Franske ITC-2000 Professor Messer Videos: Difference between revisions
Jump to navigation
Jump to search
BenFranske (talk | contribs) No edit summary |
BenFranske (talk | contribs) No edit summary |
||
Line 60: | Line 60: | ||
* [https://youtu.be/UQXr1QXx_oo Network Adapter Properties] | * [https://youtu.be/UQXr1QXx_oo Network Adapter Properties] | ||
* [https://youtu.be/dgKy-mtL6N4 Installing a SOHO Network] | * [https://youtu.be/dgKy-mtL6N4 Installing a SOHO Network] | ||
* [https://youtu.be/K3vfnE_4UhA Troubleshooting Networks] | * [https://youtu.be/K3vfnE_4UhA Troubleshooting Networks] | ||
=Chapter 7: Laptops and Other Mobile Devices= | =Chapter 7: Laptops and Other Mobile Devices= | ||
Line 75: | Line 74: | ||
* [https://youtu.be/CoT0I2zZWQw Troubleshooting Laptops] | * [https://youtu.be/CoT0I2zZWQw Troubleshooting Laptops] | ||
* [https://youtu.be/EouZp8HQpYk Troubleshooting Mobile Devices] | * [https://youtu.be/EouZp8HQpYk Troubleshooting Mobile Devices] | ||
* [https://youtu.be/pfZnXeUTZ_Y Troubleshooting Mobile Apps] | |||
* [https://youtu.be/zjCyvrc0Rls Troubleshooting Mobile Device Security] | |||
=Chapter 8: Printers= | =Chapter 8: Printers= | ||
* [https://youtu.be/t9GrRtNTaG4 Inkjet Printers] | * [https://youtu.be/t9GrRtNTaG4 Inkjet Printers] | ||
Line 93: | Line 94: | ||
=Chapter 10: Windows Installation= | =Chapter 10: Windows Installation= | ||
* [https://youtu.be/ChQ18B1hofI Operating Systems Overview] | * [https://youtu.be/ChQ18B1hofI Operating Systems Overview] | ||
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7] | |||
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1] | |||
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10] | |||
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise] | |||
* [https://youtu.be/sKJFBOblq24 Disk Management] | * [https://youtu.be/sKJFBOblq24 Disk Management] | ||
* [https://youtu.be/0kY9v5GNbb4 Installing Operating Systems] -- You already watched this in Chapter 3 but good review | * [https://youtu.be/0kY9v5GNbb4 Installing Operating Systems] -- You already watched this in Chapter 3 but good review | ||
* [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] -- You already watched this in Chapter 3 but good review | * [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] -- You already watched this in Chapter 3 but good review | ||
=Chapter 11: Windows Configuration= | =Chapter 11: Windows Configuration= | ||
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7] | * [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7] -- You already watched this in Chapter 10 | ||
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1] | * [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1] -- You already watched this in Chapter 10 | ||
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10] | * [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10] -- You already watched this in Chapter 10 | ||
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise] | * [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise] -- You already watched this in Chapter 10 | ||
* [https://youtu.be/c8CIhFTY-eM Task Manager] | * [https://youtu.be/c8CIhFTY-eM Task Manager] | ||
* [https://youtu.be/LDflWxhfIOQ Windows Control Panel] | * [https://youtu.be/LDflWxhfIOQ Windows Control Panel] | ||
Line 126: | Line 131: | ||
* [https://youtu.be/8P535he8SjI Best Practices for macOS] | * [https://youtu.be/8P535he8SjI Best Practices for macOS] | ||
* [https://youtu.be/uPtwubM3hno Best Practices for Linux] | * [https://youtu.be/uPtwubM3hno Best Practices for Linux] | ||
=Chapter 13: Security= | |||
* [https://youtu.be/y8vk19gR-yQ Types of Malware] | |||
* [https://youtu.be/2HWediIfbvs Anti-Malware Tools] | |||
* [https://youtu.be/Wg-DcTafUS8 Removing Malware] | |||
* [https://youtu.be/ktJgCpPizwo Denial of Service] | |||
* [https://youtu.be/tOpoJ_Obf3Q Zero-Day Attacks] | |||
* [https://youtu.be/f6F18Shbb9Q Man-in-the-middle Attacks] | |||
* [https://youtu.be/HAZ6xlodOwE Spoofing] | |||
* [https://youtu.be/QUgLxll_P58 Social Engineering Attacks] | |||
* [https://youtu.be/595TLqjrI-4 Privacy, Licensing, and Policies] | |||
* [https://youtu.be/3F0_JNZevoM Physical Security] | |||
* [https://youtu.be/X4QEx_MzBgs Windows Security Settings] | |||
* [https://youtu.be/q9rCdG8I5EU Data Destruction and Disposal] | |||
* [https://youtu.be/7Jq2JOrBB0M Workstation Security Best Practices] | |||
* [https://youtu.be/2_0PzXh4LLc Logical Security] | |||
* [https://youtu.be/W_NaKJrTmRk Brute Force Attacks] | |||
* [https://youtu.be/is3z88JFI2E Configuring Windows Firewall] | |||
* [https://youtu.be/7xWXZwQQ_W4 Windows Firewall with Advanced Security] | |||
* [https://youtu.be/GfkeyHRC6yw Non-compliant Systems] | |||
* [https://youtu.be/_0iSSXSFtcQ Wireless Security] | |||
* [https://youtu.be/uBjDA8F7P5U Securing a SOHO Network] | |||
* [https://youtu.be/u5I4PXVb28M Troubleshooting Security Issues] | |||
=Chapter 14: The IT Professional= |
Revision as of 03:29, 12 January 2021
Chapter 1: Introduction to Personal Computer Hardware
- Safety Procedures
- Managing Electrostatic Discharge
- Computer Power
- Motherboard Form Factors
- Motherboard Expansion Slots
- Motherboard Connectors
- CPU Features
- CPU Cooling
- Overview of Memory
- Memory Technologies
- Expansion Cards
- Storage Devices
- Video Cables
- Multipurpose Cables
- SATA Drive Cables
- PATA Drive Cables
- SCSI Drive Cables
- Adapters and Converters
- Connectors
- Peripherals
Chapter 2: PC Assembly
There are no Professor Messer Videos specifically about computer assembly.
