning today.

JOIN CYBRARY

Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 1898 / December 10, 2017
What is Docker? [Series]
Views: 2394 / December 9, 2017
Wanna-Cry Ransomware
Views: 2345 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 2296 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel