You are on page 1of 239

IT  Fundamentals

FC0-­‐U51  
IT  Fundamentals
•  The  CompTIA  IT  Fundamentals  Cer9fica9on  exam  is  designed  to  show  
that  the  successful  candidate  has  the  knowledge  to:  
•  Iden9fy  and  explain  basic  computer  components  
•  Set  up  a  basic  worksta9on  
•  Conduct  basic  soFware  installa9on  
•  Establish  basic  network  connec9vity  
•  Iden9fy  compa9bility  issues  
•  Iden9fy/prevent  basic  security  risks    
IT  Fundamentals
So1ware
1.  Compare  and  contrast  common  Opera9ng  Systems  and  their  
func9ons  and  features  
2.  Iden9fy  common  programs,  applica9ons  and  their  purpose    
3.  SoFware  management  best  prac9ces    
4.  Iden9fy  some  alterna9ve  technologies  and  their  purpose  
5.  Explain  the  basic  soFware  features  and  func9ons  of  wireless  
devices    
Hardware
1.  Iden9fy  basic  wired  and  wireless  peripherals  and  their  purpose    
2.  Compare  and  contrast  common  computer  connector  types  
3.  Iden9fy  the  purpose  of  internal  computer  components  
Security
1.  Define  basic  security  threats  
2.  Security  best  prac9ces  
3.  Web-­‐browsing  best  prac9ces    
Networking
1.  Set  up  and  configure  a  basic  SOHO  router  (wired  /  wireless)    
2.  Compare  and  contrast  cellular,  wireless  and  wired  data  connec9ons    
3.  Compare  and  contrast  different  methods  of  sharing  and  storage  
Basic  IT  literacy  
1.  Perform  appropriate  steps  to  set  up  a  basic  worksta9on  
2.  Explain  the  basic  methods  of  naviga9ng  an  opera9ng  system  
3.  Given  a  scenario,  implement  basic  support  concepts  
4.  Explain  basic  backup  concepts  
5.  Describe  the  importance  and  impact  of  various  environmental  and  
safety  concepts  
What  can  you  expect?
•  This  course  will  consist  of  my  lecture  /  discussions  on  the  various  
topics  
•  Corresponding  PowerPoints  /  Screen  Shots  
•  Demos  for  some  of  the  topics  
Ready?
•  So  if  you’re  ready  lets  get  started  on  our  first  Objec9ve  Topic,  
SoFware  

                 *  
IT  Fundamentals
FC0-­‐U51  
So1ware
1.  Compare  and  contrast  common  Opera9ng  Systems  and  their  
func9ons  and  features  
2.  Iden9fy  common  programs,  applica9ons  and  their  purpose    
3.  SoFware  management  best  prac9ces    
4.  Iden9fy  some  alterna9ve  technologies  and  their  purpose  
5.  Explain  the  basic  soFware  features  and  func9ons  of  wireless  
devices    
1. Compare  and  contrast  common  OperaFng  
Systems  and  their  funcFons  and  features
•  Types  
•  SoFware  compa9bility  for  different  OS  types  and  versions  
•  Awareness  of  hardware  compa9bility  for  OS  support  
•  Basic  func9ons  of  an  opera9ng  system    
Types
•  Mobile    
•  Apple  iOS  
•  Apple  Corp,  Clean  &  Simple  Design,  Most  Popular,  Proprietary  
•  Android  
•  Google  Corp,  More  flexible  than  Apple  iOS  
•  Windows  Phone    
•  MicrosoF  Corp,  Just  like  Windows  8  for  a  PC,  Tiles  to  touch,  Simple  Design,  Proprietary  
•  Blackberry  
•  Blackberry  Corp,  Originally  for  enterprises,  Email,  Web  Browsing,  Instant  Messaging  
Mobile  Types
•  Let’s  take  a  look  at  some  emulators  to  see  the  differences  of  the  
Mobile  Types  we  just  men9oned  

•  Just  an  emulator  so  we  don’t  get  full  func9onality  –  just  a  way  for  us  
to  be  familiar  with  what  they  look  like  and  may  behave  
Types
•  Worksta9on  
•  Windows  
•  Most  Popular,  PCs,  (XP,  Vista,  Win7,  Win8,  Server  03,  Server  08,  Server  2012)  
•  Mac  
•  A  lot  like  Apple’s  iOS,  Simple  but  affec9ve  design  
•  Linux    
•  Open  source  OS,  Most  distros  are  free,  gaining  ground  (Fedora,  Red  Hat,  Mint,  Kali,  Ubuntu)  
•  Chrome  OS  
•  Simple,  Web  Based,  Light  Weight  as  far  as  resources,  Need  to  have  Internet/Network  
connec9on  
WorkstaFon  Types
•  Let’s  take  a  look  at  these  Worksta9on  types  and  the  Opera9ng  
Systems  they  use  

•  Will  be  using  virtual  machines  for  this  demo  


Open  Source  Vs.  Commercial
•  Open  Source  
•  Usually  free  
•  Less  Support  
•  Less  technical  documenta9on  
•  Can  be  modified  to  conform  to  your  specific  needs  
•  Commercial  
•  Not  free  –  need  to  make  sure  you  follow  licenses  agreements  
•  Standardized  support  
•  Usually  good/decent  technical  documenta9on  
•  Not  usually  modified  to  meet  specific  needs  
So1ware  compaFbility  for  different  OS  types  
and  versions
•  Have  to  make  sure  you  have  the  right  soFware  for  the  Opera9ng  
System  you  are  using  
•  Windows  cannot  run  on  Mac  OS,  vice  versa  for  example  
•  New  versions  of  soFware  may  not  be  able  to  run  on  older  OSs  
Awareness  of  hardware  compaFbility  for  OS  
support  
•  32  bit  versus  64  bit  Opera9ng  Systems  

•  If  you  have  a  64  bit  program/applica9on  you  have  to  install  it  on  a  64  bit  
computer  

•  If  you  have  a  32  bit  program/applica9on  you  can  install  it  on  a  32  bit  OR  64  
bit  computer  

•  64  -­‐>  64  
•  32  -­‐>  32  or  64  
Basic  funcFons  of  an  operaFng  system
•  Interface  between  user  and  machine  
•  So  you  can  “see”  what  you  are  doing,  not    just  command  line  
•  Coordina9on  of  hardware  components    
•  Drivers  play  an  important  role  here  too  
•  Provides  environment  for  soFware  to  func9on  
•  Apps  can’t  func9on  alone,  need  a  “mom”  
•  Monitors  system  health  and  func9onality  
•  Usage,  RAM,  CPU,  Drivers,  Heat,  etc…  
•  Displays  structure  /  directories  for  data  management  
•  File  managers  
Coming  up
•  That  was  a  good  talk  on  Opera9ng  Systems  –  important  because  
everything  we  do  will  stem  from  our  OS  

•  Next  we  are  going  to  talk  about  some  Common  programs,  applica9ons  and  
their  purposes  

                     *  
2.  IdenFfy  common  programs,  applicaFons  
and  their  purpose
•  Types  
•  Plaoorms  
•  Common  file  types  
Types
•  Produc9vity  SoFware  
•  Collabora9on  SoFware  
•  U9lity  SoFware  
•  Specialized  SoFware  
ProducFvity  So1ware
•  Word  processing  
•  MS  Word,  OpenOffice  and  LibreOffice  Writer,  MS  WordPad,  notepad++  
•  Spreadsheet  soFware  
•  MS  Excel,  OpenOffice  and  LibreOffice  Calc  
•  Email  soFware  
•  Outlook,  Outlook  express,  Thunderbird,  Apple  Mail  
•  Basic  database  soFware  
•  MS  Access,  SQL  Express,  OpenOffice  and  LibreOffice  Base  
ProducFvity  So1ware
•  PDF  viewers/creators  
•  Portable  Document  File,  Adobe  Professional,  Nitro  PDF  
•  Presenta9on  soFware    
•  MS  PowerPoint,  Open  Office  and  LibreOffice  Impress  
•  Desktop  publishing  soFware  
•  Adobe  InDesign,  Corel  Draw,  MS  Publisher  
•  Personal  Informa9on  Manager  
•  Address  books,  Calendars,  Evernote  
•  Remote  desktop  soFware  
•  Team  Viewer,  VNC  (virtual  network  compu9ng),  Windows  Remote  Desktop  
CollaboraFon  So1ware
•  Online  workspace  
•  MS  SharePoint,  Google  Groups  
•  Document  storage/sharing  
•  MS  SharePoint,  Drop  Box,  MS  OneDrive,  Google  Drive  
•  Screen  sharing  soFware    
•  Team  Viewer,  VNC,  Lync  Mee9ng,  AnyMee9ng,  Join.me,  Skype  
CollaboraFon  So1ware
•  Video  conferencing  soFware  
•  Cisco  WebEx,  Adobe  Connect,  Any  Mee9ng,  MS  Lync,  NetMee9ng  
•  Instant  messaging  soFware  
•  MS  Lync,  Skype,  Trillian,  Pidgin,  Steam,  Xfire  
•  Email  soFware  
•  Outlook,  Thunderbird  
UFlity  So1ware
•  An9-­‐malware  
•   Malwarebytes,  EmsisoF  An9-­‐Malware,  MS  Malicious  SoFware  Removal  Tool  
•  SoFware  firewalls  
•  ZoneAlarm,  Comodo,  OS  Firewall  (Windows,  Linux)  
•  Diagnos9c/maintenance  soFware  
•  Task  Manager,  Windows  Ac9on  Center,  CCleaner,  AppCleaner  
•  Compression  soFware  
•  Winzip,  Winrar,  7zip,  gzip,    
Specialized  So1ware  
•  POS  (Point  of  Sale)  
•  CAD  
•  AutoCad  
•  Graphic  design  
•  Adobe  Illustrator  
•  Medical    
•  Scien9fic    
•  Financial    
•  Gaming    
•  Entertainment    
PlaSorms
•  Mobile  
•  Runs  on  our  tablets  or  phones  
•  Interface  is  different  usually  
•  Desktop  
•  Full  version  of  an  applica9on  
•  Most  powerful  
•  Web-­‐Based  
•  Chrome  OS  
•  Runs  from  the  Web  
Common  File  Types
•  Documents  
•  Audio  
•  Images  
•  Video  
•  Executables  
•  Compression  Formats  
Documents
•  Txt  
•  Text  file,  vanilla/plain  
•  Ro  
•  Rich  Text  file,  some  formatng  but  nothing  super  fancy  
•  doc/docx  
•  Document,  heavy  formatng,    (***x  -­‐>  2010  versions  higher  in  Office)  
•  xls/xlsx  
•  Spreadsheet  
•  ppt/pptx    
•  PowerPoint  
•  PDF  
•  Portable  Document  Format  
Audio
•  Mp3  
•  MPEG  Audio  Layer  III,  Smaller  file  size,  some  lossless,  compressed  
•  Wav  
•  WAVeform  audio  format,  Larger  file  size,  no  lossless,  not  compressed  
•  Flac  
•   Free  Lossless  Audio  Codec,  no  lossless,  compressed  
•  AAC  
•  Advanced  Audio  Coding,  Successor  to  the  MP3,    
•  M4A  
•  The  file  extension  for  ACC  files  
Images
•  JPG/JPEG  
•   Joint  Photographic  Experts  Group,  compressed,  16.7  million  colors  
•  gif    
•  Graphics  Interchange  Format,  not  compressed,  portable,  larger  file  size  
usually,  supports  anima9on,  256  colors  
•  9ff  
•  Tagged  Image  File  Format,  good  for  raster  images,  Adobe  product  now,  1992  
last  update  
Images
•  PNG  
•  Portable  Network  Graphics,  successor  of  the  GIF,  Lossless  and  compressed  for  
web  traffic  
•  BMP  
•  bitmap  image  file,  Windows  usually  for  raster  images  

•  Let’s  jump  over  to  MSPaint  and  look  at  these  raster  images  real  quick  
Video
•  MPG  
•   Standard  for  lossy  compression  of  video  and  audio,  where  MP3  derived  from  
•  MP4  
•  MPEG-­‐4  Part  14,  stores  audio  and  video,  very  popular  
•  FLV  
•  Flash  Video,  Video  over  the  Internet  using  Adobe  Flash  Player,  Hulu,  Youtube  
Video
•  WMV  
•  Windows  Media  Video,  MS  product,  used  now  in  Blue  Ray  and  HD  DVD  
•  AVI  
•  Audio  Video  Interleaved,  MS  Product,    
usually  larger  file  sizes,  not  always  
compa9ble  with  video  players  
Executables
•  Exe  
•  Default/de  facto  executable  file  exens9on  
•  Msi  
•  MicrosoF  Installer,  Windows  Installer  now  
•  App  
•  Applica9on  program  for  Mac  OS  X,  runs  when  double-­‐clicked,  similar  to  
a  .EXE  file  in  Windows  
Executables
•  Bat  
•  Batch  File,  can  write  simple  programs  to  execute,  write  scripts,  can  run  them  
by  double  clicking  
•  scexe  
•  HP  Releases  self-­‐extrac9ng  firmware  
update  files  for  Linux  as  .scexe  files  
Compression  Formats
•  RAR  
•  Na9ve  format  of  WinRAR  archiver  
•  TAR  
•  UNIX  file  type,  derived  from  tape  backups  
•  ZIP  
•  Archive  file  format  that  supports  lossless  data  compression  
•  DMG    
•  Apple  Disk  Images,  mount  to  use  them  in  Finder  
Compression  Formats
•  ISO    (might  see  .img)  
•  Sector-­‐by-­‐sector  copy  of  the  data  on  an  op9cal  disc,  stored  inside  a  binary  file  
•  7zip  /  7z    
•  An  open  source  file  archiver,  Used  to  compress/decompress  files  
•  gzip  /  gz    
•  Now  part  of  the  GNU  program,  usually  see  in  Linux  though  can  work  cross  
plaoorm  
•  jar  
•  Package  file  format  typically  used  to  aggregate  many  Java  class  files  and  
associated  metadata  and  resources  (text,  images,  etc.)  into  one  file  to  
distribute  applica9on  soFware  or  libraries  on  the  Java  plaoorm  
Coming  up
•  Shew!!    Lots  of  file  types  to  remember,  but  they  are  important.    You  
will  see  them  everyday  in  your  IT  career.  

•  Next  we  are  going  to  discuss  SoFware  Management  Best  Prac9ces  
3.  Given  a  scenario,  use  so1ware  
management  best  pracFces
•  Install  /  uninstall  
•  Patching  /  updates  for  OS,  drivers,  applica9ons  and  security  soFware  
•  SoFware  version  iden9fica9on  and  compa9bility  
•  Licensing  
Install  /  Uninstall
•  OS  features  
•  Can  add/remove  features  “bells  and  whistles”  of  the  opera9ng  system  
•  Applica9ons  
•  Download  or  get  from  the  store,  but  we  always  install  applica9ons  to  “do”  
stuff  on  our  computers,  phones  or  tablets  
•  Drivers  
•  Need  these  guys  so  the  hardware  they  support  talk  to  the  opera9ng  system  
correctly.    This  way  we  get  the  most  out  of  our  hardware  
•  Always  get  from  original  vendor,  get  signed  drivers  if  possible  
Install  /  Uninstall
•  Let’s  jump  over  to  another  machine  and  take  a  look  at  some  of  these  
things  we  just  covered.  

•  OS  Features;  Applica9ons;  Drivers  


Patching  /  updates  for  OS,  drivers,  
applicaFons  and  security  so1ware  
•  Scheduling  
•  Put  your  updates  on  an  automa9c  schedule  
•  Frequency  
•  For  our  schedule  we  can  look  for  updates  weekly,  monthly,  quarterly,  etc…  
•  Automa9c  updates  
•  Turn  them  on!    Allows  updates  to  be  download  and  installed  so  you  don’t  
have  to  mess  with  them.    Great  for  home  and/or  small  business  owners.  
So1ware  version  idenFficaFon  and  
compaFbility  
•  It  is  very  important  for  you  to  know  what  version  of  OS,  applica9ons  
and  hardware  you  have  for  your  system  
•  You  don’t  want  to  purchase  a  $1000  applica9on  for  example  to  find  
out  it  doesn’t  work  
•  Most  soFware  that  is  opened,  is  not  able  to  be  returned  

•  Do  you  have  32bit  or  64bit?    Windows?    Mac?    Linux?    Does  the  
soFware  work  cross  plaoorm?      XP?    Vista?    Win7?    Older  Linux  
version?    Etc…  
Licensing  
•  Very  important  for  you  to  make  sure  you  are  following  licensing  
agreements  and  you  are  staying  lega  

•  Product  keys  
•  Will  be  provided  to  purchasers  to  verify  the  soFware  is  legit  to  the  vendor.  
Usually  on  the  packaging  somewhere  or  emailed  to  the  registra9on  email  if  
web  based  purchase  
•  Single  /  mul9-­‐license    
•  How  many  computers  are  you  installing  this  on?    Do  you  need  more  than  
one?  
4.  IdenFfy  the  following  alternaFve  
technologies  and  their  purpose  
•  Virtualiza9on    
•  Cloud  Compu9ng    
•  Web  applica9ons    
•  VoIP    
•  Telepresence    
•  Gesture-­‐based  interac9on    
VirtualizaFon
•  Physical  machine  vs.  virtual  machine    
•  Physical  machine  
•  Right  in  front  of  me,  I  can  touch  it  
•  Virtual  Machine  
•  SoFware  on  my  “physical  machine”  called  a  Host  
•  2  types  of  VMs  
•  Type  1  
•  Doesn’t  need  opera9ng  system  to  run  –  directly  on  the  hardware  
•  Popular  on  server  systems  like  esxi  Server  and  Hyper-­‐V  server  
•  Type  2  
•  Needs  an  opera9ng  system  to  talk  to  the  hardware  
•  Very  popular  for  desktops/laptops    (what  I  am  using  for  our  demos)  
Cloud  CompuFng
•  Everything  is  hosted  in  the  “cloud”  (on  the  internet,  somewhere)  
•  A  cloud  service  model  is  a  set  of  IT-­‐related  services  offered  by  a  cloud  
provider  
•  Provider  is  responsible  for  supplying  cloud-­‐based  IT  resources  to  a  
cloud  consumer  under  a  service  agreement  (SLA)  
•  Think  of  it  like,  the  cloud  consumer  is  buying  or  leasing  their  IT  
infrastructure  from  the  cloud  provider  
•  Office  365  is  a  popular  cloud  compu9ng  plaoorm  
Web  ApplicaFons
•  Web  based  programs  

•  Web  2.0  

•  Can  interact  with  the  Opera9ng  System  (ac9ve  X  controls)  


•  Java  is  a  great  example  of  a  Web  Applica9on  
VOIP
•  Voice  over  Internet  Protocol    (Voice  over  IP)  
•  A  technology  that  uses  the  Internet  rather  than  a  public  switched  
telephone  network  to  deliver  telephone  services  
Telepresence
•  Telecommu9ng  is  becoming  more  and  more  popular  
•  Cost  saving  to  the  company  
•  It  can  also  save  employees  money  because  they  don’t  have  to  travel  
from  home  to  an  office  every  day  and  the  reduced  reliance  on  
transporta9on  systems  
•  Telecommu9ng  can  also  increase  worker  sa9sfac9on,  leading  to  a  
lower  a|ri9on  rate  
Gesture-­‐Based  InteracFon
•  Swiping  
•  Taking  your  finger  or  fingers  and  swiping  across  a  screen  
•  Makes  menus  appear,  other  screens  appear,  unlocks  the  system,  moves  items  
•  Pinch-­‐to-­‐zoom    
•  Two  fingers  to  zoom  in  or  out  on  a  touch  screen  
•  Kine9cs    
•  Allowing  us  to  control  systems  by  moving  body  parts  
•  Think  like  MS  Kinect  for  Xbox  
IT  Fundamentals
FC0-­‐U51  
Hardware
1.  Iden9fy  basic  wired  and  wireless  peripherals  and  their  purpose  
2.  Compare  and  contrast  common  computer  connector  types    
3.  Iden9fy  the  purpose  of  internal  computer  components    
1.  IdenFfy  basic  wired  and  wireless  
peripherals  and  their  purpose  
•  Output  devices    
•  Input  devices    
•  Input  &  Output  devices    
Output  Devices
•  Printers  
•  Display  Devices  
•  Speakers  
Printers
Laser  Printer
•  Toner  and  drummer  with  lasers  
Inkjet  
 
•  Small  dots  shot  onto  the  paper  
 
Thermal  
 
•  Burning  special  paper  
 
Display  devices  
Flatscreen
 
•  Thin,  light  weight,  portable,  be|er  picture    
CRT  
 
•  Cathode-­‐Ray  Tube,  Heavy,  burn  in,  glare,  
power  hog  
 
Projector

•  Good  for  large  screens,  bulbs  expensive,  


doesn’t  last  as  long  
 
Speakers
 
•  Allow  you  to  hear  audio    
Input  Devices
•  Keyboard  
•  Poin9ng  Devices  
•  Scanner    
•  Microphone    
•  Webcam  
Keyboard  
PoinFng  devices  
Mouse
•  Can  be  op9cal  or  mechanical  
•  2,  3,  4  mul9  bu|on  
Touchpad
•  You  touch  the  pad  to  make  the  cursor  
move  
•  Some  you  can  zoom  like  a  on  the  phones  
or  tablets  
•  Some  you  can  scroll  on  the  right  edge  

•  Can  disable  them  if  necessary  


JoysFck
•  S9ck  to  control  the  cursor  on  the  screen  
•  Used  mainly  for  gaming  and  not  everyday  
use  for  produc9vity  as  an  example  
Stylus  pen  
•  Use  directly  on  the  screen  
•  Can  use  to  notate  items  
•  Can  use  as  a  mouse  
Trackball
•  Imagine  a  sta9onary  mouse  
•  Only  the  ball  moves  
•  Roll  with  your  thumb  usually  to  move  the  
cursor  around  the  screen  
Scanner
•  Used  to  scan  or  copy  documents  into  the  
computer  
•  Can  scan  pictures  into  a  computer  
•  Can  be  used  to  copy  documents  
 
Microphone
•  Allows  your  voice  to  be  interpreted  by  
the  computer  
•  Can  communicate  with  the  device  
•  Can  communicate  with  others  through  
soFware  
Webcam
•  Allows  you  to  display  yourself  on  
someone  else’s  computer  screen  
•  Good  for  online  mee9ngs  (online  
presence)  
•  Good  for  telecommu9ng  
•  Online  da9ng  sites  
•  Instant  Messaging  
•  Skype  
Input  &  Output  devices  
•  Fax  
•  External  storage  devices    
•  Touchscreen  display    
•  Headsets  with  microphone  
Fax
Facsimiles    
Allows  you  to  send  and/or  receive  messages  
that  are  printed  out  like  a  printer  
Have  modems  built  in  to  receive  and  send  
the  messages  
 
External  Storage  Devices
Thumb  Drive
•  Great  portable  storage  for  every  day  use  
•  Various  sizes  from  1Gb  –  256Gb  
•  Can  install  programs  from  
•  Transport  files  
•  Install  opera9ng  systems  
External  hard  drive  
•  Like  a  thumb  drive  but  much  more  
capacity  
•  Require  power  to  work  unlike  a  thumb  
drive  
•  Can  be  used  for  backup  purposes  
•  File  archiving  
•  Transpor9ng  large  files  
CD/DVD/Blu-­‐Ray  
•  Once  very  popular  for  the  amount  of  data  
they  could  hold  
•  Now  thumb  drives  and  external  hard  
drives  are  used  more  

•  CD  –  700  Mb  
•  DVD  –  4.7  to  9.4  Gb  
•  Blueray  –  25  to  128  Gb  depending  on  
technology  
Network  Aaached  
Storage  
•  A  dedicated  system  just  for  storage  on  a  
network  
•  Popular  in  homes  with  enthusiast  and  
SOHO  setngs  
•  Can  be  used  in  enterprise  setngs  as  part  
of  a  SAN,  Storage  Area  Network  
Memory  card  
•  Typically  used  in  devices  that  require  
storage  like  a  digital  camera,  camcorder,  
drones,  cell  phones  and  tablets  
•  Used  to  expand  the  memory  is  some  
cases  
•  Many  different  types  and  flavors  of  the  
cards  
•  SD  cards  are  probably  the  favorite  today  
•  Need  a  special  hardware  device  to  read  
the  contents  of  the  card  outside  of  the  
device  that  originally  used  the  card  
Mobile  media  players  
•  Allow  you  to  take  the  media  with  you  and  
listen  and/or  watch  on  the  go  
 
Smart  phone  
•  They  are  star9ng  to  do  it  all  
•  Can  be  your  “calling  device”  but  much,  
much  more  
•  Can  act  as  a  mobile  media  player  
•  Can  save  informa9on  to  your  device  
•  Can  pull  informa9on  from  your  device  
Touchscreen  display  
•  True  interac9on  with  the  computer  or  
system  
•  See  these  all  over  
•  Can  be  a  stand  alone  device  like  a  PC  
•  Can  be  a  television  device  
•  Kiosks  are  popular  with  this  technology  
Coming  Up
•  Next  we  are  going  to  switch  gears  a  li|le  and  move  towards  talking  
about  connector  types  you  need  to  be  familiar  with  for  the  exam  

                     *  
2.  Compare  and  contrast  common  computer  
connector  types  
•  Video     •  Parallel    
•  FireWire     •  Serial    
•  eSATA     •  RJ-­‐45    
•  Thunderbolt     •  RJ-­‐11    
•  USB     •  Audio    
•  PS/2     •  Power    
Video  connector  types
VGA
•  Video  Graphics  Array  
•  Refers  to  only  640x480  pixels  officially  
•  16  or  256  colors  
•  Extremely  common  s9ll  
DVI
Digital  Visual  Interface  
Compa9ble  with  older  VGA  
HDMI
•  High  Defini9on  Mul9media  Interface  
•  Can  carry  video  and  audio  
•  De  facto  for  Digital  entertainment  
Display  Port
•  The  interface  is  primarily  used  to  connect  
a  video  source  to  a  display  device  such  as  
a  computer  monitor  
•  Can  also  be  used  to  carry  audio  and  other  
forms  of  data  
Mini  Display  Port
•  Delivers  a  pure  digital  connec9on  to  
external  displays  
•  It  gives  you  plug-­‐and-­‐play  performance  
with  the  Apple  LED  Cinema  Display  
•  Works  with  single-­‐link  DVI,  dual-­‐link  DVI,  
and  VGA  displays  with  the  appropriate  
adapters  
USB
•  Universal  Serial  Bus  
•  Amazing  li|le  connector  
•  Can  care  audio,  video,  power,  data  
 
S-­‐Video
•  Separate  video  
•  Be|er  than  composite  video  
•  Not  as  good  as  component  video  
•  On  video  
Component  -­‐  RGB
•  Component  –  Red  Green  Blue  
•  split  into  two  or  more  component  
channels  
•  Be|er  quality  
•  Only  video  
FireWire
•  Popular  by  Apple  
•  IEEE  1394    
•  Standard  for  a  serial  bus  for  high-­‐speed  
communica9ons  and  isochronous  real-­‐
9me  data  transfer  
eSATA
•  External  SATA  
•  External  Serial  Advanced  Technology  
A|achment  
•  Standard  technology  for  connec9ng  a  
hard  drive  or  SSD  to  the  rest  of  the  
computer.    
•  IDE:  Integrated  Drive  Electronics  is  the  
older  standard  that  SATA  replaced  
•  Needs  it’s  own  power  connector  to  work  
properly  
Thunderbolt
•  Extremely  fast  connec9ons  
•  Thunderbolt  2  gives  you  two  channels  on  
the  same  connector  with  10Gb/s  of  
throughput  in  both  direc9ons  
•  20Gb  of  throughput!!  
•  USB  2.0  gives  about  500  Mb  
•  USB  3.0  gives  about  5  Gb  
•  Firewire  gives  800  Mb  
PS/2
•  A  6-­‐pin  mini-­‐DIN  connector  used  for  
connec9ng  some  keyboards  and  mice  to  
a  PC  compa9ble  computer  system  
•  Being  replaced  (if  not  already)  by  USB  
connec9ons  
Parallel
May  be  referred  to  as  the  printer  cable  or  
printer  port  
Was  the  de  facto  for  many  years  for  printer  
connec9ons  
Two  way  street  for  data  
Being  (has  been)  replaced  by  the  USB  
connec9ons  
Serial
•  A  serial  communica9on  physical  interface  
through  which  informa9on  transfers  in  or  
out  one  bit  at  a  9me  
•  Replaced  by  the  USB  Connec9ons  
RJ-­‐45
•  Standard  connector  for  Cat3  through  Cat  
6  networking  cable  
•  RJ-­‐45  is  NOT  the  descriptor  for  the  cable,  
it  is  for  the  connec9on  type  
•  8  connectors  for  the  wires  internally  to  
pass  data  and/or  voice  traffic  
RJ-­‐11
•  Standard  for  the  POTS,  Plain  old  
telephone  systems  
•  Not  the  descriptor  for  the  cable,  but  for  
the  connec9on  type  
•  4  wires  connectors  for  the  wires  
internally  
•  Can  pass  data  and  voice  traffic  
Audio
•  Carries  the  audio  signals  for  the  video  
being  shown  
•  Can  carry  just  audio  from  a  mobile  media  
device  to  your  vehicle  
•  Can  carry  audio  from  a  mobile  media  
device  to  an  external  speaker  or  amplifier  
•  Carries  signal  from  a  device,  CD/DVD  
player  to  an  amplifier  or  television  set  
Power
•  Quite  simply  it  carries  the  power  to  your  
computer,  monitor  or  peripheral  device  
like  a  printer  or  fax  
•  Carries  AC  current  to  power  the  device  
•  US  is  120V  
•  EU  is  usually  220V  –  Be  careful!  
•  Could  carry  power  to  the  internal  
components  of  your  system  –  the  hard  
drives  or  CD/DVD  drives  
Coming  Up
•  Next  we  are  going  to  take  a  look  at  some  of  the  internal  hardware  
components  of  a  system  like  the  CPU  and  Hard  drives  
3.  IdenFfy  the  purpose  of  internal  computer  
components  
•  CPU    
•  Power  Supply    
•  RAM    
•  Storage  
•  Expansion  cards  
•  Motherboard/mainboard    
•  System  cooling  
CPU
•  Central  Processing  Unit  
•  Some9mes  called  the  brains  of  the  
computer  
•  Nothing  more  than  a  very  powerful  
switching  mechanism  
•  Capable  of  doing  millions  of  things  at  
once  
•  Works  on  binary,  1  and  0,  on  and  off,  
highs  and  lows  
•  Intel  or  AMD  these  days  
•  Many  different  types  and  designs  
Power  Supply
•  Simply  supplies  power  to  you  computer  
and  the  devices  within  
•  US  –  120V  
•  EU  –  220V  –  Be  Careful!!  
RAM  
•  Random  Access  Memory  
•  Lots  of  op9ons  here  but  some  more  
common  ones  are  DIMMs  and  SODIMMs  
•  Dual  inline  memory  modules  (DIMMs),  
used  in  desktop  PCs  
•  Small-­‐outline  dual  inline  memory  
modules  (SODIMMs),  used  in  portable  
PCs  
Storage
OpFcal  drive  
•  Read/Writes  to  CD/DVD  and/or  BlueRay  
discs  
 
•  CD  –  700  Mb  
•  DVD  –  4.7  to  9.4  Gb  
•  Blueray  –  25  to  128  Gb  depending  on  
technology  
 
Hard  drive  
•  Internal  to  the  computer  
•  Where  all  the  data  is  stored  for  later  use  
•  Where  the  opera9ng  system  is  stored  
•  Where  the  computer  looks  for  
instruc9ons  upon  boo9ng  
•  Sealed  stack  of  metal  pla|ers  
•  Each  with  a  read-­‐write  head  on  a  
retractable  arm  that  reads  data  from  and  
writes  data  to  the  pla|ers  by  magne9zing  
bits  of  iron  oxide  par9cles  on  the  pla|ers  
in  pa|erns  of  posi9ve  and  nega9ve  
polarity  
Solid  state  drive  
•  Sta9c  RAM  
•  Nonvola9le  Flash  RAM  
•  No  moving  parts  
•  Extremely  fast  and  efficient  
 
Expansion  Cards
Video  Card
•  Allows  the  graphics  to  be  displayed  on  a  
monitor  
•  Can  increase  overall  performance  and  
resolu9on  depending  on  the  card  you  get  
•  More  expensive  cards  have  more  bells  
and  whistles  and  more  on  board  RAM  
 
Audio  Card
If  you  require  higher  end  audio  you  can  
invest  in  an  Audio  expansion  card  
Can  support  other  peripherals  like  sound  
boards,  music  instruments,  etc…  
If  not  required,  you  can  use  the  on  board  
audio  most  mother  boards  come  with  
Network  Card
•  If  your  system  requires  mul9ple  network  
cards  for  network  communica9ons  
•  Most  mother  boards  have  on  board  
network  cards  that  are  good  enough  for  
everyday  use  
•  Network  cards  allow  the  communica9on  
to  the  network  and  possibly  out  to  the  
Internet  
Modem
•  Modulator  –  Demodulator  
•  Takes  the  signals  and  converts  them  for  
use  by  a  computer  
•  Used  over  the  telephone  lines  
•  You  might  hear  one  screech  when  using  a  
fax  machine  
•  Not  regularly  used  in  todays  systems  
because  it  is  an  “older”  technology  
compared  to  network  cards;  it  is  slower  
than  network  cards  as  well  
•  Measured  by  BAUD  Rate  compared  to  the  
MB/GB  on  network  cards  
Motherboard  or  
Mainboard  
Where  it  all  comes  together  
All  internal  components  pass  through  or  are  
connected  to  the  mother  board  
Holds  it  all  together  –  the  traffic  cop  of  the  
system  (Hardware  wise  anyway)  
Depending  on  the  mother  board  will  depend  
on  what  type  of  CPU  (processor)  you  can  
have  –  choose  wisely  
 
