Franske ITC-2000 Professor Messer Videos: Difference between revisions
Jump to navigation
Jump to search
BenFranske (talk | contribs) No edit summary |
BenFranske (talk | contribs) No edit summary |
||
(3 intermediate revisions by the same user not shown) | |||
Line 31: | Line 31: | ||
* [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] | * [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] | ||
* [https://youtu.be/IDDgR8xryJM RAID] | * [https://youtu.be/IDDgR8xryJM RAID] | ||
* [https://youtu.be/Q5LMe3wuZLY Custom Computer Systems] | |||
* [https://youtu.be/ThpgrtDFTJ8 Common Devices] | |||
=Chapter 4: Preventive Maintenance and Troubleshooting= | |||
* [https://youtu.be/3PDn-Zteckc How to Troubleshoot] | |||
* [https://youtu.be/p4VxERfTHgU Troubleshooting Common Hardware Problems] | |||
* [https://youtu.be/enPDQwUIAek Troubleshooting Hard Drives] | |||
* [https://youtu.be/mR-Ia1WA7RE Troubleshooting Video and Display Issues] | |||
=Chapter 5: Networking Concepts= | |||
* [https://youtu.be/phbSxB3PyNg Network Types] | |||
* [https://youtu.be/MvlUU99vdGg Internet Connection Types] | |||
* [https://youtu.be/nNoAreSTBv0 Introduction to IP] | |||
* [https://youtu.be/G7aVKgGUe9c Understanding the OSI Model] | |||
* [https://youtu.be/nWDhZzwh9UA Common Network Ports] | |||
* [https://youtu.be/vf9_pT0Rvuc 802.11 Wireless Standards] | |||
* [https://youtu.be/_b5rQOOnVGw Wireless Network Technologies] | |||
* [https://youtu.be/SdtCkGacrg0 Cellular Network Technologies] | |||
* [https://youtu.be/LYmTUXQy_2U Network Services] | |||
* [https://youtu.be/YqRHaR-OQVQ Network Devices] | |||
* [https://youtu.be/zd1ivZr-c2Y Network Tools] | |||
* [https://youtu.be/rrUHjb3hfjM Copper Network Cables] | |||
* [https://youtu.be/KTXWO3cbfyQ Fiber Network Cables] | |||
=Chapter 6: Applied Networking= | |||
* [https://youtu.be/2zs_jXvjmKw An Overview of IPv4 and IPv6] | |||
* [https://youtu.be/WbXDrJzgmtE Assigning IP Addresses] | |||
* [https://youtu.be/j8aaRfttmw0 Using IP Addresses] | |||
* [https://youtu.be/Pw8-PWPAF2k Establishing Windows Network Connections] | |||
* [https://youtu.be/l0uUNGKkpJ8 Windows IP Address Configuration] | |||
* [https://youtu.be/UQXr1QXx_oo Network Adapter Properties] | |||
* [https://youtu.be/dgKy-mtL6N4 Installing a SOHO Network] | |||
* [https://youtu.be/K3vfnE_4UhA Troubleshooting Networks] | |||
=Chapter 7: Laptops and Other Mobile Devices= | |||
* [https://youtu.be/Jk56geMsdL8 Laptop Hardware] | |||
* [https://youtu.be/lQCafzHSA4o Laptop Displays] | |||
* [https://youtu.be/kOomtv0IX0g Laptop Features] | |||
* [https://youtu.be/foe5Yu48kmQ Laptop and Mobile Device Disassembly Best Practices] | |||
* [https://youtu.be/8MEP8uQ3ckU Mobile Devices] | |||
* [https://youtu.be/FiMgMiBwJg0 Mobile Device Connections] | |||
* [https://youtu.be/SBZnhH5DxvM Mobile Device Accessories] | |||
* [https://youtu.be/ULwgx42sKN8 Mobile Device Connectivity] | |||
* [https://youtu.be/ify_6P3Dqek Configuring Email on Mobile Devices] | |||
* [https://youtu.be/HMeZ_S5lBvg Mobile Device Synchronization] | |||
* [https://youtu.be/CoT0I2zZWQw Troubleshooting Laptops] | |||
