You are on page 1of 7

IT Essentials 8 - Bridge

Scope and Sequence

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Contents
Target Audience 3

Prerequisites 3

Certification Alignment 3

Course Description 3

Course Objectives 4

Equipment Requirements 5

Course Outline 5

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Target Audience
The Cisco Networking Academy® IT Essentials 8 Bridge course is designed for students who
have or are currently taking IT Essentials 7 and plan to take the CompTIA A+ Core 1 and Core 2
Certification Exams. The IT Essentials 8- Bridge course covers new content not covered in IT
Essentials 7.
The course is appropriate for learners at many education levels and types of institutions,
including high schools, secondary schools, universities, colleges, career and technical schools,
and community centers.

Prerequisites
Students are required to have successfully completed the IT Essentials 7 course or taking it in
parallel with IT Essentials 8 - Bridge. Students are also expected to have the following skills:
• High school reading level
• Basic computer literacy
• Basic PC operating system navigation skills
• Basic internet usage skills

Certification Alignment
The IT Essentials 8 – bridge course together with IT Essentials v7 aligns with the CompTIA A+
Certification.

Course Description
Welcome to the Cisco Networking Academy IT Essentials (ITE) 8 Bridge course – a course
designed to help “bridge” the knowledge gap between the current IT Essentials 7 course and
the updated CompTIA A+ 1101 and 1102 certification requirements.
As the shortage of trained IT professionals persists, and the demand continues to increase,
building a solid foundation in Information Technologies (IT) is essential. It is increasingly
necessary to meet or exceed current certification requirements. Many companies,
governments, and international markets need skilled networking professionals.
This course aims to educate students focused on their IT abilities and professional career, and
covers the following topics:

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
• Introduction to Personal Computer Hardware: Safety
• Applied Networking: DNS, DHCP Operation, and VLANs
• Windows Installation: Boot Methods
• Windows Configuration: Privacy and Gaming, Application, Installation, and Configuration
plus Permissions
• Security: Operating System Login and Security
• The IT Professional: Asset Management and Documentation

Course Objectives
After completing this course in conjunction with IT Essentials v.7 course, students will be able
to:
• Use common electrical and ESD safety procedures.
• Summarize network service types and functions.
• Configure wireless Networking in a small LAN.
• Perform boot sequence and registry files.
• Perform custom installation options.
• Use Microsoft control panel utilities.
• Manage software applications.
• Use File Explorer to manage files, folders, and applications.
• Configure secure login security settings.
• Configure operating system security.
• Explain asset management best practices.
• Compare and contrast different types of IT and business documentation.
• Summarize the contents of each module.

Course Assessments
This course uses the following assessments:
• Interactive labs
• Check Your Understanding mini-assessments
• End of Course Quiz

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Equipment Requirements
Current designs for lab topologies leverage equipment used in IT Essentials 7. Please refer to IT
Essentials 7 Scope and Sequence (chose your language folder and find the file ITE v7 Scope and
Sequence) for detailed PC Hardware, Software and Repair Tool requirements.

Course Outline
IT Essentials 8 – Bridge provides incremental knowledge to IT Essentials 7 to prepare students
for CompTIA A+ Certification.

Table 1 details the modules and associated competencies. Each module is an integrated unit of
learning that consists of content, activities, and assessments that target a specific set of
competencies. The size of the module depends on the depth of knowledge and skill needed to
master the competency.

Table 1: Module Title and Objective

Module/Topic Goals/Objectives Topic


Module 1. Introduction to Personal Utilize personal computer safety
Computer Hardware procedures.
• Equipment grounding
• Compliance with government regulations
• Personal safety
Use common electrical and ESD
1.0 Safety o Lifting techniques
safety procedures.
o Electrical fire safety
o Safety goggles
o Air filtration mask
Configure devices for wired and
Module 6. Applied Networking
wireless networks.
o A
o AAAA
o Mail exchanger (MX)
Summarize DNS network service o Text (TXT)
6.0 DNS
and functions. o DomainKeys Identified Mail (DKIM)
o Sender Policy Framework (SPF)
o Domain-based Message Authentication,
Reporting, and Conformance (DMARC)
o Leases
Summarize DHCP network service
6.1 DHCP o Reservations
and functions.
o Scope
Explain VLAN configuration
6.2 VLANs • Virtual Lan (VLAN)
concepts.

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Install a Windows operating
Module 10. Windows Installation
system.
o Network
o Solid-state/flash drives
Perform boot sequence and
10.0 Boot Methods o Internet-based
registry files.
o External/hot-swappable drive
o Internal hard drive (partition)
o Recovery partition
o Image deployment
o Repair installation
o Remote network installation
o Other considerations
▪ Third-party drivers
Perform custom installation o GUID Partition Table (GPT)
10.1 Operating System Upgrades
options. • Upgrade considerations
o Backup files and user preferences
o Application and driver
support/backward compatibility
o Hardware compatibility
• Feature updates
o Product life cycle
Configure the Windows Desktop
Module 11. Windows Configuration
and File Explorer.
Use Windows Privacy and Gaming
11.0 Privacy and Gaming
settings
• Dedicated graphics card vs. integrated
• Video random-access memory (VRAM)
requirements
11.1 Application Installation and • External hardware tokens
Manage software applications.
Configuration • ISO mountable
• Other considerations for new applications
o Impact to operation
o Impact to business
o Inheritance
Use File Explorer to manage files, • Run as administrator vs. standard user
11.3 Permissions
folders, and applications. o User Account Control (UAC)
• Encrypting File System (EFS)
Configure basic security settings
Module 13. Security
and policies for end devices
• Username and password
• Personal identification number (PIN)
Configure secure login security
13.1 Operating System Login • Fingerprint
settings.
• Facial recognition
• Single sign-on (SSO)
• Defender Antivirus
o Activate/deactivate
o Updated definitions
Configure operating system
13.2 Operating Security • Firewall
security.
o Activate/deactivate
o Port security
o Application security

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Explain how to manage change
Module 14. The IT Professional and unplanned disruptions in a
business environment.
• Database system
• Asset tags and IDs
Explain asset management best
14.0 Asset Management • Procurement life cycle
practices.
• Warranty and licensing
• Assigned users
• Types of documents
o Splash screens
o Incident reports
o Standard operating procedures
Compare and contrast different
o Procedures for custom installation of
14.1 Documentation types of IT and business
software package
documentation.
• Types of documents
o New-user setup checklist
o End-user termination checklist
o Knowledge base/articles

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7

You might also like