 
I  want  to  take  a  closer  look  at  a  mother  
board  on  the  next  slide  –  important  for  you  
to  understand  and  know  what’s  going  on  
System  Cooling
Case  Fans
•  Fans  that  are  a|ached  to  the  case  
•  Keep  a  good  flow  of  fresh,  cooler,  air  
flowing  throughout  the  case  internally  
•  Heat  is  BAD  for  computer  components  so  
a  good  air  flow  is  essen9al  
CPU  Fans
•  These  are  fans  directly  on  top  of  or  
beside  the  CPU  
•  ESSENTIAL!  
•  Do  not  run  a  desktop  computer  without  a  
CPU  fan  and  heat  fins  
•  This  is  designed  to  pull  heat  off  of  the  
CPU  so  it  doesn’t  damage  the  processor  
•  If  the  CPU  Fan  goes  out  –  the  computer  
has  built  in  safety  that  will  (or  should)  
shut  off  the  computer  before  any  real  
damage  is  done  
Liquid  Cooling
•  Next  genera9on  of  cooling  for  our  
systems  
•  Very  efficient  and  does  a  great  job  in  
keeping  a  system  cooler  
•  Liquid  is  actually  moving  through  the  
system  in  9ny  tubes  that  draw  the  heat  
away  from  the  cri9cal  components  
•  Hope  you  don’t  ever  have  a  leak  though  –  
liquid  and  computer  components  don’t  
mixed  well.      J  
Wrap  it  Up
•  That  does  it  for  Domain  2,  Hardware  
•  We  looked  at  a  ton  of  topics  that  will  be  necessary  for  us  to  know  
come  test  9me.  
•  Sec9ons  we  covered  were:  
•  Iden9fy  basic  wired  and  wireless  peripherals  and  their  purpose  
•  Compare  and  contrast  common  computer  connector  types    
•  Iden9fy  the  purpose  of  internal  computer  components    

•  Now  that  we  have  hardware  under  our  belts  we  can  move  forward  
with  the  next  Domain  
IT  Fundamentals
FC0-­‐U51  
3.  Security
1.  Define  basic  security  threats    
2.  Use  security  best  prac9ces    
3.  Use  web-­‐browsing  best  prac9ces    
Security  Terminology
•  Vulnerability  
•  A  weakness  in  your  system  or  infrastructure  
•  Exploit  
•  Item  that  will  take  advantage  of  your  weakness;  what  is  used  in  the  a|ack  
•  Threat  
•  Person  or  thing  that  is  doing  the  a|acking;  User  of  the  exploit  
Define  basic  security  threats  
•  Malware    
•  Phishing    
•  Social  engineering    
•  Spam    
•  Password  cracking    
•  Physical  security    
Malware
Viruses
•  A  virus  is  a  self  replica9ng  program  that  produces  its  own  code  by  
a|aching  copies  of  it  into  other  executable  codes.    
•  This  virus  operates  without  the  knowledge  or  desire  of  the  user.    
•  Like  a  real  virus,  a  computer  virus  is  contagious  and  can  contaminate  
other  files.    
•  Viruses  can  infect  outside  machines  only  with  the  assistance  of  computer  
users.  
Why  are  Viruses  created?
•  Inflict  damage  to  compe9tors  
•  Research  projects  
•  Pranks  
•  Vandalism  
•  A|ack  the  products  o  f  specific  companies  
•  Distribute  poli9cal  messages  
•  Financial  gain  
•  Iden9ty  theF  
•  Spyware  
How  do  you  know  if  you  have  Virus?
•  Programs  take  longer  to  load  
•  The  hard  drive  is  always  full,  even  without  installing  any  programs  
•  The  floppy  disk  drive  or  hard  drive  runs  when  it  is  not  being  used  
•  Unknown  files  keep  appearing  on  the  system  
•  The  keyboard  or  the  computer  emits  strange  or  beeping  sounds  
•  The  computer  monitor  displays  strange  graphics  
•  Filenames  turn  strange,  oFen  beyond  recogni9on  
•  The  hard  drive  becomes  inaccessible  when  trying  to  boot  from  the  floppy  
drive  
•  A  program's  size  keeps  changing  
•  The  memory  on  the  system  seems  to  be  in  use  and  the  system  slows  d  own  
How  do  you  get  one?
•  When  a  user  accepts  files  and  downloads  without  checking  properly  for  the  
source.  
•  A|ackers  usually  send  virus  -­‐  infected  files  as  email  a|achments  to  spread  
the  virus  on  The  vic9m  's  system.  If  the  vic9m  opens  the  mail,  the  virus  
automa9cally  infects  the  system.  
•  A|ackers  incorporate  viruses  in  popular  soFware  programs  and  upload  the  
infected  soFware  on  websites  intended  to  download  soFware.  When  the  
vic9m  downloads  infected  soFware  and  installs  it,  the  system  gets  
infected.  
•  Failing  to  install  new  versions  or  update  with  latest  patches  intended  to  fix  
the  known  bugs  may  expose  your  system  to  viruses.  
•  With  the  increasing  technology  ,  a|ackers  also  are  designing  new  viruses.  
Failing  to  use  latest  an9virus  applica9ons  may  expose  you  to  virus  a|acks  
Trojans
•  Trojan  is  defined  as  a  "malicious,  security  breaking  program  that  is  
disguised  as  something  benign."    
•  A  computer  Trojan  horse  is  used  to  enter  a  vic9m's  computer  
undetected,  gran9ng  the  a|acker  unrestricted  access  to  the  data  
stored  on  that  computer  and  causing  immense  damage  to  the  vic9m.  
Trojans
•  Trojan  horses  work  on  the  same  level  of  privileges  that  the  vic9m  
user  has.  
•  If  the  vic9m  had  the  privileges,  Trojan  can  delete  files,  transmit  informa9on,  
modify  exis9ng  files,  and  install  other  programs.    
•  The  Trojan  horse  can  a|empt  to  exploit  a  vulnerability  to  increase  the  
level  of  access  beyond  that  of  the  user  running  the  Trojan  horse.  
•  If  successful,  the  Trojan  horse  can  operate  with  increased  privileges  and  may  
install  other  malicious  codes  on  the  vic9m's  machine.  
Trojans  Purpose
•  Delete  or  replace  the  opera9ng  system's  cri9cal  files  
•  Generate  fake  traffic  to  create  DOS  a|acks  
•  Download  spyware,  adware,  and  malicious  files  
•  Record  screenshots,  and  audio  and  video  of  the  vic9m's  PC  
•  Steal  informa9on  such  as  passwords,  security  codes,  and  credit  card  informa9on  
using  keyloggers  
•  Disable  firewalls  and  an9virus  soFware  
•  Create  backdoors  to  gain  remote  access  
•  Infect  a  vic9m's  PC  as  a  proxy  server  for  relaying  a|acks  
•  Use  a  vic9m's  PC  as  a  botnet  to  perform  DDoS  a|acks  
•  Use  a  vic9m's  PC  for  spamming  and  blas9ng  email  messages  
How  do  you  know?
•  CD-­‐ROM  drawer  opens  and  closes  by  itself  
•  Computer  browser  is  redirected  to  unknown  pages  
•  Strange  chat  boxes  appear  on  target's  computer  
•  Documents  or  messages  are  printed  from  the  printer  
•  Func9ons  of  the  right  and  leF  mouse  bu|ons  are  reversed  
•  Abnormal  ac9vity  by  the  modem,  network  adapter,  or  hard  drive  
•  The  account  passwords  are  changed  or  unauthorized  access  
•  Strange  purchase  statements  appear  in  the  credit  card  bills  
•  The  ISP  complains  to  the  target  that  his  or  her  computer  is  IP  scanning  
How  did  you  get  a  Trojan?
•  Trojans  are  included  in  bundled  shareware  or  downloadable  soFware.  
When  a  user  downloads  those  files,  Trojans  are  installed  onto  the  systems  
automa9cally.  
•  Users  are  tricked  with  the  different  pop-­‐up  ads.  It  is  programmed  by  the  
a|acker  in  such  a  way  that  it  doesn't  ma|er  if  is  the  user  clicks  YES  or  NO;  
a  download  starts  and  the  Trojan  is  installed  onto  the  system  
automa9cally.  
•  A|ackers  send  Trojans  through  email  a|achments.  When  those  
a|achments  are  opened,  the  Trojan  is  installed  on  the  system.  
•  Users  are  some9mes  tempted  to  click  on  different  kinds  of  files  such  as  
gree9ng  cards,  porn  videos,  images,  etc.,  where  Trojans  are  silently  
installed  one  the  system.  
How  does  the  Trojan  get  in?
•  Many  different  ways  but  here  are  a  few  
•  Email  A|achments  
•  Instant  Messenger  
•  IRC  
•  Physical  Access  
•  Fake  programs/Freeware/Shareware  
•  Downloads  from  the  Internet  
Worms
•  A  worm  is  a  malicious  program  that  can  infect  both  local  and  remote  
machines.    
•  Worms  spread  automa9cally  by  infec9ng  system  aFer  system  in  a  
network  ,  and  even  spreading  further  to  other  networks.  
•  Worms  have  a  greater  poten9al  for  causing  damage  because  they  do  
not  rely  on  the  user's  ac9ons  for  execu9on.  
Spyware
•  Spyware  is  stealthy  computer  monitoring  soFware  that  allows  you  to  
secretly  ecord  all  ac9vi9es  of  a  computer  user.    
•  It  automa9cally  delivers  logs  to  you  via  email  or  FTP,  including  all  
areas  of  the  system  such  as  email  sent,  websites  visited  ,  every  
keystroke  ,  file  opera9ons  ,  and  online  chat  conversa9ons.    
•  It  also  takes  screenshots  at  set  intervals  ,  just  like  a  surveillance  
camera  directly  pointed  at  the  computer  monitor.    
•  Spyware  is  usually  bundled  as  a  hidden  component  of  freeware  or  
shareware  programs  that  can  be  downloaded  from  the  Internet.  
Types  of  Spyware
•  Desktop  Spyware  
•  Email  and  Internet  Spyware  
•  Child  Monitoring  Spyware  
•  Audio  Spyware  
•  USB  Spyware  
•  Telephone/Cellphone  Spyware  
•  GPS  Spyware  
•  Print  Spyware  
•  Video  Spyware  
•  Screen  Capturing  Spyware  
Ransomware
•  A|ackers  will  compromise  you  system  and  encrypt  files  holding  them  
ransom  
•  You  agree  to  pay  a  certain  amount  
and  they  will  give  the  encryp9on  
key  to  unlock  your  data  
Scareware
•  A|ackers  trick  you  into  downloading  and  installing  an  unneeded  
program  in  order  to  “protect”  yourself  
Social  Engineering
•  Social  engineering  refers  to  the  method  of  influencing  and  persuading  
people  to  reveal  sensi9ve  in  forma9on  in  order  to  perform  some  
malicious  ac9on.    
•  With  the  help  of  social  engineering  tricks,  a|ackers  can  obtain  
confiden9al  informa9on  ,  authoriza9on  details,  and  access  details  of  
people  by  deceiving  and  manipula9ng  them.  
Why  does  it  work?
•  Human  nature  of  trust  
•  Ignorance  of  Social  Engineering  
•  Threats  for  non-­‐compliance  of  requests  
•  Promise  something  for  nothing  
•  Targets  feel  a  sense  for  moral  obliga9on  
Phases  of  Social  Engineering
•  Research  on  Target  Company  
•  Select  a  vic9m  in  the  Target  Company  
•  Develop  a  rela9onship  
•  Exploit  the  rela9onship  
Type  of  Social  Engineering
•  Human  based  
•  Face  to  face,  dressing  as  legi9mate  person  
•  Computer  based  
•  Email,  IMs,  Chat,  Phishing    
•  Mobile  based  
•  Texts,  malicious  apps  
Phishing
•  A  social  engineering  technique  
•  Email  asking  you  to  click  on  a  link  to  
“update  your  informa9on”  
•  They  are  trying  to  trick  you  into  clicking  
on  a  link  and  providing  your  login  
informa9on  
•  Very  popular  aFer  a  cyber  a|ack  on  a  
par9cular  company  
 
