Expert in Oracle PL SQL Training Crash Course
Expert in Oracle PL SQL Training Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry…
Elevate Academy stands as a premier destination for IT support training, offering an industry-focused program designed to develop expertise in hardware troubleshooting, system configuration, and real-time IT support operations. Our well-structured course empowers learners with the critical skills required for a successful IT career.
This course is part of Elevate Academy’s premium catalog and is frequently selected by top-tier companies for staff upskilling.
The CompTIA A+ Core 2 – Hardware Track from Elevate Academy is designed for learners aiming to enter the world of IT support. It offers comprehensive instruction on hardware troubleshooting, system management, and IT maintenance, guided by industry experts. Students will be equipped to meet real-world IT challenges with confidence and capability.
The CompTIA A+ Core 2 – Hardware Track at Elevate Academy is designed to build a strong foundation in IT support by equipping learners with critical hardware and troubleshooting skills. The course aims to develop a deep understanding of computer hardware components, including system units, peripherals, and configurations. Learners will gain hands-on experience diagnosing and resolving common technical issues, applying structured methodologies to address both hardware and software problems efficiently. Through practical labs and guided instruction, students will learn to configure, maintain, and optimize systems in real-world IT environments. The program also prepares candidates for the CompTIA A+ certification, a globally recognized credential that validates technical competency in IT support roles. By the end of the course, participants will be ready to step into IT support positions with confidence, armed with both theoretical knowledge and practical skills demanded by the industry.
Windows 10 Editions
Home
Pro
Pro for Workstations
Enterprise
Feature Differences
Domain access vs. workgroup
Desktop styles/user interface
Availability of Remote Desktop Protocol (RDP)
Random-access memory (RAM) support limitations
BitLocker
gpedit.msc
Upgrade Paths
In-place upgrade
Microsoft Command-Line Tool
Navigation
cd
dir
md
rmdir
Drive navigation inputs: C: or D: or x:
Command-line tools
ipconfig
ping
hostname
netstat
nslookup
chkdsk
net user
net use
tracert
format
copy
robocopy
gpupdate
gpresult
shutdown
sfc
command name
diskpart
pathping
winver
Task Manager
Services
Startup
Performance
Processes
Users
Microsoft Management Console (MMC) snap-in
Event Viewer (eventvwr.msc)
Disk Management (diskmgmt.msc)
Task Scheduler (taskschd.msc)
Device Manager (devmgmt.msc)
Certificate Manager (certmgr.msc)
Local Users and Groups (lusrmgr.msc)
Performance Monitor (perfmon.msc)
Group Policy Editor (gpedit.msc)
Additional tools
System Information (msinfo32.exe)
Resource Monitor (resmon.exe)
System Configuration (msconfig.exe)
Disk Cleanup (cleanmgr.exe)
Disk Defragment (dfrgui.exe)
Registry Editor (regedit.exe)
Internet Options
Devices and Printers
Programs and Features
Network and Sharing Center
System
Windows Defender Firewall
Sound
User Accounts
Device Manager
Indexing Options
Administrative Tools:
Show hidden files
Hide extensions
General options
View options
Power Options:
Hibernate
Power plans
Sleep/suspend
Standby
Choose what closing the lid does
Turn on fast startup
Universal Serial Bus (USB) selective suspend
Ease of Access
Time and Language
Update and Security
Personalization
Apps
Privacy
System
Devices
Network and Internet
Gaming
Accounts
Workgroup vs. Domain Setup
Shared resources
Printers
File servers
Mapped drives
Local OS Firewall Settings
Application restrictions and exceptions
Configuration
Client Network Configuration
Internet Protocol (IP) addressing scheme
Domain Name System (DNS) settings
Subnet mask
Gateway
Static vs. dynamic
Establish Network Connections
Virtual private network (VPN)
Wireless
Wired
Wireless wide area network (WWAN)
Proxy Settings
Proxy settings
Public Network vs. Private Network
Public network vs. private network
File Explorer Navigation - Network Paths
File Explorer navigation - network paths
Metered Connections and Limitations
Metered connections and limitations
System Requirements for Applications
32-bit vs. 64-bit dependent application requirements
Dedicated graphics card vs. integrated
Video random-access memory (VRAM) requirements
RAM requirements
Central processing unit (CPU) requirements
External hardware tokens
Storage requirements