* [https://youtu.be/EouZp8HQpYk Troubleshooting Mobile Devices] | |||
* [https://youtu.be/pfZnXeUTZ_Y Troubleshooting Mobile Apps] | |||
* [https://youtu.be/zjCyvrc0Rls Troubleshooting Mobile Device Security] | |||
=Chapter 8: Printers= | |||
* [https://youtu.be/t9GrRtNTaG4 Inkjet Printers] | |||
* [https://youtu.be/f7eIC9Rfd1k Laser Printers] | |||
* [https://youtu.be/8JXzHJRijCY Thermal Printers] | |||
* [https://youtu.be/-FtvlNrzUA8 Impact Printers] | |||
* [https://youtu.be/IeT1N4GE1bA Virtual and 3D Printers] | |||
* [https://youtu.be/ojglsgeQZIQ SOHO Multifunction Devices] | |||
* [https://youtu.be/fXiJsf-2v5M Inkjet Printer Maintenance] | |||
* [https://youtu.be/TkBHF2mFxOY Laser Printer Maintenance] | |||
* [https://youtu.be/AQka4DqyZ5w Thermal Printer Maintenance] | |||
* [https://youtu.be/zcAOM04Rz8k Impact Printer Maintenance] | |||
* [https://youtu.be/DD1Cgpv7aWc Troubleshooting Printers] | |||
=Chapter 9: Virtualization and Cloud Computing= | |||
* [https://youtu.be/J9xsk9MjRNw Client Side Virtualization] | |||
* [https://youtu.be/Ap2wPvtdPCg Cloud Models] | |||
* [https://youtu.be/iy7Hqrc0SnA Cloud Services] | |||
=Chapter 10: Windows Installation= | |||
* [https://youtu.be/ChQ18B1hofI Operating Systems Overview] | |||
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7] | |||
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1] | |||
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10] | |||
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise] | |||
* [https://youtu.be/sKJFBOblq24 Disk Management] | |||
* [https://youtu.be/0kY9v5GNbb4 Installing Operating Systems] -- You already watched this in Chapter 3 but good review | |||
* [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] -- You already watched this in Chapter 3 but good review | |||
=Chapter 11: Windows Configuration= | |||
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7] -- You already watched this in Chapter 10 | |||
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1] -- You already watched this in Chapter 10 | |||
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10] -- You already watched this in Chapter 10 | |||
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise] -- You already watched this in Chapter 10 | |||
* [https://youtu.be/c8CIhFTY-eM Task Manager] | |||
* [https://youtu.be/LDflWxhfIOQ Windows Control Panel] | |||
* [https://youtu.be/cUjTcNluIxc Windows Administrative Tools] | |||
* [https://youtu.be/YTQo50ge_E8 System Utilities] | |||
* [https://youtu.be/aGhCUJmtDR4 System Configuration] | |||
* [https://youtu.be/sKJFBOblq24 Disk Management] -- You already watched this in Chapter 10 | |||
* [https://youtu.be/EycvRyyq5DI Installing Applications] | |||
* [https://youtu.be/3-TcvtE9Kyg Microsoft Command Line Tools] | |||
* [https://youtu.be/HpD285xBQs0 Homegroups, Workgroups, and Domains] | |||
* [https://youtu.be/itAfFevThxQ Windows Network Technologies] | |||
* [https://youtu.be/SrteqGn-h-c Network Command Line Tools] | |||
* [https://youtu.be/Pw8-PWPAF2k Establishing Windows Network Connections] -- You have already watched this in Chapter 6 | |||