Spam
•  Unwanted  or  solicited  emails  
•  Doesn’t  always  have  to  be  emails  
•  Can  spam  forums,  text  messaging,  instant  messaging  

•  Annoying  and  usually  ads  for  companies  or  products  


Password  Cracking
•  Password  cracking  is  the  process  of  recovering  passwords  from  the  
data  that  has  been  transmi|ed  by  a  computer  system  or  stored  in  it  
•  I  am  trying  to  “recover”  your  password  
•  Dic9onary  A|ack  
•  Brute  Force  A|ack  

•  Password  complexity  is  a  good  countermeasure  


Physical  Security
•  If  I  can  get  physical  access  to  it,  I  can  hack  it  
•  Access  control  is  a  cri9cal  part  of  physical  security.  
•  Physical  barriers  
•  The  objec9ve  of  a  physical  barrier  is  to  prevent  access  to  computers  and  network  
systems  
•  Mul/ple  Barrier  System    
•  Also  known  as  Defense  in  Depth  
•  Having  more  than  one  physical  barrier  to  cross    
•  Systems  should  have  a  minimum  of  three  physical  barriers  
Physical  Security
•  Mantraps  
•  require  visual  iden9fica9on,  as  well  as  authen9ca9on,  to  gain  access  
•  Video  Surveillance  
•  In  addi9on  to  armed  guards  can  enhance  your  security  
•  Fencing  
•  the  first  line  of  defense  in  your  security  model  
•  Access  List  
•  Specifically  iden9fy  who  may  or  may  not  enter  an  area  or  network  
Physical  Security
•  Proper  Ligh/ng  
•  Can  be  used  as  a  deterrent  or  to  provide  recogni9on  of  miscreants  
•  Signs  
•  Banners  or  warnings  about  unauthorized  entry  
•  Guards  
•  Can  be  an  expensive  method  of  protec9on  
•  Barricades  
•  Could  prevent  access,  best  when  combined  with  other  methods  
Physical  Security
•  Alarms  
•  Best  when  used  with  security  zones  
•  Mo/on  Detec/on  
•  Can  be  done  with  infrared,  microwave,  or  sonic  with  a  variety  of  sensors  
Shoulder  Surfing
•  Simply  looking  over  someone’s  shoulder  to  watch  their  screen,  
keystrokes  or  a  combina9on  of  the  two  

•  Protect  what  you  are  doing  and  make  sure  nobody  is  close  by  
Dumpster  Diving
•  Illegal  to  do  by  the  way  –  not  your  trash  to  be  going  through  

•  Going  through  someone  garbage  to  find  informa9on  


•  Tax  records,  bills,  invoices,  cancelled  checks,  etc…  
Coming  Up
•  Next  we  will  start  talking  about  security  best  prac9ces    

                     *  
Security  best  pracFces  
•  Password  management    
•  Device  hardening    
•  Open  WiFi  vs.  secure  WiFi    
•  Mul9factor  authen9ca9on    
•  Suspicious  emails    
•  Act  on  security  soFware  alerts    
•  Admin  vs.  user  vs.  guest  account    
Password  management  
•  Password  complexity    
•  3  of  4  
•  Change  default  passwords    
•  Password  confiden9ality    
•  Keep  it  secret  
•  Password  expira9on    
•  Don’t  allow  password  to  last  forever  
•  Password  reuse    
•  Don’t  allow  reuse  of  X  number  of  passwords  
•  Awareness  of  Single  Sign  On      
Device  hardening  
•  Disable  unused  features    
•  Disable  Bluetooth    
•  Disable  NFC    
•  Timeout  /  lock  op9ons    
•  Enable  security  soFware/features    
•  SoFware  firewall    
•  An9-­‐malware    
•  Encryp9on  op9ons    
Open  WiFi  vs.  secure  WiFi  
•  Do  we  want  it  “secure”  or  “unsecure”  

•  If  you  want  it  secure  we  want  to  make  sure  we  have  a  SSID  set  and  a  
“Key”  
MulFfactor  authenFcaFon  
•  Authen9ca9on  Factors  
•  Something  you  know  
•  Something  you  have  
•  Something  you  are  

•  Mul9factor  is  using  more  than  one  of  these  authen9ca9on  methods  
Suspicious  emails  
•  A|achments    
•  If  it’s  an  untrusted  user  –  DO  NOT  OPEN  THE  ATTACHMENT!  
•  Hyperlinks    
•  Untrusted  sender,  be  mindful  about  the  Hyperlink  
Act  on  security  so1ware  alerts  
•  If  you  computer  is  telling  you  something  –  pay  a|en9on  

•  Opera9ng  systems  will  also  tell  you  if  you  have  An9-­‐virus  installed  or  
not,  have  you  done  your  updates  lately,  etc…  
Admin  vs.  user  vs.  guest  account  
•  Admin  
•  Full  control  of  your  system  

•  User  
•  Can  run  programs  but  cannot  install/uninstall  

•  Guest  Account  
•  Disable!    Allows  guest  users  to  surf  the  web,  maybe  use  some  programs,  but  
not  much  access  
Coming  Up
•  Next  we  are  going  to  talk  about  web-­‐browsing  best  prac9ces  to  keep  
use  save,  protec9ng  our  iden9ty  and  sanity.    
Web-­‐browsing  best  pracFces  
•  Recognize  a  secure  connec9on/ •  Update  browsers  and  plugins    
website     •  Disable  unneeded/suspicious  
•  Recognize  invalid  cer9ficate   browser  plugins,  toolbars  and  
warnings     extensions    
•  Recognize  suspicious  links     •  Disable  autofill  forms/passwords    
•  Recognize  suspicious  banner  ads     •  Clear  browser  cache/history/
•  Recognize  adware  symptoms     cookies    
•  Limit  the  use  of  personal   •  Recognize  untrusted  source  
informa9on  (PII)     warnings    
•  Risks  of  using  public  worksta9ons    
Wrap  it  Up
•  That  does  it  for  Domain  3,  Security  
•  We  looked  at  a  ton  of  topics  that  will  be  necessary  for  us  to  know  
come  test  9me.  
•  Sec9ons  we  covered  were:  
•  Define  basic  security  threats    
•  Use  security  best  prac9ces    
•  Use  web-­‐browsing  best  prac9ces    

