Franske ITC-2000 Professor Messer Videos
Jump to navigation
Jump to search
Chapter 1: Introduction to Personal Computer Hardware
- Safety Procedures
- Managing Electrostatic Discharge
- Computer Power
- Motherboard Form Factors
- Motherboard Expansion Slots
- Motherboard Connectors
- CPU Features
- CPU Cooling
- Overview of Memory
- Memory Technologies
- Expansion Cards
- Storage Devices
- Video Cables
- Multipurpose Cables
- SATA Drive Cables
- PATA Drive Cables
- SCSI Drive Cables
- Adapters and Converters
- Connectors
- Peripherals
Chapter 2: PC Assembly
There are no Professor Messer Videos specifically about computer assembly.
Chapter 3: Advanced Computer Hardware
- Environmental Impacts
- BIOS
- BIOS Options
- BIOS Security
- Installing BIOS Upgrades
- Installing Operating Systems
- Installing and Upgrading Windows
- RAID
- Custom Computer Systems
- Common Devices
Chapter 4: Preventive Maintenance and Troubleshooting
- How to Troubleshoot
- Troubleshooting Common Hardware Problems
- Troubleshooting Hard Drives
- Troubleshooting Video and Display Issues
Chapter 5: Networking Concepts
- Network Types
- Internet Connection Types
- Introduction to IP
- Understanding the OSI Model
- Common Network Ports
- 802.11 Wireless Standards
- Wireless Network Technologies
- Cellular Network Technologies
- Network Services
- Network Devices
- Network Tools
- Copper Network Cables
- Fiber Network Cables
Chapter 6: Applied Networking
- An Overview of IPv4 and IPv6
- Assigning IP Addresses
- Using IP Addresses
- Establishing Windows Network Connections
- Windows IP Address Configuration
- Network Adapter Properties
- Installing a SOHO Network
- Troubleshooting Networks
Chapter 7: Laptops and Other Mobile Devices
- Laptop Hardware
- Laptop Displays
- Laptop Features
- Laptop and Mobile Device Disassembly Best Practices
- Mobile Devices
- Mobile Device Connections
- Mobile Device Accessories
- Mobile Device Connectivity
- Configuring Email on Mobile Devices
- Mobile Device Synchronization
- Troubleshooting Laptops
- Troubleshooting Mobile Devices
- Troubleshooting Mobile Apps
- Troubleshooting Mobile Device Security
Chapter 8: Printers
- Inkjet Printers
- Laser Printers
- Thermal Printers
- Impact Printers
- Virtual and 3D Printers
- SOHO Multifunction Devices
- Inkjet Printer Maintenance
- Laser Printer Maintenance
- Thermal Printer Maintenance
- Impact Printer Maintenance
- Troubleshooting Printers
Chapter 9: Virtualization and Cloud Computing
Chapter 10: Windows Installation
- Operating Systems Overview
- An Overview of Windows 7
- An Overview of Windows 8 and 8.1
- An Overview of Windows 10
- Windows in the Enterprise
- Disk Management
- Installing Operating Systems -- You already watched this in Chapter 3 but good review
- Installing and Upgrading Windows -- You already watched this in Chapter 3 but good review
Chapter 11: Windows Configuration
- An Overview of Windows 7 -- You already watched this in Chapter 10
- An Overview of Windows 8 and 8.1 -- You already watched this in Chapter 10
- An Overview of Windows 10 -- You already watched this in Chapter 10
- Windows in the Enterprise -- You already watched this in Chapter 10
- Task Manager
- Windows Control Panel
- Windows Administrative Tools
- System Utilities
- System Configuration
- Disk Management -- You already watched this in Chapter 10
- Installing Applications
- Microsoft Command Line Tools
- Homegroups, Workgroups, and Domains
- Windows Network Technologies
- Network Command Line Tools
- Establishing Windows Network Connections -- You have already watched this in Chapter 6
- Windows IP Address Configuration -- You have already watched this in Chapter 6
- Network Adapter Properties -- You have already watched this in Chapter 6
- Remote Access Technologies
- Troubleshooting Windows
- Troubleshooting Solutions
Chapter 12: Mobile, Linux, and macOS Operating Systems
- Securing Mobile Devices
- macOS Features
- macOS Tools
- Linux Tools
- Basic Linux Commands
- Best Practices for macOS
- Best Practices for Linux
Chapter 13: Security
- Types of Malware
- Anti-Malware Tools
- Removing Malware
- Denial of Service
- Zero-Day Attacks
- Man-in-the-middle Attacks
- Spoofing
- Social Engineering Attacks
- Physical Security
- Windows Security Settings
- Data Destruction and Disposal
- Workstation Security Best Practices
- Logical Security
- Brute Force Attacks
- Configuring Windows Firewall
- Windows Firewall with Advanced Security
- Non-compliant Systems
- Wireless Security
- Securing a SOHO Network
- Troubleshooting Security Issues