* [https://youtu.be/l0uUNGKkpJ8 Windows IP Address Configuration] -- You have already watched this in Chapter 6 | |||
* [https://youtu.be/UQXr1QXx_oo Network Adapter Properties] -- You have already watched this in Chapter 6 | |||
* [https://youtu.be/LEVMZ0jt4W8 Remote Access Technologies] | |||
* [https://youtu.be/tiqrM73quyM Troubleshooting Windows] | |||
* [https://youtu.be/WUCXf9pamZE Troubleshooting Solutions] | |||
=Chapter 12: Mobile, Linux, and macOS Operating Systems= | |||
* [https://youtu.be/TOWSS0Ntrgs Securing Mobile Devices] | |||
* [https://youtu.be/8CtgGish1o0 macOS Features] | |||
* [https://youtu.be/AbZXk5xgiuc macOS Tools] | |||
* [https://youtu.be/xmvfDMY3UYU Linux Tools] | |||
* [https://youtu.be/tG6JfLepOP8 Basic Linux Commands] | |||
* [https://youtu.be/8P535he8SjI Best Practices for macOS] | |||
* [https://youtu.be/uPtwubM3hno Best Practices for Linux] | |||
=Chapter 13: Security= | |||
* [https://youtu.be/y8vk19gR-yQ Types of Malware] | |||
* [https://youtu.be/2HWediIfbvs Anti-Malware Tools] | |||
* [https://youtu.be/Wg-DcTafUS8 Removing Malware] | |||
* [https://youtu.be/ktJgCpPizwo Denial of Service] | |||
* [https://youtu.be/tOpoJ_Obf3Q Zero-Day Attacks] | |||
* [https://youtu.be/f6F18Shbb9Q Man-in-the-middle Attacks] | |||
* [https://youtu.be/HAZ6xlodOwE Spoofing] | |||
* [https://youtu.be/QUgLxll_P58 Social Engineering Attacks] | |||
* [https://youtu.be/3F0_JNZevoM Physical Security] | |||
* [https://youtu.be/X4QEx_MzBgs Windows Security Settings] | |||
* [https://youtu.be/q9rCdG8I5EU Data Destruction and Disposal] | |||
* [https://youtu.be/7Jq2JOrBB0M Workstation Security Best Practices] | |||
* [https://youtu.be/2_0PzXh4LLc Logical Security] | |||
* [https://youtu.be/W_NaKJrTmRk Brute Force Attacks] | |||
* [https://youtu.be/is3z88JFI2E Configuring Windows Firewall] | |||
* [https://youtu.be/7xWXZwQQ_W4 Windows Firewall with Advanced Security] | |||
* [https://youtu.be/GfkeyHRC6yw Non-compliant Systems] | |||
* [https://youtu.be/_0iSSXSFtcQ Wireless Security] | |||
* [https://youtu.be/uBjDA8F7P5U Securing a SOHO Network] | |||
* [https://youtu.be/u5I4PXVb28M Troubleshooting Security Issues] | |||
=Chapter 14: The IT Professional= | |||
* [https://youtu.be/-EUUWSZCg-Q Communication] | |||
* [https://youtu.be/qjIbwkuPYuY Professionalism] | |||
* [https://youtu.be/kNnWNBG4ptE Documentation Best Practices] | |||
* [https://youtu.be/3ILDSJ56YT0 Change Management] | |||
* [https://youtu.be/YIZfARjB4Eo Disaster Recovery] | |||
* [https://youtu.be/595TLqjrI-4 Privacy, Licensing, and Policies] |
Latest revision as of 03:33, 12 January 2021
Chapter 1: Introduction to Personal Computer Hardware
- Safety Procedures
- Managing Electrostatic Discharge
- Computer Power
- Motherboard Form Factors
- Motherboard Expansion Slots
- Motherboard Connectors
- CPU Features
- CPU Cooling
- Overview of Memory
- Memory Technologies
- Expansion Cards
- Storage Devices
- Video Cables
- Multipurpose Cables
- SATA Drive Cables
- PATA Drive Cables
- SCSI Drive Cables
- Adapters and Converters
- Connectors
- Peripherals
Chapter 2: PC Assembly
There are no Professor Messer Videos specifically about computer assembly.