•  Now  that  we  have  Security  under  our  belts  we  can  move  forward  
with  the  next  Domain  
IT  Fundamentals
FC0-­‐U51  
Domain  4  -­‐  Networking
1.  Set  up  and  configure  a  basic  SOHO  router  (wired  /  wireless)    
2.  Compare  and  contrast  cellular,  wireless  and  wired  data  connec9ons    
3.  Compare  and  contrast  different  methods  of  sharing  and  storage    
Set  up  and  configure  a  basic  SOHO  router  
(wired  /  wireless)  
•  Verify  wired  connec9on,  if  applicable    
•  Set  WEP  vs.  WPA  vs.  WPA2    
•  Change  SSID  from  default    
•  Apply  a  new  wireless  password    
•  Change  admin  password  for  router    
•  Connect  to  the  new  network    
•  Verify  internet  connec9vity    
•  Update  firmware  if  necessary    
WEP
•  Wired Equivalent Privacy (WEP)
•  A wireless protocol designed to provide privacy equivalent to that of a
wired network
•  Vulnerable due to weaknesses in the way the RC4 encryption is
deployed
•  Can be cracked in as little as 5 minutes
•  The Initialization Vector (IV) of WEP uses 24-bit encryption, which is
too small to be secure
•  By examining multiple packets, it can be easily cracked, known as an IV
attack
•  Upgraded to use Temporal Key Integrity Protocol (TKIP), a 128-bit
wrapper using MAC and packet serial number (WPA)
WPA / WPA2
•  Wi-Fi Protected Access (WPA) and WPA2
•  Technologies designed to address the core problems with WEP.
•  Implemented by the 802.11i standard
•  WPA uses RC4 with TKIP
•  Was an intermediate solution for the problems with WEP
•  Compatible with older Wireless NICs
•  WPA2 employs Counter Mode with Cipher Block Chaining Message Authentication
Code Protocol (CCMP)
•  CCMP uses 128-bit AES encryption (AES-CCMP)
•  Not backwards compatible to older wireless NICs
Sefng  up  a  Wireless  Router
Demo  
Compare  and  contrast  cellular,  wireless  and  
wired  data  connecFons  
•  High  vs.  low  mobility    
•  High  vs.  low  availability    
•  High  vs.  low  throughput/bandwidth    
•  High  vs.  low  reliability    
•  Connec9on  delay    
•  Number  of  concurrent  connec9ons    
•  Levels  of  security    
High  vs.  low  mobility  
•  Cellular  
•  Very  High  Mobility  

•  Wireless  
•  High  Mobility  

•  Wired  
•  Low  Mobility  
High  vs.  low  availability  
•  Cellular  
•  Very  High  Availability  

•  Wireless  
•  High  Availability  -­‐  depends  

•  Wired  
•  High  Availability  -­‐  depends  
High  vs.  low  throughput/bandwidth  
•  Cellular  
•  Medium  Throughput  

•  Wireless  
•  High  Throughput  

•  Wired  
•  Very  High  Throughput  
High  vs.  low  reliability  
•  Cellular  
•  High  reliability    

•  Wireless  
•  High  reliability    

•  Wired  
•  Very  High  reliability    
ConnecFon  delay  
•  Cellular  
•  Medium  Connec9on  delay    

•  Wireless  
•  Low  Connec9on  delay    

•  Wired  
•  Very  Low  Connec9on  delay    
Number  of  concurrent  connecFons  
•  Cellular  
•  Very  High  Mobility  

•  Wireless  
•  High  Mobility  

•  Wired  
•  Low  Mobility  
Levels  of  security  
•  Cellular  
•  Medium  Security    

•  Wireless  
•  Low  to  Medium  Security    

•  Wired  
•  High  Security    
3.  Compare  and  contrast  different  methods  of  
sharing  and  storage
•  HTTP  vs.  HTTPS    
•  FTP  vs.  FTPS  vs.  SFTP  (Secure  File  Transfer  Protocol)    
•  Local  vs.  hosted  storage    
•  Peer-­‐to-­‐peer    
•  Network  vs.  local  prin9ng  
HTTP  vs.  HTTPS  
•  HTTP  
•  Unsecure  
•  Plain  Text  data  
•  Port  80  for  communica9on  

•  HTTPS  
•  Secure  using  SSL  (Secure  Socket  Layer)  
•  Encrypted  data  
•  Port  443  for  communica9on  
FTP  vs.  FTPS  vs.  SFTP
•  FTP  
•  Plain  text  
•  No  protec9on  
•  Ports  20/21  
•  FTPS  
•  Encrypted  data  with  SSL  
•  Port  21/990  
•  SFTP  
•  Encrypted  data  with  SSH  
•  Port  22  
Local  vs.  Hosted  Storage  
Cloud-­‐based  services  
•  Cloud-­‐based  collabora9ve  applica9ons    
•  Office  365  for  example  
•  Super  accessible  from  mul9ple  devices  and  loca9ons  
•  Very  flexible  
•  Cloud-­‐based  storage  
•  Google  Drive,  OneDrive,  DropBox    
File  and  print  sharing  
•  Workgroup  
•  Can  share  a  printer  on  the  network  or  a|ached  to  a  system  in  the  
“workgroup”  
•  Workgroup  is  a  name  for  computers  that  share  a  workgroup  name  in  the  
TCP/IP  Setngs  on  the  system    
•  Can  share  files  with  network  shares  or  shares  setup  manually  
•  Homegroup    
•  For  home  users  to  make  prin9ng  at  home  easier  without  having  to  setup  a  
workgroup  
•  Can  decide  if  you  want  to  share  Pictures,  Music,  Documents  
•  Need  a  code  to  join  the  homegroup  
Network  drives  
•  Drives  that  are  physically  on  another  computer/server  
•  Allows  you  to  share  files/data  among  the  users  of  the  network  
•  Can  be  on  a  dedicated  server  
•  Can  be  on  a  worksta9on  that  is  used  daily  
•  Can  be  built  into  wireless  routers  now  days  
Network  Aaached  Storage
•  A  NAS  
•  Storage  or  a  data  storage  device,  such  as  a  hard  drive  or  RAID  array,  
connected  to  a  computer  network,  providing  data  access  to  
different  network  clients  
Direct  Aaached  Storage  
•  Like  the  opposite  of  NAS  
•  Digital  storage  system  directly  a|ached  to  a  server  or  worksta9on  
External  hard  drives  
•  Like  a  thumb  drive  but  much  more  capacity  
•  Require  power  to  work  unlike  a  thumb  drive  
•  Can  be  used  for  backup  purposes  
•  File  archiving  
•  Transpor9ng  large  files  
Peer-­‐to-­‐peer  
•  Local  adhoc  network    
•  Bluetooth  sharing    
•  Direct  link  (PC-­‐to-­‐PC)    
•  Cross-­‐over  cable  
•  Online  peer-­‐to-­‐peer  network    
•  Using  Switches  (local)  
•  Using  soFware  to  communicate  
•  Bit  torrent  for  example  
Network  vs.  local  prinFng  
•  Network  prin9ng  is  allowed  over  the  network  (LAN  or  WAN)  
•  Can  be  a  dedicated  printer  
•  Can  be  a  printer  a|ached  to  a  worksta9on  and  shared  out  
•  Can  be  a  wireless  printer  to  support  mobile  devices  

•  Local  prin9ng  is  just  prin9ng  from  one  device  to  a  locally  or  directly  
a|ached  printer  
•  A|ached  by  USB  cable  usually  now  days  
Wrap  it  Up
•  That  does  it  for  Domain  4,  Networking  
•  We  looked  at  a  ton  of  topics  that  will  be  necessary  for  us  to  know  
come  test  9me.  
•  Sec9ons  we  covered  were:  
•  Define  basic  Set  up  and  configure  a  basic  SOHO  router  (wired  /  wireless)    
•  Compare  and  contrast  cellular,  wireless  and  wired  data  connec9ons    
•  Compare  and  contrast  different  methods  of  sharing  and  storage    