OS Requirements for Applications
Application to OS compatibility
32-bit vs. 64-bit OS
Distribution Methods
Physical media vs. downloadable
ISO mountable
Other Considerations for New Applications
Impact to device
Impact to network
Impact to operation
Impact to business
Workstation OSs
Windows
Linux
macOS
Chrome OS
Cell Phone/Tablet OSs
iPadOS
iOS
Android
Various Filesystem Types
New Technology File System (NTFS)
File Allocation Table 32 (FAT32)
Third extended filesystem (ext3)
Fourth extended filesystem (ext4)
Apple File System (APFS)
Extensible File Allocation Table (exFAT)
Vendor Life-Cycle Limitations
End-of-life (EOL)
Update limitations
Compatibility Concerns Between OSs
Compatibility concerns between OSs
OS Installations and Upgrades
Boot Methods
USB
Optical media
Network
Solid-state/flash drives
Internet-based
External/hot-swappable drive
Internal hard drive (partition)
Types of Installations
Upgrade
Recovery partition
Clean install
Image deployment
Repair installation
Remote network installation
Other considerations - Third-party drivers
Partitioning
GUID (Globally Unique Identifier) Partition Table (GPT)
Master Boot Record (MBR)
Drive Format
Upgrade Considerations
Backup files and user preferences
Application and driver support/backward compatibility
Hardware compatibility
Feature Updates
Product life cycle
Installation and Uninstallation of Applications
File types
dmg
pkg
app
App Store
Uninstallation process
Apple ID and Corporate Restrictions
Apple ID and corporate restrictions
Best Practices
Backups
Antivirus
Updates/patches
System Preferences
Displays
Networks
Printers
Scanners
Privacy
Accessibility
Time Machine
Features
Multiple desktops
Mission Control
Keychain
Spotlight
Cloud
Gestures
Finder
Remote Disc
Dock
Disk Utility
FileVault
Terminal
Force Quit
Common Commands
ls
pwd
mv
cp
rm
chmod
chown
u/sudo
apt-get
yum
ip
df
grep
ps
man
top
find
dig
cat
nano
Best Practices
Backups
Antivirus
Updates/patches
Tools
Shell/terminal
Samba
Physical Security
Access control vestibule
Badge reader
Video surveillance
Alarm systems
Motion sensors
Door locks
Equipment locks
Guards
Bollards
Fences
Physical Security for Staff
Key fobs
Smart cards
Keys
Biometrics
Retina scanner
Fingerprint scanner
Palmprint scanner
Lighting
Magnetometers
Logical Security
Principle of least privilege
Access control lists (ACLs)
Multifactor authentication (MFA)
Hard token
Soft token
Short message service (SMS)
Voice call
Authenticator application
Mobile Device Management (MDM)
Mobile device management (MDM)
Active Directory
Login script
Domain
Group Policy/updates
Organizational units
Home folder
Folder redirection
Security groups
Protocols and Encryption
WiFi Protected Access 2 (WPA2)
WPA3
Temporal Key Integrity Protocol (TKIP)
Advanced Encryption Standard (AES)
Authentication
Remote Authentication Dial-In User Service (RADIUS)
Terminal Access Controller Access-Control System (TACACS+)
Kerberos
Multifactor
Malware
Trojan
Rootkit
Virus
Spyware
Ransomware
Keylogger
Boot sector virus
Cryptominer
Tools and Methods
Recovery mode
Antivirus
Anti-malware
Software firewalls
Anti-phishing training
User education regarding common threats
OS reinstallation
Social-Engineering Attacks, Threats, and Vulnerabilities
Social engineering
Phishing
Vishing
Shoulder surfing
Whaling
Tailgating
Impersonation
Dumpster diving
Evil twin
Threats
Distributed denial of service (DDoS)
Denial of service (DoS)
Zero-day attack
Spoofing
On-path attack
Brute-force attack
Dictionary attack
Insider threat
Structured Query Language (SQL) Injection
Cross-site scripting (XSS)
Vulnerabilities
Non-compliant systems
Unpatched systems
Unprotected systems (missing antivirus/missing firewall)
EOL OSS
Bring your own device (BYOD)
Defender Antivirus
Activate/deactivate
Updated definitions
Firewall
Activate/deactivate
Port security
Application security
Users and Groups
Local vs. Microsoft account
Standard account
Administrator
Guest user
Power user
Login OS Options
Username and password
Personal Identification Number (PIN)
Fingerprint
Facial recognition
Single sign-on (SSO)
NTFS vs. Share Permissions
File and folder attributes
Inheritance
Run as Administrator vs. Standard User
User Account Control (UAC)
BitLocker
BitLocker
BitLocker To Go
Encrypting File System (EFS)
Encrypting File System (EFS)
Data-at-Rest Encryption
Data-at-rest encryption
Password Best Practices
Complexity requirements
Length
Character types
Expiration requirements
Basic input/output system (BIOS)/ Unified Extensible Firmware Interface (UEFI) passwords
End-User Best Practices
Use screensaver locks
