1.1 Compare and contrast common operating system types and their purposes.
• 32-bit vs. 64-bit • Workstation operating systems • Cell phone/tablet operating systems • Vendor-specific limitations • Compatibility concerns between operating systems
1.2 Compare and contrast features of Microsoft Windows versions.
• Windows 7 • Windows 8 • Windows 8.1 • Windows 10 • Corporate vs. personal needs
1.3 Summarize general OS installation considerations and upgrade methods.
• Boot methods • Type of installations • Partitioning • File system types/formatting • Load alternate third-party drivers when necessary • Workgroup vs. Domain setup • Time/date/region/language settings • Driver installation, software, and Windows updates • Factory recovery partition • Properly formatted boot drive with the correct partitions/format • Prerequisites/hardware compatibility • Application compatibility • OS compatibility/upgrade path
1.4 Given a scenario, use appropriate Microsoft command line tools.
• shutdown • dism • sfc • chkdsk • diskpart • taskkill • gpupdate • gpresult • format • copy • xcopy • robocopy • net use • net user • [command name] /? • Commands available with standard privileges vs. administrative privileges
1.5 Given a scenario, use Microsoft operating system features and tools.
• Administrative • MSConfig • Task Manager • Disk Management • System utilities
1.6 Given a scenario, use Microsoft Windows Control Panel utilities.
• Internet Options • Display/Display Settings • User Accounts • Credential Manager • Programs and features • HomeGroup • Devices and Printers • Sound • Troubleshooting • Network and Sharing Center • Device Manager • Bitlocker • Sync Center
1.7 Summarize application installation and configuration concepts.
• System requirements • OS requirements • Methods of installation and deployment • Local user permissions
1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop.
• HomeGroup vs. Workgroup • Domain setup • Network shares/administrative shares/mapping drives • Printer sharing vs. network printer mapping • Establish networking connections • Proxy settings • Remote Desktop Connection • Remote Assistance • Home vs. Work vs. Public network settings • Firewall settings
1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
• Best practices • Tools • Features • Basic Linux commands
2.1 Summarize the importance of physical security measures.
• Mantrap • Badge reader • Smart card • Security guard • Door lock • Biometric locks • Hardware tokens • Cable locks • Server locks • USB locks • Privacy screen • Key fobs • Entry control roster
2.2 Explain logical security concepts.
• MDM policies • Port security • MAC address filtering • Certificates • Antivirus/Anti-malware • Firewalls • User authentication/strong passwords • Multifactor authentication • Directory permissions • VPN • DLP • Access control lists • Smart card • Email filtering • Trusted/untrusted software sources • Principle of least privilege
2.3 Compare and contrast wireless security protocols and authentication methods
• Protocols and encryption • Authentication
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
• Malware • Tools and methods
2.5 Compare and contrast social engineering, threats, and vulnerabilities.
• DDoS • DoS • Zero-day • Man-in-the-middle • Brute force • Dictionary • Rainbow table • Spoofing • Non-compliant systems • Zombie
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.
User and groups • NTFS vs. share permissions • Shared files and folders • Run as administrator vs. standard user • BitLocker • BitLocker To Go • EFS
2.7 Given a scenario, implement security best practices to secure a workstation.
• Password best practices • Account management • Disable autorun • Data encryption • Patch/update management
2.8 Given a scenario, implement methods for securing mobile devices.
3.1 Given a scenario, troubleshoot Microsoft Windows OS problems.
• Common symptoms • Common solutions
3.2 Given a scenario, troubleshoot and resolve PC security issues.
• Common symptoms
3.3 Given a scenario, use best practice procedures for malware removal.
1. Identify and research malware symptoms. 2. Quarantine the infected systems. 3. Disable System Restore (in Windows). 4. Remediate the infected systems. 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point (in Windows). 7. Educate the end user.
