CSC-121 Foundations of Computing II

(TUI-CSC121.AE2) / ISBN : 978-1-64459-789-7
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Instructor-Led (Add-on)
Get A Free Trial

Skills You’ll Get

Get the support you need. Enroll in our Instructor-Led Course.

1

Operating System Basics, Configuration and Administration

  • Understanding Operating Systems
  • Understanding Applications
  • Introduction to Windows 10
  • Preparing for the Exam
  • Interacting with Operating Systems
  • The Windows Registry
  • Disk Management
  • Installing and Upgrading Windows
  • Command‐Line Tools
  • Networking in Windows
2

Working with macOS and Linux

  • macOS and Linux
  • Applications on macOS
  • Best Practices
  • Tools
  • System Preferences
  • Features
  • Basic Linux Commands
  • Linux and Windows
  • Physical Security Concepts
  • Physical Security for Staff
  • Logical Security
  • Malware
  • Mitigating Software Threats
  • Social Engineering Attacks, Threats, and Vulnerabilities
  • Common Security Threats
  • Exploits and Vulnerabilities
  • Security Best Practices
  • Destruction and Disposal Methods
  • Working with Windows OS Security Settings
  • Web Browser Security
  • Securing a SOHO Network (Wireless)
  • Securing a SOHO Network (Wired)
  • Mobile Device Security
3

Operating System and Security

  • Troubleshooting Common Microsoft Windows OS Problems
  • Troubleshooting Security Issues
  • Best Practices for Malware Removal
  • Troubleshooting Mobile OS Issues
  • Troubleshooting Mobile Security Issues
  • Scripting
  • Remote Access
4

Safety and Environmental Concerns

  • Understanding Safety Procedures
  • Understanding Environmental Controls
  • Understanding Policies, Licensing, and Privacy
  • Documentation and Support
  • Change Management Best Practices
  • Disaster Prevention and Recovery
  • Demonstrating Professionalism

1

Operating System Basics, Configuration and Administration

  • Configuring Screen Savers
  • Enabling BranchCache
  • Creating a Restore Point
  • Configuring a Default Domain Password Policy
  • Configuring an Audit Group Policy
  • Observing the Control Panel Options from Different Views
  • Uninstalling a Program
  • Creating a Variable
  • Setting Automatic Windows Updates
  • Using the Task Manager to Start an Application
  • Configuring Computer Management Services
  • Disabling a Service
  • Using Windows Event Viewer
  • Displaying Windows PowerShell Snap-ins
  • Adding an MMC Snap-in
  • Managing NTFS Permissions
  • Editing a Drive Letter
  • Converting a Basic Disk to a Dynamic Disk
  • Converting a FAT32 Partition to NTFS
  • Mounting a Drive to a Folder
  • Working With the Command Prompt
  • Tracing Route Using the tracert Command
  • Using the nslookup Command
  • Using the ping Command
  • Using the netstat Command
  • Viewing the Status of a Disk
2

Working with macOS and Linux

  • Restoring Files
  • Backing Up Files
  • Performing a Text Search
  • Working with Directories
  • Verifying the Working Directory
  • Listing Files in a Directory
  • Using Basic Linux Commands
  • Configuring Windows Defender Firewall
  • Conducting a DoS Attack Using Smurf Attack
  • Conducting IP Spoofing
  • Using an Asymmetric Encryption Algorithm
  • Using a Symmetric Encryption Algorithm
  • Disabling the AutoPlay Feature
  • Using Windows Security in Windows Defender Settings
  • Creating a New User
  • Using BitLocker
  • Propagating Permissions
  • Stopping Permission Inheritance
  • Implementing EFS File Sharing
  • Configuring a SOHO Network - Packet Tracer Lab
  • Setting the Passcode Lock on an iPhone
3

Operating System and Security

  • Creating and Binding an SSL Certificate to a Website
  • Adding a Digital Certificate
  • Running an if-else script in PowerShell
  • Running a while loop script in PowerShell
  • Creating and Running a ps1 File
  • Executing the Basic Commands Through a ps1 File
  • Creating a Loop in PowerShell
  • Configuring an SSH Server
4

Safety and Environmental Concerns

  • Protecting a Computer Using a UPS
  • Setting Up a Surge Protected Computer System
  • Enabling the Shadow Copies feature in Windows

Related Courses

All Courses
scroll to top