Log off when not in use
Secure/protect critical hardware (e.g., laptops)
Secure personally identifiable information (PII) and passwords
Account Management
Restrict user permissions
Restrict login times
Disable guest account
Use failed attempts lockout
Use timeout/screen lock
Administrator Account
Change default administrator's user account/password
AutoRun and AutoPlay
Disable AutoRun
Disable AutoPlay
Screen Locks
Facial recognition
PIN codes
Fingerprint
Pattern
Swipe
Remote wipes
Locator applications
OS updates
Device encryption
Remote backup applications
Failed login attempts restrictions
Antivirus/anti-malware
Firewalls
Policies and Procedures
BYOD vs. corporate owned
Profile security requirements
Internet of Things (IoT)
Physical Destruction
Drilling
Shredding
Degaussing
Incinerating
Recycling or Repurposing Best Practices
Erasing/wiping
Low-level formatting
Standard formatting
Outsourcing Concepts
Third-party vendor
Certification of destruction/recycling
Home Router Settings
Change default passwords
IP filtering
Firmware updates
Content filtering
Physical placement/secure locations
Dynamic Host Configuration Protocol (DHCP) reservations
Static wide-area network (WAN) IP
Universal Plug and Play (UPnP)
Screened subnet
Wireless Specific
Changing the service set identifier (SSID)
Disabling SSID broadcast
Encryption settings
Disabling guest access
Changing channels
Firewall Settings
Disabling unused ports
Port forwarding/mapping
Browser Download/Installation
Trusted sources
Hashing
Untrusted sources
Extensions and Plug-ins
Trusted sources
Untrusted sources
Password Managers
Password managers
Secure Connections/Sites - Valid Certificates
Secure connections/sites - valid certificates
Settings
Pop-up blocker
Clearing browsing data
Clearing cache
Private-browsing mode
Sign-in/browser data synchronization
Ad blockers
Common Symptoms
Blue screen of death (BSOD)
Sluggish performance
Boot problems
Frequent shutdowns
Services not starting
Applications crashing
Low memory warnings
USB controller resource warnings
System instability
No OS found
Slow profile load
Time drift
Common Troubleshooting Steps
Reboot
Restart services
Uninstall/reinstall/update applications
Add resources
Verify requirements
System file check
Repair Windows
Restore
Reimage
Roll back updates
Rebuild Windows profiles
Troubleshoot Common Personal Computer Issues
Common symptoms
Unable to access the network
Desktop alerts
False alerts regarding antivirus protection
Altered system or personal files - Missing/renamed files
Unwanted notifications within the OS
OS update failures
Browser-related symptoms
Random/frequent pop-ups
Certificate warnings
Redirection
Procedures for Malware Removal
Investigate and verify malware symptoms
Quarantine infected systems
Disable System Restore in Windows
Remediate infected systems
Update anti-malware software
Scanning and removal techniques
Schedule scans and run updates
Enable System Restore and create restore point in Windows
Educate the end user
Common Symptoms
Application fails to launch
Application fails to close/crashes
Application fails to update
Slow to respond
OS fails to update
Battery life issues
Randomly reboots
Connectivity issues
Bluetooth
WiFi
Near-field communication (NFC)
AirDrop
Screen does not autorotate
Mobile OS and Application Security Issues
Security concerns
Android package (APK) source
Developer mode
Root access/jailbreak
Bootleg/malicious application
Application spoofing
Common symptoms
High network traffic
Sluggish response time
Data-usage limit notification
Limited Internet connectivity
No Internet connectivity
High number of ads
Fake security warnings
Unexpected application behavior
Leaked personal files/data
Ticketing Systems
User information
Device information
Description of problems
Categories
Severity
Escalation levels
Clear, concise written communication
Problem description
Progress notes
Problem resolution
Asset Management
Inventory lists
Database system
Asset tags and IDs
Procurement life cycle
Warranty and licensing
Assigned users
Types of Documents
Acceptable use policy (AUP)
Network topology diagram
Regulatory compliance requirements
Splash screens
Incident reports
Standard operating procedures
Procedures for custom installation of software package
New-user setup checklist
End-user termination checklist
Knowledge Base/Articles
Knowledge base/articles
Change-Management
Documented business processes
Rollback plan
Sandbox testing
Responsible staff member
Change
Request management forms
Purpose of the change
Scope of the change
Date and time of the change
Affected systems/impact