3.4 Given a scenario, troubleshoot mobile OS and application issues.
• Common symptoms
3.5 Given a scenario, troubleshoot mobile OS and application security issues.
• Common symptoms
4.0 Operational Procedures
4.1 Compare and contrast best practices associated with types of documentation.
Network topology diagrams • Knowledge base/articles • Incident documentation • Regulatory and compliance policy • Acceptable use policy
4.2 Given a scenario, implement basic change management best practices.
Documented business processes • Purpose of the change • Scope the change • Risk analysis • Plan for change • End-user acceptance
4.3 Given a scenario, implement basic disaster prevention and recovery methods
• Surge protector • Cloud storage vs. local storage backups • Account recovery options • Backup testing • UPS
4.4 Explain common safety procedures
• Equipment grounding • Proper component handling and storage
4.5 Explain environmental impacts and appropriate controls.
• MSDS documentation for handling and disposal • Temperature, humidity level awareness, and proper ventilation
4.6 Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.
• Incident response • Licensing/DRM/EULA • Regulated data Follow all policies and security best practices
4.7 Given a scenario, use proper communication techniques and professionalism.
• Use proper language and avoid jargon, acronyms, and slang, when applicable • Maintain a positive attitude/ project confidence • Actively listen (taking notes) and avoid interrupting the customer • Be culturally sensitive
1.5 Given a scenario, connect and configure accessories and ports of other mobile devices.
• Connection types • Accessories
1.6 Given a scenario, configure basic mobile device network connectivity and application support.
• Wireless/cellular data network (enable/disable) • Bluetooth • Corporate and ISP email configuration • Integrated commercial provider email configuration • PRI updates/PRL updates/ baseband updates • Radio firmware • IMEI vs. IMSI • VPN
1.7 Given a scenario, use methods to perform mobile device synchronization.
• Synchronization methods • Types of data to synchronize • Mutual authentication for multiple services (SSO) • Software requirements to install the application on the PC • Connection types to enable synchronization
2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes.
• Ports and protocols • TCP vs. UDP
2.2 Compare and contrast common networking hardware devices
5.1 Given a scenario, use the best practice methodology to resolve problems.
• Always consider corporate policies, procedures, and impacts before implementing changes 1. Identify the problem 2. Establish a theory of probable cause (question the obvious) 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventive measures 6. Document findings, actions, and outcomes
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.
• Common symptoms
5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• Common symptoms
5.4 Given a scenario, troubleshoot video, projector, and display issues.
• Common symptoms
5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.
• Common symptoms • Disassembling processes for proper reassembly
5.6 Given a scenario, troubleshoot printers.
• Common symptoms
5.6 Common symptoms Given a scenario, troubleshoot common wired and wireless network problems.
What’s The OSI Model? Since we can’t actually see what happens when we send an email, the Open Systems Interconnect (OSI) model was created to represent data traveling through the network. The OSI model takes a layered approach starting at the physical equipment and goes up to the application layer then back to the physical layer. This model allows users the ability to understand the 1 and 0’s (binary) of networking. Let’s look at every layer a little more in-depth.
OSI MODEL LAYERS
Layer 7 – Application Layer
The Application Layer is what you’re using to read this blog. This layer houses all the applications a user will interact with. Examples are Chrome, Safari, Facetime, Internet Explorer, Etc
Layer 6 – Presentation Layer
The Presentation Layer decides how things are presented to the user. It’s responsible for encryption and decryption as well. For example, when you log into your online bank the presentation layer ensures that the information is encrypted via SSL.
Layer 5 – Session Layer
The Session Layer is responsible for initiating and terminating sessions. So whenever you need to communicate with another person or device, the session layer makes it possible.
Layer 4 – Transport Layer
The Transport Layer is responsible for transporting data. It accomplishes this via two methods. UDP and TCP. UDP transmission is very fast but maybe unreliable, while TCP is slower but very reliable.
Layer 3 – Network Layer
The Network Layer is where IP addressing and routing reside. An IP address is simply your device’s address on the network. This address is routed to its proper destination via a router.
Layer 2 – Data Link Layer
The Data Link layer is where mac addresses and switching reside. MAC addresses are simply the physical address of every device on your network. A switch ensures that the data gets to the correct destination on your network.
Layer 1 – Physical Layer
The Physical Layer is comprised of the physical components. From cabling to motherboards and CPU pin layouts.
Remembering The 7 Layer OSI Model
ALL PEOPLE SEEM TO NEED DATA PROCESSING
PLEASE DO NOT THROW SAUSAGE PIZZA AWAY
Want to start your career in networking? Visit Master I.T.to gain your networking certification in as little as two weeks!