Franske ITC-2000 Professor Messer Videos: Difference between revisions

From ITCwiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(One intermediate revision by the same user not shown)
Line 60: Line 60:
* [https://youtu.be/UQXr1QXx_oo Network Adapter Properties]
* [https://youtu.be/UQXr1QXx_oo Network Adapter Properties]
* [https://youtu.be/dgKy-mtL6N4 Installing a SOHO Network]
* [https://youtu.be/dgKy-mtL6N4 Installing a SOHO Network]
* [https://youtu.be/uBjDA8F7P5U Securing a SOHO Network]
* [https://youtu.be/K3vfnE_4UhA Troubleshooting Networks]
* [https://youtu.be/K3vfnE_4UhA Troubleshooting Networks]
=Chapter 7: Laptops and Other Mobile Devices=
=Chapter 7: Laptops and Other Mobile Devices=
Line 75: Line 74:
* [https://youtu.be/CoT0I2zZWQw Troubleshooting Laptops]
* [https://youtu.be/CoT0I2zZWQw Troubleshooting Laptops]
* [https://youtu.be/EouZp8HQpYk Troubleshooting Mobile Devices]
* [https://youtu.be/EouZp8HQpYk Troubleshooting Mobile Devices]
* [https://youtu.be/pfZnXeUTZ_Y Troubleshooting Mobile Apps]
* [https://youtu.be/zjCyvrc0Rls Troubleshooting Mobile Device Security]
=Chapter 8: Printers=
=Chapter 8: Printers=
* [https://youtu.be/t9GrRtNTaG4 Inkjet Printers]
* [https://youtu.be/t9GrRtNTaG4 Inkjet Printers]
Line 93: Line 94:
=Chapter 10: Windows Installation=
=Chapter 10: Windows Installation=
* [https://youtu.be/ChQ18B1hofI Operating Systems Overview]
* [https://youtu.be/ChQ18B1hofI Operating Systems Overview]
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7]
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1]
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10]
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise]
* [https://youtu.be/sKJFBOblq24 Disk Management]
* [https://youtu.be/sKJFBOblq24 Disk Management]
* [https://youtu.be/0kY9v5GNbb4 Installing Operating Systems] -- You already watched this in Chapter 3 but good review
* [https://youtu.be/0kY9v5GNbb4 Installing Operating Systems] -- You already watched this in Chapter 3 but good review
* [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] -- You already watched this in Chapter 3 but good review
* [https://youtu.be/2nYvd07D-zg Installing and Upgrading Windows] -- You already watched this in Chapter 3 but good review
=Chapter 11: Windows Configuration=
=Chapter 11: Windows Configuration=
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7]
* [https://youtu.be/rb9LSrCpIEY An Overview of Windows 7] -- You already watched this in Chapter 10
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1]
* [https://youtu.be/8p2AqLHebbo An Overview of Windows 8 and 8.1] -- You already watched this in Chapter 10
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10]
* [https://youtu.be/kdqnXBUGnOo An Overview of Windows 10] -- You already watched this in Chapter 10
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise]
* [https://youtu.be/9l2EuT4aiOg Windows in the Enterprise] -- You already watched this in Chapter 10
* [https://youtu.be/c8CIhFTY-eM Task Manager]
* [https://youtu.be/c8CIhFTY-eM Task Manager]
* [https://youtu.be/LDflWxhfIOQ Windows Control Panel]
* [https://youtu.be/LDflWxhfIOQ Windows Control Panel]
Line 126: Line 131:
* [https://youtu.be/8P535he8SjI Best Practices for macOS]
* [https://youtu.be/8P535he8SjI Best Practices for macOS]
* [https://youtu.be/uPtwubM3hno Best Practices for Linux]
* [https://youtu.be/uPtwubM3hno Best Practices for Linux]
=Chapter 13: Security=
* [https://youtu.be/y8vk19gR-yQ Types of Malware]
* [https://youtu.be/2HWediIfbvs Anti-Malware Tools]
* [https://youtu.be/Wg-DcTafUS8 Removing Malware]
* [https://youtu.be/ktJgCpPizwo Denial of Service]
* [https://youtu.be/tOpoJ_Obf3Q Zero-Day Attacks]
* [https://youtu.be/f6F18Shbb9Q Man-in-the-middle Attacks]
* [https://youtu.be/HAZ6xlodOwE Spoofing]
* [https://youtu.be/QUgLxll_P58 Social Engineering Attacks]
* [https://youtu.be/3F0_JNZevoM Physical Security]
* [https://youtu.be/X4QEx_MzBgs Windows Security Settings]
* [https://youtu.be/q9rCdG8I5EU Data Destruction and Disposal]
* [https://youtu.be/7Jq2JOrBB0M Workstation Security Best Practices]
* [https://youtu.be/2_0PzXh4LLc Logical Security]
* [https://youtu.be/W_NaKJrTmRk Brute Force Attacks]
* [https://youtu.be/is3z88JFI2E Configuring Windows Firewall]
* [https://youtu.be/7xWXZwQQ_W4 Windows Firewall with Advanced Security]
* [https://youtu.be/GfkeyHRC6yw Non-compliant Systems]
* [https://youtu.be/_0iSSXSFtcQ Wireless Security]
* [https://youtu.be/uBjDA8F7P5U Securing a SOHO Network]
* [https://youtu.be/u5I4PXVb28M Troubleshooting Security Issues]
=Chapter 14: The IT Professional=
* [https://youtu.be/-EUUWSZCg-Q Communication]
* [https://youtu.be/qjIbwkuPYuY Professionalism]
* [https://youtu.be/kNnWNBG4ptE Documentation Best Practices]
* [https://youtu.be/3ILDSJ56YT0 Change Management]
* [https://youtu.be/YIZfARjB4Eo Disaster Recovery]
* [https://youtu.be/595TLqjrI-4 Privacy, Licensing, and Policies]

Latest revision as of 03:33, 12 January 2021

Chapter 1: Introduction to Personal Computer Hardware

Chapter 2: PC Assembly

There are no Professor Messer Videos specifically about computer assembly.

Chapter 3: Advanced Computer Hardware

Chapter 4: Preventive Maintenance and Troubleshooting

Chapter 5: Networking Concepts

Chapter 6: Applied Networking

Chapter 7: Laptops and Other Mobile Devices

Chapter 8: Printers

Chapter 9: Virtualization and Cloud Computing

Chapter 10: Windows Installation

Chapter 11: Windows Configuration

Chapter 12: Mobile, Linux, and macOS Operating Systems

Chapter 13: Security

Chapter 14: The IT Professional