Risk analysis - Risk level
Change board approvals
End-user acceptance
Workstation Backup and Recovery Methods
Backup and recovery
Full
Incremental
Differential
Synthetic
Backup testing
Frequency
Backup rotation schemes
On site vs. off site
Grandfather-father-son (GFS)
3-2-1 backup rule
Electrostatic discharge (ESD) straps
ESD mats
Equipment grounding
Proper power handling
Proper component handling and storage
Antistatic bags
Compliance with government regulations
Personal safety
Disconnect power before repairing PC
Lifting techniques
Electrical fire safety
Safety goggles
Air filtration mask
Material Safety Data Sheet (MSDS)/Documentation for Handling and Disposal
Proper battery disposal
Proper toner disposal
Proper disposal of other devices and assets
Temperature, Humidity-Level Awareness, and Proper Ventilation
Location/equipment placement
Dust cleanup
Compressed air/vacuums
Power Surges, Events, and Under-Voltage Power Failures
Battery backup
Surge suppressor
Incident Response
Chain of custody
Inform management/law enforcement as necessary
Copy of drive (data integrity and preservation)
Documentation of incident
Licensing/Digital Rights Management (DRM)/End-User License Agreement (EULA)
Valid licenses
Non-expired licenses
Personal use license vs. corporate use license
Open-source license
Regulated Data
Credit card transactions
Personal government-issued information
PII
Healthcare data
Data retention requirements
Professional Appearance and Attire
Match the required attire of the given environment
Formal
Business casual
Use Proper Language & Avoid Jargon, Acronyms, and Slang, When Applicable
Maintain a positive attitude/project confidence
Actively listen, take notes, and avoid interrupting the customer
Be culturally sensitive
Use appropriate professional titles, when applicable
Be on time (if late, contact the customer)
Avoid distractions
Personal calls
Texting/social media sites
Personal interruptions
Dealing with Difficult Customers or Situations
Do not argue with customers or be defensive
Avoid dismissing customer problems
Avoid being judgmental
Clarify customer statements
Ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding
Do not disclose experience via social media outlets
Set and Meet Expectations/Timeline & Communicate Status with Customer
Offer repair/replacement options, as needed
Provide proper documentation on the services provided
Follow up with customer/user at a later date to verify satisfaction
Deal Appropriately with Customers' Confidential and Private Materials
Located on a computer, desktop, printer, etc.
Script File Types
bat
psl
vbs
sh
Js
py
Use Cases for Scripting
Basic automation
Restarting machines
Remapping network drives
Installation of applications
Automated backups
Gathering of information/data
Initiating updates
Other Considerations When Using Scripts
Unintentionally introducing malware
Inadvertently changing system settings
Browser or system crashes due to mishandling of resources
Methods/Tools
RDP
VPN
Virtual network computer (VNC)
Secure Shell (SSH)
Remote monitoring and management (RMM)
Microsoft Remote Assistance (MSRA)
Third-party tools
Screen-sharing software
Video-conferencing software
File transfer software
Desktop management software
Security Considerations of Each Access Method
Security considerations of each access method
Explore core hardware elements, peripheral devices, and system setup with guidance from seasoned professionals.
Learn effective problem-solving approaches to identify and fix common hardware and software malfunctions.
Develop real-world skills through interactive lab sessions that mimic everyday IT support environments.
Get equipped for a future in IT support and hardware services with practical training and expert insights.
Achieve the respected CompTIA A+ credential, confirming your abilities in system support and maintenance.
Benefit from dedicated trainers and coordinators who offer continuous support and personalized instruction.
In today’s fast-paced digital world, the demand for skilled software professionals is higher than ever. Whether you’re a student aiming…
Expert in Oracle PL SQL Training Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry…
Master in Oracle DBA Training Crash Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry…
Core MSSQL Training Crash Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry Expert 400+…
Refer your friends or colleagues to Elevate and earn gift vouchers worth up to ₹1000 for each successful enrollment.
Help others upskill while you enjoy exclusive rewards—it’s a win-win!