Chapter 3: Advanced Computer Hardware
- Environmental Impacts
- BIOS
- BIOS Options
- BIOS Security
- Installing BIOS Upgrades
- Installing Operating Systems
- Installing and Upgrading Windows
- RAID
- Custom Computer Systems
- Common Devices
Chapter 4: Preventive Maintenance and Troubleshooting
- How to Troubleshoot
- Troubleshooting Common Hardware Problems
- Troubleshooting Hard Drives
- Troubleshooting Video and Display Issues
Chapter 5: Networking Concepts
- Network Types
- Internet Connection Types
- Introduction to IP
- Understanding the OSI Model
- Common Network Ports
- 802.11 Wireless Standards
- Wireless Network Technologies
- Cellular Network Technologies
- Network Services
- Network Devices
- Network Tools
- Copper Network Cables
- Fiber Network Cables
Chapter 6: Applied Networking
- An Overview of IPv4 and IPv6
- Assigning IP Addresses
- Using IP Addresses
- Establishing Windows Network Connections
- Windows IP Address Configuration
- Network Adapter Properties
- Installing a SOHO Network
- Troubleshooting Networks
Chapter 7: Laptops and Other Mobile Devices
- Laptop Hardware
- Laptop Displays
- Laptop Features
- Laptop and Mobile Device Disassembly Best Practices
- Mobile Devices
- Mobile Device Connections
- Mobile Device Accessories
- Mobile Device Connectivity
- Configuring Email on Mobile Devices
- Mobile Device Synchronization
- Troubleshooting Laptops
- Troubleshooting Mobile Devices
- Troubleshooting Mobile Apps
- Troubleshooting Mobile Device Security
Chapter 8: Printers
- Inkjet Printers
- Laser Printers
- Thermal Printers
- Impact Printers
- Virtual and 3D Printers
- SOHO Multifunction Devices
- Inkjet Printer Maintenance
- Laser Printer Maintenance
- Thermal Printer Maintenance
- Impact Printer Maintenance
- Troubleshooting Printers
Chapter 9: Virtualization and Cloud Computing
Chapter 10: Windows Installation
- Operating Systems Overview
- An Overview of Windows 7
- An Overview of Windows 8 and 8.1
- An Overview of Windows 10
- Windows in the Enterprise
- Disk Management
- Installing Operating Systems -- You already watched this in Chapter 3 but good review
- Installing and Upgrading Windows -- You already watched this in Chapter 3 but good review
Chapter 11: Windows Configuration
- An Overview of Windows 7 -- You already watched this in Chapter 10
- An Overview of Windows 8 and 8.1 -- You already watched this in Chapter 10
- An Overview of Windows 10 -- You already watched this in Chapter 10
- Windows in the Enterprise -- You already watched this in Chapter 10
- Task Manager
- Windows Control Panel
- Windows Administrative Tools
- System Utilities
- System Configuration
- Disk Management -- You already watched this in Chapter 10
- Installing Applications
- Microsoft Command Line Tools
- Homegroups, Workgroups, and Domains
- Windows Network Technologies
- Network Command Line Tools
- Establishing Windows Network Connections -- You have already watched this in Chapter 6
- Windows IP Address Configuration -- You have already watched this in Chapter 6
- Network Adapter Properties -- You have already watched this in Chapter 6
- Remote Access Technologies
- Troubleshooting Windows
- Troubleshooting Solutions
Chapter 12: Mobile, Linux, and macOS Operating Systems
- Securing Mobile Devices
- macOS Features
- macOS Tools
- Linux Tools
- Basic Linux Commands
- Best Practices for macOS
- Best Practices for Linux
Chapter 13: Security
- Types of Malware
- Anti-Malware Tools
- Removing Malware
- Denial of Service
- Zero-Day Attacks
- Man-in-the-middle Attacks
- Spoofing
- Social Engineering Attacks
- Physical Security
- Windows Security Settings
- Data Destruction and Disposal
- Workstation Security Best Practices
- Logical Security
- Brute Force Attacks
- Configuring Windows Firewall
- Windows Firewall with Advanced Security
- Non-compliant Systems
- Wireless Security
- Securing a SOHO Network
- Troubleshooting Security Issues