•  Now  that  we  have  Networking  under  our  belts  we  can  move  forward  
with  the  next  Domain  
IT  Fundamentals
FC0-­‐U51  
Domain  5  –  Basic  IT  Literacy
1.  Perform  appropriate  steps  to  set  up  a  basic  worksta9on    
2.  Explain  the  basic  methods  of  naviga9ng  an  opera9ng  system    
3.  Given  a  scenario,  implement  basic  support  concepts    
4.  Explain  basic  backup  concepts    
5.  Describe  the  importance  and  impact  of  various  environmental  and  
safety  concepts    
Perform  appropriate  steps  to  set  up  a  basic  
workstaFon  
•  Plug  in  cables     •  Uninstall  unneeded  soFware  (if  
•  Power  on  computer     applicable)    
•  Follow  ini9al  opera9ng  system   •  Configure  and  verify  internet  
setup  wizard     connec9on    
•  Localiza9on  setngs     •  Install  addi9onal  soFware  (if  
•  Screen  resolu9on     applicable)    
•  Audio  setngs     •  Run  soFware  and  security  updates    
•  Install  security  soFware     •  Other  user  accounts  (if  applicable)    
•  Configure  peripherals  (if   •  Basic  cable  management    
applicable)    
Plug  in  cables    

We  will  want  to  make  sure  all  the  power  
cables  are  correctly  inserted  
Connect  the  keyboard  
Connect  the  mouse  
Connect  the  monitor  cable  
Connect  any  audio  cables  if  wanted  
Power  on  computer    

May  seem  like  a  no  brainer,  but  we  have  to  
find  the  power  bu|on  to  get  it  turned  on  
Follow  iniFal  operaFng  system  setup  wizard  
•  Localiza9on  setngs    
•  Screen  resolu9on    
•  Audio  setngs    

•  These  are  the  steps  AFTER  the  Opera9ng  System  installa9on  


Install  security  so1ware  
•  Get  your  An9-­‐virus  /  An9-­‐Malware  program  on  the  system!  

•  Might  not  be  able  to  do  this  step  if  you  need  to  download  it  first  (try  
to  get  a  copy  without  downloading  if  possible)  
Configure  peripherals  (if  applicable)  
•  Printers  
•  Scanners  
•  External  Storage  Devices  
Uninstall  unneeded  so1ware  (if  applicable)  
•  Get  rid  of  the  “bloat  ware”  that  vendors  will  put  on  your  system  

•  Free  30  day  trials  for  example  


•  Not  needed  especially  if  you  already  have  something  you  want  to  use  
Configure  and  verify  internet  connecFon  
•  Configure  your  wireless  if  necessary  

•  If  you  have  a  wired  connec9on,  then  you  can  simply  plug  up  the  RJ-­‐45  
connector  for  the  Cat5e  (network  cable)  to  your  computer  

•  Once  connected,  give  it  a  few  seconds  to  recognize  the  network,  then  
try  to  visit  a  website  to  test  the  connec9on  
Install  addiFonal  so1ware  (if  applicable)  
•  Install  any  addi9onal  soFware  you  may  want  
•  Produc9vity  soFware  
•  Games  
•  U9li9es  
Run  so1ware  and  security  updates  
•  Update  your  an9-­‐virus  asap  to  make  sure  you  have  the  latest  virus  
defini9ons  to  provide  maximum  protec9on  

•  Perform  your  Opera9ng  System  updates  immediately  as  well  


•  Get  all  those  vulnerabili9es  patched  ASAP  so  you  can  help  eliminate  any  
threats  a|acking  you  with  exploits  

•  Might  take  awhile  depending  on  your  opera9ng  system,  connec9on  speed  
and  the  number  of  updates  you  will  need  to  download  
Other  user  accounts  (if  applicable)  
Basic  Cable  Management
4.  Explain  basic  backup  concepts  
•  Importance  of  backups    
•  Scheduling    
•  Frequency    
•  Storage  mediums    
•  Locally  a|ached  storage    
•  Offsite/cloud-­‐based    
•  Network  a|ached  storage    
•  Backup  verifica9on  and  tes9ng    
Importance  of  backups  
Scheduling
Frequency
Storage  mediums  
•  Locally  a|ached  storage    
•  Offsite/cloud-­‐based    
•  Network  a|ached  storage    
Backup  verificaFon  and  tesFng  
Coming  Up
•  Next  we  are  going  to  wrap  up  our  Basic  IT  Literacy  Domain  talking  
about  Going  Green  for  IT  by  Describing  the  importance  and  impact  of  
various  environmental  and  safety  concepts.    
5.  Describe  the  importance  and  impact  of  
various  environmental  and  safety  concepts  
•  Proper  disposal  methods    
•  Power    
•  Device  placement    
•  Electrosta9c  discharge  concepts    
•  Ergonomic  concepts    
•  Follow  manufacturer  safety  guidelines    
Proper  disposal  methods  
•  RoHS  
•  Restric9on  of  Hazardous  Substances  
•  Lead  Free  Direc9ve  
•  6  substances  you  cannot  just  toss  
•  Lead  (Pb)  
•  Mercury  (Hg)  
•  Cadmium  (Cd)  
•  Hexavalent  chromium  (Cr6+)  
•  Polybrominated  biphenyls  (PBB)  
•  Polybrominated  diphenyl  ether  (PBDE)  
•  Anything  with  a  circuit  board  in  it,  including  computers,  cell  phones,  routers,  
and  printers    
Proper  disposal  methods  
•  CRT  monitors    
•  CRTs  contain  many  environmentally  harmful  elements,  including  the  
phosphorous  coa9ng  on  the  inside  of  the  monitor  glass.  Phosphorous  is  
vola9le,  and  it  can  explode  or  start  a  fire  when  it  combines  with  the  oxygen  
molecules  in  water.  
•  Ba|eries    
•  Contain  heavy  metals  such  as  mercury,  lead,  cadmium,  and  nickel,  all  of  
which  can  contaminate  the  environment  when  not  disposed  of  properly,  and  
they  can  release  toxic  chemicals  into  the  air  when  incinerated  
•  Portable  compu9ng  devices  (laptops,  phones,  and  so  on)  
•  Wireless  input  devices,  such  as  wireless  mice  and  keyboards  
•  Motherboards  
•  Uninterrup9ble  power  supplies  (UPSs)  
Proper  disposal  methods  
•  Ink/toner    
•  The  toner  used  in  laser  printers  and  photocopiers  is  carcinogenic,  so  proper  
disposal  of  toner  is  a  ma|er  of  public  safety.  Toner  cartridges  should  be  
returned  to  the  manufacturer  or  another  company  that  reclaims  and  recycles  
them.    Don’t  breathe  any  released  toner!  
•  Hard  drives    
•  You  want  to  make  sure  the  hard  drive  is  “clean”  before  you  dispose  of  the  
device.    Using  a  recycling  facility  where  they  destroy  the  drive  professionally  
is  your  best  bet.  
Power
•  Energy  efficient  devices    
•  Power  profiles    
•  Power  op9ons    
•  Sleep  /  hiberna9on    
•  UPS  vs.  surge  protector  vs.  power  strip    
•  Power  limita9ons    
•  Interna9onal  power  differences  
Energy  efficient  devices
•  In  addi9on  to  the  OS  setngs  for  conserving  power,  some  hardware  
devices  also  have  their  own  power  savings  
•  Flat  panels  over  CRTs  
•  LED  over  LCD  
•  Solid  State  Hard  drives  over  tradi9onal  SATA  drives  

•  Use  virtualiza9on  to  save  on  hea9ng/cooling  and  power  costs  


Power  profiles  
•  Power  op9ons    

•  Sleep  /  hiberna9on  
•  Sleep  
•  Like  a  pause  bu|on  
•  Hiberna9on  
•  Most  power  savings    
UPS  vs.  surge  protector  vs.  power  strip  
•  UPS  
•  Uninterrup9ble  power  supply  
•  Surge  Protector  
•  Provides  protec9on  from  spikes  or  lags  of  power  
•  Power  Strip  
•  Just  spreads  out  the  power  equally  –  no  protec9on  

•  Power  limita9ons    
Device  placement  
•  Airflow    
•  Hot/Cool  Isles  
•  Humidity    
•  Not  too  low,  not  too  high  
•  Temperature    
•  Cooler  
•  Dust  accumula9on    
•  At  a  very  minimum  
•  EMI    
•  Keep  the  power  away  from  Data!  
ElectrostaFc  discharge  concepts  
•  Sta9c  electricity  

•  Touch  a  piece  of  grounded  metal  

•  Use  an  an9sta9c  strap  

•  Use  an  an9sta9c  map  upon  entry  


Ergonomic  concepts  
•  Proper  keyboard  and  mouse  placement    
•  Don’t  want  to  bent  over  to  type  or  use  mouse  
•  Also,  don’t  want  to  be  reaching  up  
•  Sitng  posi9ons    
•  Sit  comfortably,  straight  up  with  good  chair!    Back  support  
•  Monitor  level  placement    
•  Level  with  your  eye  sight  is  best  
•  Don’t  want  to  look  up  or  down  constantly  
Follow  manufacturer  safety  guidelines  
•  Don’t  open  up  the  case  if  they  warn  against  it  

•  Follow  safety  labels  

You might also like