Chapter 3: Advanced Computer Hardware
- Environmental Impacts
- BIOS
- BIOS Options
- BIOS Security
- Installing BIOS Upgrades
- Installing Operating Systems
- Installing and Upgrading Windows
- RAID
- Custom Computer Systems
- Common Devices
Chapter 4: Preventive Maintenance and Troubleshooting
- How to Troubleshoot
- Troubleshooting Common Hardware Problems
- Troubleshooting Hard Drives
- Troubleshooting Video and Display Issues
Chapter 5: Networking Concepts
- Network Types
- Internet Connection Types
- Introduction to IP
- Understanding the OSI Model
- Common Network Ports
- 802.11 Wireless Standards
- Wireless Network Technologies
- Cellular Network Technologies
- Network Services
- Network Devices
- Network Tools
- Copper Network Cables
- Fiber Network Cables
Chapter 6: Applied Networking
- An Overview of IPv4 and IPv6
- Assigning IP Addresses
- Using IP Addresses
- Establishing Windows Network Connections
- Windows IP Address Configuration
- Network Adapter Properties
- Installing a SOHO Network
- Troubleshooting Networks
Chapter 7: Laptops and Other Mobile Devices
- Laptop Hardware
- Laptop Displays
- Laptop Features
- Laptop and Mobile Device Disassembly Best Practices
- Mobile Devices
- Mobile Device Connections
- Mobile Device Accessories
- Mobile Device Connectivity
- Configuring Email on Mobile Devices
- Mobile Device Synchronization
- Troubleshooting Laptops
- Troubleshooting Mobile Devices
- Troubleshooting Mobile Apps
- Troubleshooting Mobile Device Security
Chapter 8: Printers
- Inkjet Printers
- Laser Printers
- Thermal Printers
- Impact Printers
- Virtual and 3D Printers
- SOHO Multifunction Devices
- Inkjet Printer Maintenance
- Laser Printer Maintenance
- Thermal Printer Maintenance
- Impact Printer Maintenance
- Troubleshooting Printers
Chapter 9: Virtualization and Cloud Computing
Chapter 10: Windows Installation
- Operating Systems Overview
- An Overview of Windows 7
- An Overview of Windows 8 and 8.1
- An Overview of Windows 10
- Windows in the Enterprise
- Disk Management
- Installing Operating Systems -- You already watched this in Chapter 3 but good review
- Installing and Upgrading Windows -- You already watched this in Chapter 3 but good review
Chapter 11: Windows Configuration
- An Overview of Windows 7 -- You already watched this in Chapter 10
- An Overview of Windows 8 and 8.1 -- You already watched this in Chapter 10
- An Overview of Windows 10 -- You already watched this in Chapter 10
- Windows in the Enterprise -- You already watched this in Chapter 10
- Task Manager
- Windows Control Panel
- Windows Administrative Tools
- System Utilities
- System Configuration
- Disk Management -- You already watched this in Chapter 10
- Installing Applications
- Microsoft Command Line Tools
- Homegroups, Workgroups, and Domains
- Windows Network Technologies
- Network Command Line Tools
- Establishing Windows Network Connections -- You have already watched this in Chapter 6
- Windows IP Address Configuration -- You have already watched this in Chapter 6
- Network Adapter Properties -- You have already watched this in Chapter 6
- Remote Access Technologies
- Troubleshooting Windows
- Troubleshooting Solutions
Chapter 12: Mobile, Linux, and macOS Operating Systems
- Securing Mobile Devices
- macOS Features
- macOS Tools
- Linux Tools
- Basic Linux Commands
- Best Practices for macOS
- Best Practices for Linux
Chapter 13: Security
- Types of Malware
- Anti-Malware Tools
- Removing Malware
- Denial of Service
- Zero-Day Attacks
- Man-in-the-middle Attacks
- Spoofing
- Social Engineering Attacks
- Privacy, Licensing, and Policies
- Physical Security
- Windows Security Settings
- Data Destruction and Disposal
- Workstation Security Best Practices
- Logical Security
- Brute Force Attacks
- Configuring Windows Firewall
- Windows Firewall with Advanced Security
- Non-compliant Systems
- Wireless Security
- Securing a SOHO Network
- Troubleshooting Security Issues