Site icon EZDA Solutions

CompTIA IT Fundamentals Training – ITF+ – (FCO-U61)

Course Overview

CompTIA IT Fundamentals training often referred to as ITF+,  helps anyone learn about IT. Students learn fundamental skills needed in the IT industry. Areas of IT covered include hardware, software, programming, security, and infrastructure. This is the ideal place to start for anyone new to the world of IT. It will form the foundation of your learning IT principles and skills. What you learn in this course will carry you forward to more certifications you can gain in the future.

fc0 u61 300x200 1

Course objectives

The official exam offered by CompTIA for this certification is exam id FCO-U61. The exam assesses a candidate’s knowledge of troubleshooting theory and preventative maintenance. Students look at issues behind problems and resolve them using technical IT skills. Candidates show they can incorporate methods to eliminate technical issues. This is the ideal exam for anyone who’s interested in pursuing an IT career and has a genuine passion for IT.

0
Course Videos
0
Test Questions
0
E-BOOKS
0
Duration

Modules

Module 1 – IT Concepts and Terminology

  • 0.1 Instructor Intro
  • 1.1 Compare and Contrast Notational Systems
  • 1.1 Compare and Contrast Notational Systems Demo
  • 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
  • 1.3 Illustrate the Basics of Computing and Processing
  • 1.4 Explain the Value of Data and Information
  • 1.5 Compare and Contrast Common Units of Measures
  • 1.5 Compare and Contrast Common Units of Measures Demo
  • 1.6 Explain the Troubleshooting Methodology

Module 3 – Applications and Software

  • 3.1 Explain the Purpose of Operating Systems
  • 3.1 Explain the Purpose of Operating Systems Demo
  • 3.2 Compare & Contrast Components of an Operating System
  • 3.2 Compare & Contrast Components of an Operating System Demo
  • 3.3 Explain the Purpose & Proper Use of Software
  • 3.4 Explain Methods of Application Architecture & Delivery Models
  • 3.5 Given a Scenario Configure & Use Web Browsers
  • 3.5 Given a Scenario Configure & Use Web Browsers Firefox
  • 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
  • 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
  • 3.6 Compare & Contrast General Application Concepts & Uses

Module 5 – Database Fundamentals

  • 5.1 Explain Database Concepts and the Purpose of Databases
  • 5.2 Compare and Contrast Various Database Structures
  • 5.3 Summarize Methods Used to Interface with Databases
  • 5.3 Summarize Methods Used to Interface with Databases

Module 2 – Infrastructure

  • 2.1 Classify Common Types of Input-Output Device Interfaces
  • 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
  • 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • 2.3 Explain the Purpose of Common Internal Computing Components
  • 2.4 Compare & Contrast Common Internet Service Types-
  • 2.5 Compare & Contrast Storage Types
  • 2.6 Compare & Contrast Common Computing Devices & Their Purposes
  • 2.7 Explain Basic Networking Concepts
  • 2.7 Explain Basic Networking Concepts
  • 2.7 Explain Basic Networking Concepts Part 2
  • 2.7 Explain Basic Networking Concepts Part 3
  • 2.7 Explain Basic Networking Concepts Part 4
  • 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
  • 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network

Module 4 – Software Development

  • 4.1 Compare & Contrast Programming Language Categories-
  • 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic
  • 4.3 Explain the Purpose & Use of Programming Concepts
  • 4.3 HTML

Module 6 – Security

  • 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
  • 6.2 Explain Methods to Secure Devices and Best Practices
  • 6.3 Summarize Behavioral Security Concepts
  • 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
  • 6.5 Explain Password Best Practices
  • 6.6 Explain Common Uses of Encryption
  • 6.7 Explain Business Continuity Concepts
  • 6.8 Takeaways
  • 6.9 ITF Fundamentals Conclusion

Modes of Learning

Exit mobile version