Instructor Background

A+ 900 Series Updates

Module 1.1 - Configure and apply BIOS Settings

Module 1.2 - Differentiate Between Motherboards

Module 1.3 - Compare and Contrast RAM

Module 1.4 - Install and Configure Expansion Cards

Module 1.5 - Install and Configure Storage Devices

Module 1.6 - Differentiate CPU Types

Module 1.7 - Compare Connection Interfaces

Module 1.8 - Install Appropriate Power Supply

Module 1.9 - Custom Configurations

Module 1.10 - Evaluate Display Devices

Module 1.11 - Identify Connectors & Cables

Module 1.12 - Install Peripheral Devices

Module 2.1 - Network Cables and Connectors

Module 2.2 - Characteristics or Connectors / Cables

Module 2.3 - TCP/IP

Module 2.4 - Common TCP and UDP

Module 2.5 - Wireless Standards / Encryption

Module 2.6 - Install and Configure a SOHO Router

Module 2.7 - Internet Connection Types / Features

Module 2.8 - Identify Network Types

Module 2.9 - Compare Network Devices

Module 2.10 - Use Appropriate Networking Tools

Module 3.1 - Laptop Hardware and Components

Module 3.2 - Compare Laptop Display Types

Module 3.3 - Compare Laptop Features

Module 4.1 - Printer Imaging Processes

Module 4.2 - Install / Configure Printers

Module 4.3 - Printer Maintenance

Module 5.1 - Appropriate Safety Procedures

Module 5.2 - Environmental Impacts / Controls

Module 5.3 - Communication & Professionalism

Module 5.4 - Dealing with Prohibited Content

Exam Module

Module 1.1 - Windows Operating Systems

Module 1.2 - Installing & Configuring Operating Systems

Module 1.3 - Screen Capture Labs

Module 1.4 - OS Features - Administrative Tools

Module 1.5 - Control Panel

Module 1.6 - Network Connections on Client Desktop

Module 1.7 - Preventative Maintenance Tools

Module 1.8 - OS Security Settings

Module 1.9 - Virtualization

Module 2.1 - Security

Module 2.2 - Security Threats

Module 2.3 - Securing A Work Station Best Practices

Module 2.4 - Data Destruction Methods

Module 2.5 - Securing a Wireless Network

Module 2.6 - Securing Home Office Wired Network

Module 3.1 - Mobile Operating Systems

Module 3.2 - Configuring Network Connectivity and Email on Mobile

Module 3.3 - Securing Mobile Devices

Module 3.4 - Tablets vs Laptops

Module 3.5 - Mobile Device Synchronization

Module 4.1 - Troubleshooting Theory

Module 4.2 - Motherboard, RAM, CPU and Power Issues

Module 4.3 - Troubleshooting Hard Drives and RAID Arrays

Module 4.4 - Troubleshooting Display Issues

Module 4.5 - Troubleshooting Wireless and Wired Connections

Module 4.6 - Troubleshooting Operating System Problems

Module 4.7 - Troubleshooting Security Issues

Module 4.8 - Troubleshooting Laptop Issues

Module 4.9 - Troubleshooting Printers

Exam Module

Securing Mobile Devices (part 2)

Invite Friends
Facebook Twitter Google+ LinkedIn Email

All Information Should Be Free

Join today and get unlimited free access to the industry's best cyber security training and content.

JOIN CYBRARY

Already a member? Login to View this Lesson

Want to skip ahead and test your Skills?
Take your first Skill Certification exam FREE with code: FREESCT1
Securing Mobile Devices (part 2)

Securing Mobile Devices Part 2

Mobile devices are also computers, so this lesson examines the importance of using antivirus software on mobile devices as well as on our standing computing devices.

You’ll learn what “Rooting” a device entails and if it should be avoided, what Jail Breaking is, the importance of keeping patch and updates current, and how to perform a remote backup of your mobile device.

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Extracting Passwords
Views: 1633 / February 22, 2017
Legal Obligations for Backup and Recovery
Views: 753 / February 22, 2017
Cryptography Part 2: An In-Depth Review
Views: 1880 / February 21, 2017
Project Management for Beginners
Views: 1876 / February 21, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel