Preface |
|
xxix | |
Acknowledgments |
|
xxxii | |
Introduction |
|
xxxiii | |
Part I Safety and Professionalism |
|
|
|
3 | (26) |
|
|
4 | (5) |
|
|
4 | (1) |
|
Lifting Techniques When Moving Equipment |
|
|
5 | (2) |
|
Exercise 1-1: Research Lifting Guidelines |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Working Safely with Printers |
|
|
7 | (1) |
|
Working Safely with Power Supplies |
|
|
8 | (1) |
|
Working Safely with Display Devices |
|
|
8 | (1) |
|
|
9 | (4) |
|
Safely Transporting Equipment |
|
|
9 | (1) |
|
Protecting Components from Electrostatic Discharge |
|
|
9 | (4) |
|
Exercise 1-2: ESD-Proofing Your Workspace |
|
|
12 | (1) |
|
Environmental Concerns for IT Professionals |
|
|
13 | (7) |
|
Protection from Dust, Debris, and Other Airborne Particles |
|
|
13 | (1) |
|
Providing the Proper Temperature and Humidity |
|
|
14 | (1) |
|
|
14 | (2) |
|
Disposing of Computer Waste |
|
|
16 | (14) |
|
Exercise 1-3: Researching Recycling Centers |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (2) |
|
|
22 | (3) |
|
|
25 | (4) |
|
2 Planning and Professionalism |
|
|
29 | (40) |
|
Professionalism and Proper Communication |
|
|
30 | (6) |
|
|
30 | (6) |
|
Dealing with Prohibited Content and Prohibited Activities |
|
|
36 | (3) |
|
Defining Prohibited Content and Behavior |
|
|
36 | (1) |
|
Responding to an Incident |
|
|
37 | (2) |
|
Licensing, Privacy, and Regulations |
|
|
39 | (4) |
|
Licensing, EULAs, and DRM |
|
|
39 | (3) |
|
Regulated Data and Privacy |
|
|
42 | (1) |
|
|
43 | (9) |
|
General Documentation Best Practices |
|
|
44 | (1) |
|
|
45 | (5) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (4) |
|
Changing Management Objectives |
|
|
52 | (1) |
|
Making Requests for Changes |
|
|
53 | (1) |
|
Describing the Purpose of the Change |
|
|
53 | (1) |
|
Defining the Type and Scope of the Change |
|
|
53 | (1) |
|
|
54 | (1) |
|
Analyzing the Risks and Impact |
|
|
54 | (1) |
|
Formulating a Rollback Plan |
|
|
54 | (1) |
|
|
54 | (1) |
|
Getting Approval and Implementing the Change |
|
|
55 | (1) |
|
Getting End-User Acceptance |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (3) |
|
|
62 | (7) |
Part II Operating Systems |
|
|
3 Operating System Fundamentals |
|
|
69 | (38) |
|
Introduction to Operating Systems |
|
|
70 | (5) |
|
The Purpose of Operating Systems |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Device Types and Architectures |
|
|
71 | (2) |
|
32-Bit vs. 64-Bit Operating Systems |
|
|
73 | (1) |
|
End-of-Life (EOL) and Update Considerations |
|
|
74 | (1) |
|
Windows Editions and Updates |
|
|
75 | (6) |
|
|
76 | (2) |
|
Windows Updates and Builds |
|
|
78 | (3) |
|
Exercise 3-1: Viewing the Windows Version and Edition |
|
|
80 | (1) |
|
Configuring Windows Settings |
|
|
81 | (8) |
|
Identifying Control Panel Applets |
|
|
81 | (5) |
|
Identifying Windows Settings |
|
|
86 | (3) |
|
Exercise 3-2: Locating Windows Settings |
|
|
88 | (1) |
|
|
89 | (8) |
|
|
90 | (1) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
Dual-Booting with Windows |
|
|
95 | (1) |
|
Using Another Computer's Optical Drive |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (4) |
|
|
104 | (3) |
|
4 Upgrading, Installing, and Configuring Operating Systems |
|
|
107 | (40) |
|
Considerations for Installing or Upgrading Windows |
|
|
108 | (6) |
|
|
109 | (1) |
|
Application and Hardware Compatibility |
|
|
110 | (1) |
|
Clean Install vs. Upgrade |
|
|
111 | (1) |
|
|
111 | (3) |
|
|
114 | (4) |
|
|
114 | (3) |
|
Exercise 4-1: Using Disk Cleanup |
|
|
115 | (2) |
|
Upgrading to a Newer Version of Windows |
|
|
117 | (1) |
|
Upgrading to a Different Edition of the Same Windows Version |
|
|
117 | (1) |
|
|
118 | (11) |
|
Preparing to Install Windows |
|
|
118 | (4) |
|
Selecting Boot Media and Methods |
|
|
122 | (1) |
|
|
123 | (4) |
|
Exercise 4-2: Performing an Attended Clean Install of Windows |
|
|
127 | (1) |
|
|
127 | (2) |
|
|
129 | (5) |
|
Checking for Internet Connectivity |
|
|
129 | (1) |
|
|
130 | (2) |
|
Exercise 4-3: Creating a New User Account with the Settings App |
|
|
131 | (1) |
|
Registering and Activating Windows |
|
|
132 | (1) |
|
|
132 | (2) |
|
Installing and Upgrading macOS and Linux Operating Systems |
|
|
134 | (2) |
|
|
134 | (1) |
|
File Systems for Linux and macOS |
|
|
135 | (1) |
|
|
135 | (13) |
|
Exercise 4-4: Installing Ubuntu Linux |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (4) |
|
|
142 | (5) |
|
5 Disk, File, and Application Management |
|
|
147 | (50) |
|
|
148 | (7) |
|
Managing Disks in Windows |
|
|
149 | (3) |
|
Exercise 5-1: Viewing the Disk Storage Type |
|
|
150 | (2) |
|
Exercise 5-2: Creating a New Volume |
|
|
152 | (1) |
|
Managing Disks with DISKPART |
|
|
152 | (2) |
|
Exercise 5-3: Using DISKPART |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (7) |
|
General Characteristics of a File System |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (14) |
|
Setting File Explorer Folder Options |
|
|
162 | (1) |
|
File Management at the Windows Command Prompt |
|
|
163 | (7) |
|
Exercise 5-4: Managing Directories and Files at a Command Prompt |
|
|
166 | (4) |
|
Managing Files at the Linux or macOS Command Prompt |
|
|
170 | (5) |
|
Exercise 5-5: Creating a Text File in nano |
|
|
172 | (1) |
|
Exercise 5-6: Managing Files at the Linux Terminal Window |
|
|
173 | (2) |
|
Using the Shutdown Command |
|
|
175 | (1) |
|
|
176 | (10) |
|
Application System Requirements and OS Compatibility |
|
|
177 | (1) |
|
Methods of Installation and Deployment |
|
|
177 | (4) |
|
System Permissions for Managing Software |
|
|
181 | (1) |
|
Security Considerations When Installing Applications |
|
|
182 | (1) |
|
Compatibility Issues with Older Applications |
|
|
182 | (2) |
|
Exercise 5-7: Exploring Compatibility Mode Settings |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (14) |
|
Exercise 5-8: Working with Windows Applications |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (3) |
|
|
189 | (3) |
|
|
192 | (5) |
|
6 Operating System Troubleshooting and Maintenance |
|
|
197 | (56) |
|
|
198 | (1) |
|
Windows Troubleshooting Tools |
|
|
199 | (18) |
|
|
199 | (1) |
|
|
199 | (1) |
|
System Information (MSINFO32.EXE) |
|
|
200 | (1) |
|
|
200 | (4) |
|
Exercise 6-1: Backing Up and Restoring the Registry |
|
|
203 | (1) |
|
Microsoft Management Console |
|
|
204 | (5) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (4) |
|
Exercise 6-2: Exploring Task Manager |
|
|
214 | (1) |
|
|
214 | (3) |
|
Exercise 6-3: Viewing the Virtual Memory Settings |
|
|
215 | (2) |
|
Troubleshooting Windows Startup Problems |
|
|
217 | (15) |
|
|
218 | (4) |
|
Exercise 6-4: Working in Safe Mode |
|
|
221 | (1) |
|
System Configuration (MSCONFIG) |
|
|
222 | (4) |
|
Exercise 6-5: Exploring Boot Modes with System Configuration |
|
|
225 | (1) |
|
|
226 | (2) |
|
|
228 | (4) |
|
Windows Symptoms and Solutions |
|
|
232 | (7) |
|
|
232 | (2) |
|
USB Controller Resources Warnings |
|
|
234 | (1) |
|
|
234 | (1) |
|
Slow or Sluggish Performance |
|
|
234 | (2) |
|
|
236 | (2) |
|
Troubleshooting Applications |
|
|
238 | (1) |
|
OS Preventive Maintenance |
|
|
239 | (4) |
|
Defragmenting a Hard Disk |
|
|
239 | (1) |
|
Exercise 6-6: Defragmenting a Disk Drive |
|
|
240 | (1) |
|
Updates and Patch Management |
|
|
240 | (3) |
|
|
243 | (1) |
|
|
243 | (3) |
|
|
246 | (3) |
|
|
249 | (4) |
|
7 Client-Side Virtualization |
|
|
253 | (28) |
|
Introduction to Virtualization |
|
|
254 | (5) |
|
Purposes of Virtualization |
|
|
254 | (1) |
|
Uses for Virtual Machines |
|
|
255 | (1) |
|
Server-Side Virtualization vs. Client-Side Virtualization |
|
|
256 | (2) |
|
Types of Client-Side Virtualization |
|
|
258 | (1) |
|
Implementing Client-Side Desktop Virtualization |
|
|
259 | (11) |
|
|
259 | (3) |
|
Planning a Desktop Virtualization Implementation |
|
|
262 | (2) |
|
Installing and Configuring Oracle VirtualBox |
|
|
264 | (3) |
|
Exercise 7-1: Installing Oracle VirtualBox |
|
|
266 | (1) |
|
Exercise 7-2: Creating a Virtual Machine in VirtualBox |
|
|
266 | (1) |
|
Capturing and Releasing the Mouse and Keyboard in a Guest OS |
|
|
267 | (1) |
|
Improving Guest OS Performance |
|
|
268 | (2) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (3) |
|
|
274 | (7) |
Part III Computer Hardware |
|
|
8 Personal Computer Components: Motherboards and Processors |
|
|
281 | (44) |
|
|
282 | (3) |
|
Exercise 8-1: What's in Your Toolkit? |
|
|
284 | (1) |
|
Motherboard Form Factors and Components |
|
|
285 | (11) |
|
|
285 | (3) |
|
Exercise 8-2: Comparing Motherboards |
|
|
288 | (1) |
|
|
288 | (8) |
|
|
296 | (9) |
|
|
296 | (2) |
|
CPU Technologies and Characteristics |
|
|
298 | (3) |
|
|
301 | (4) |
|
Exercise 8-3: Checking Out Your Cooling System |
|
|
304 | (1) |
|
Configuring a Motherboard |
|
|
305 | (10) |
|
Understanding BIOS and UEFI |
|
|
305 | (1) |
|
A Brief History of the PC System BIOS |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (6) |
|
Exercise 8-4: Booting into Firmware Setup |
|
|
308 | (1) |
|
Exercise 8-5: Viewing the Firmware Settings |
|
|
309 | (4) |
|
|
313 | (2) |
|
Motherboard Driver Software |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (2) |
|
|
318 | (3) |
|
|
321 | (4) |
|
9 Personal Computer Components: Memory, Adapters, and Storage |
|
|
325 | (44) |
|
|
326 | (8) |
|
Capacity: From Bits to Exabytes |
|
|
327 | (1) |
|
Speed: From Hertz to Gigahertz |
|
|
327 | (1) |
|
|
328 | (1) |
|
Features and Configurations of RAM Chips and Modules |
|
|
328 | (5) |
|
|
333 | (1) |
|
Expansion Cards and Built-In Adapters |
|
|
334 | (14) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
External Port Adapters and Interfaces |
|
|
335 | (9) |
|
Exercise 9-1: Researching USB Connectors |
|
|
340 | (1) |
|
Exercise 9-2: Exploring Your System's USB Ports |
|
|
341 | (3) |
|
|
344 | (2) |
|
|
346 | (2) |
|
Exercise 9-3: Viewing Adapter Cards in Device Manager |
|
|
347 | (1) |
|
Storage Devices and Interfaces |
|
|
348 | (13) |
|
|
348 | (6) |
|
|
354 | (16) |
|
Exercise 9-4: Identifying Your Storage Devices |
|
|
358 | (3) |
|
|
361 | (1) |
|
|
361 | (2) |
|
|
363 | (3) |
|
|
366 | (3) |
|
10 Power Supplies, Display Devices, and Peripherals |
|
|
369 | (28) |
|
|
370 | (10) |
|
|
370 | (3) |
|
|
373 | (1) |
|
Exercise 10-1: Checking Out the Wattage on PCs and Other Devices |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
Power Supply Form Factors and Connectors |
|
|
375 | (2) |
|
Connecting Power to Peripherals |
|
|
377 | (2) |
|
|
379 | (1) |
|
Removing a Power Supply/Installing a Power Supply |
|
|
379 | (1) |
|
Exercise 10-2: Replacing a Power Supply |
|
|
379 | (1) |
|
Display Adapters and Displays |
|
|
380 | (8) |
|
|
380 | (5) |
|
|
385 | (3) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (4) |
|
|
393 | (4) |
|
11 Installing and Upgrading PC Components |
|
|
397 | (30) |
|
Installing and Upgrading Motherboards and Onboard Components |
|
|
398 | (13) |
|
|
398 | (1) |
|
|
399 | (2) |
|
Exercise 11-1: Removing an Old Motherboard |
|
|
400 | (1) |
|
Exercise 11-2: Properly Handling and Installing a Motherboard |
|
|
400 | (1) |
|
|
401 | (3) |
|
Exercise 11-3: Removing a PGA Processor from Its Socket |
|
|
402 | (1) |
|
Exercise 11-4: Removing an LGA Processor from Its Socket |
|
|
403 | (1) |
|
Exercise 11-5: Installing a Processor in an Empty LGA Socket |
|
|
403 | (1) |
|
Removing and Installing Cooling Systems |
|
|
404 | (3) |
|
Optimizing a System by Adding RAM |
|
|
407 | (1) |
|
Exercise 11-6: Running a Memory Scanner |
|
|
408 | (1) |
|
Installing and Removing DIMMs |
|
|
408 | (3) |
|
Exercise 11-7: Installing and Removing a DIMM |
|
|
410 | (1) |
|
|
411 | (2) |
|
|
411 | (1) |
|
Exercise 11-8: Removing an Adapter Card |
|
|
411 | (1) |
|
Installing and Configuring an Adapter Card |
|
|
411 | (2) |
|
Exercise 11-9: Installing an Adapter Card |
|
|
412 | (1) |
|
Installing Storage Devices |
|
|
413 | (5) |
|
Removing an Internal Storage Device |
|
|
413 | (1) |
|
Exercise 11-10: Removing a Drive |
|
|
414 | (1) |
|
Installing Solid-State Storage |
|
|
414 | (1) |
|
Exercise 11-11: Installing an M.2 SSD |
|
|
415 | (1) |
|
Installing Drives on SATA Channels |
|
|
415 | (2) |
|
Exercise 11-12: Installing a SATA Drive |
|
|
416 | (1) |
|
|
417 | (1) |
|
Removing and Installing an External Storage Device |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (3) |
|
|
423 | (4) |
|
12 PC Hardware Troubleshooting and Maintenance |
|
|
427 | (48) |
|
Preparing for Troubleshooting |
|
|
428 | (8) |
|
Protecting Systems and Gathering Tools |
|
|
429 | (1) |
|
Troubleshooting Best Practice Methodology |
|
|
429 | (6) |
|
Exercise 12-1: Troubleshooting with Device Manager |
|
|
432 | (3) |
|
|
435 | (1) |
|
Troubleshooting Motherboards, RAM, CPUs, and Power |
|
|
436 | (15) |
|
|
436 | (1) |
|
|
437 | (3) |
|
Troubleshooting Motherboard Problems |
|
|
440 | (4) |
|
Exercise 12-2: Replacing the Motherboard Battery |
|
|
443 | (1) |
|
Troubleshooting RAM Problems |
|
|
444 | (1) |
|
|
445 | (1) |
|
Troubleshooting Power Supplies |
|
|
445 | (4) |
|
Exercise 12-3: Checking a P1 Connector |
|
|
447 | (2) |
|
|
449 | (2) |
|
|
451 | (1) |
|
Troubleshooting Storage Devices |
|
|
451 | (8) |
|
Tools Required for Working with Drives |
|
|
451 | (1) |
|
|
452 | (3) |
|
Exercise 12-4: Troubleshooting a Drive Failure |
|
|
453 | (2) |
|
SATA and eSATA Interfaces |
|
|
455 | (1) |
|
RAID Arrays and Controllers |
|
|
456 | (1) |
|
Solid-State Storage Devices |
|
|
457 | (2) |
|
|
459 | (5) |
|
|
459 | (1) |
|
Screen Suddenly Shuts Down |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (1) |
|
Flashing or Flickering Screen/Image |
|
|
461 | (1) |
|
|
461 | (1) |
|
Incorrect Data Source or Cabling Issues |
|
|
462 | (1) |
|
|
462 | (1) |
|
Image Distortion or Incorrect Color Display |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
465 | (2) |
|
|
467 | (4) |
|
|
471 | (4) |
|
13 Using and Supporting Printers |
|
|
475 | (58) |
|
|
476 | (8) |
|
Printer Types and Technologies |
|
|
476 | (6) |
|
Paper-Feeding Technologies |
|
|
482 | (1) |
|
|
483 | (1) |
|
Installing and Configuring Printers |
|
|
484 | (19) |
|
|
484 | (2) |
|
|
486 | (3) |
|
Installing a Multifunction Device |
|
|
489 | (1) |
|
|
489 | (6) |
|
|
495 | (1) |
|
|
496 | (1) |
|
Sharing and Securing a Printer |
|
|
496 | (4) |
|
Configuring the Scanning Features of a Multifunction Device |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
503 | (10) |
|
|
503 | (1) |
|
|
504 | (4) |
|
Exercise 13-1: Adding Paper to an Upright Friction-Feed Tray |
|
|
505 | (3) |
|
|
508 | (2) |
|
|
510 | (1) |
|
|
511 | (1) |
|
Maintenance Kits and Page Counts |
|
|
511 | (1) |
|
|
511 | (2) |
|
Ensuring a Suitable Environment |
|
|
513 | (1) |
|
|
513 | (8) |
|
|
513 | (2) |
|
|
515 | (1) |
|
Multiple Pending Prints in Queue |
|
|
515 | (1) |
|
Exercise 13-2: Restarting the Print Spooler Service |
|
|
516 | (1) |
|
|
516 | (3) |
|
Grinding or Clicking Noise |
|
|
519 | (1) |
|
Incorrect Paper Size or Orientation |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
522 | (2) |
|
|
524 | (3) |
|
|
527 | (6) |
Part IV Laptops and Mobile Devices |
|
|
14 Configuring and Using Laptops |
|
|
533 | (46) |
|
Repairing, Upgrading, and Configuring Laptops |
|
|
534 | (16) |
|
|
535 | (1) |
|
|
535 | (2) |
|
Replacing Laptop Components |
|
|
537 | (13) |
|
Exercise 14-1: Installing SODIMM Memory |
|
|
541 | (3) |
|
Exercise 14-2: Replacing a Hard Drive |
|
|
544 | (2) |
|
Exercise 14-3: Replacing a Display Screen |
|
|
546 | (4) |
|
|
550 | (10) |
|
Placing a PC in a Low-Power Mode |
|
|
550 | (1) |
|
Configuring Power Management in Windows |
|
|
551 | (9) |
|
Exercise 14-4: Creating a Power Plan |
|
|
555 | (5) |
|
Laptop Connection Methods and Accessories |
|
|
560 | (5) |
|
|
560 | (1) |
|
Port Replicators and Docking Stations |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
562 | (3) |
|
Exercise 14-5: Exploring Touchpad Settings |
|
|
563 | (2) |
|
Troubleshooting Laptop Problems |
|
|
565 | (4) |
|
|
565 | (1) |
|
|
566 | (1) |
|
Touchpad and Mouse Troubleshooting |
|
|
566 | (1) |
|
Touch Screen/Digitizer Troubleshooting |
|
|
567 | (1) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
570 | (2) |
|
|
572 | (4) |
|
|
576 | (3) |
|
15 Supporting Mobile Devices |
|
|
579 | (38) |
|
Configuring and Using Mobile Device Connections |
|
|
580 | (10) |
|
Connecting to Wireless Networks |
|
|
581 | (2) |
|
|
583 | (3) |
|
|
586 | (1) |
|
|
586 | (4) |
|
|
590 | (6) |
|
|
591 | (2) |
|
|
593 | (2) |
|
Recovering After a Device Is Lost or Stolen |
|
|
595 | (1) |
|
Troubleshooting Mobile Device Problems |
|
|
596 | (9) |
|
|
596 | (3) |
|
|
599 | (2) |
|
|
601 | (1) |
|
|
602 | (1) |
|
Screen Does Not Auto-Rotate |
|
|
602 | (1) |
|
|
603 | (1) |
|
Closing, Uninstalling, and Reinstalling Mobile Applications |
|
|
603 | (1) |
|
Resetting a Mobile Device |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
606 | (2) |
|
|
608 | (3) |
|
|
611 | (6) |
Part V Networking |
|
|
|
617 | (46) |
|
|
618 | (2) |
|
|
619 | (1) |
|
|
619 | (1) |
|
Metropolitan Area Network |
|
|
619 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
Internet Connection Types |
|
|
620 | (5) |
|
Understanding Bandwidth and Latency |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
622 | (1) |
|
|
623 | (2) |
|
Exercise 16-1: Testing Broadband Speeds |
|
|
624 | (1) |
|
Network Software and Protocols |
|
|
625 | (15) |
|
|
625 | (1) |
|
|
626 | (2) |
|
|
628 | (9) |
|
Exercise 16-2: Viewing the Physical and IP Addresses of a NIC |
|
|
635 | (2) |
|
|
637 | (3) |
|
|
640 | (13) |
|
|
640 | (1) |
|
|
640 | (5) |
|
Wireless Networking Standards |
|
|
645 | (2) |
|
Devices for Connecting to LANs and the Internet |
|
|
647 | (5) |
|
Exercise 16-3: Identifying Network Hardware |
|
|
651 | (1) |
|
Software-Defined Networking |
|
|
652 | (1) |
|
|
653 | (1) |
|
|
653 | (3) |
|
|
656 | (4) |
|
|
660 | (3) |
|
17 Installing a Small Office/Home Office (SOHO) Network |
|
|
663 | (40) |
|
|
664 | (5) |
|
Crimper and Cable Stripper |
|
|
664 | (1) |
|
|
665 | (1) |
|
|
666 | (1) |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
668 | (1) |
|
Installing and Configuring SOHO Networks |
|
|
669 | (18) |
|
Installing a Network Adapter |
|
|
669 | (1) |
|
Connecting a Network Adapter to a Switch or Router |
|
|
670 | (1) |
|
|
670 | (7) |
|
Securing a Wireless Network |
|
|
677 | (10) |
|
Exercise 17-1: Configuring a WAP or Wireless Router |
|
|
683 | (4) |
|
Configuring a Network on a Windows PC |
|
|
687 | (7) |
|
Connecting to a Hidden Wireless Network |
|
|
689 | (1) |
|
Using a Metered Connection |
|
|
689 | (1) |
|
Using a Static IP Address |
|
|
689 | (3) |
|
Exercise 17-2: Configuring a Static IP Address |
|
|
690 | (2) |
|
Forgetting a Wireless Network |
|
|
692 | (1) |
|
Virtual Private Networking |
|
|
692 | (2) |
|
|
694 | (1) |
|
|
694 | (2) |
|
|
696 | (4) |
|
|
700 | (3) |
|
18 Internet, Cloud, and Remote Access |
|
|
703 | (38) |
|
|
704 | (11) |
|
How the Internet Is Structured |
|
|
704 | (1) |
|
Internet Service Providers |
|
|
705 | (1) |
|
Domain Names, IP Addresses, and DNS Servers |
|
|
706 | (1) |
|
Internet Services and Protocols |
|
|
707 | (3) |
|
|
710 | (3) |
|
Legacy and Embedded Systems |
|
|
713 | (1) |
|
|
714 | (1) |
|
Configuring Browser and Internet Settings |
|
|
715 | (7) |
|
Browser Download and Installation |
|
|
716 | (1) |
|
|
716 | (1) |
|
|
716 | (1) |
|
Secure Connections and Sites |
|
|
717 | (1) |
|
|
718 | (1) |
|
Exercise 18-1: Configuring a Proxy Server |
|
|
718 | (1) |
|
Browser Security and Privacy Settings |
|
|
719 | (3) |
|
|
722 | (3) |
|
Characteristics of a Cloud Environment |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
Cloud Services and Functions |
|
|
724 | (1) |
|
Remote Access Technologies |
|
|
725 | (6) |
|
Establishing a Remote Desktop Connection in Windows |
|
|
726 | (4) |
|
Exercise 18-2: Allowing Remote Desktop Connections |
|
|
726 | (2) |
|
Exercise 18-3: Establishing a Remote Desktop Connection |
|
|
728 | (2) |
|
Using Third-Party Remote Desktop Tools |
|
|
730 | (1) |
|
Security Considerations for Remote Access |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
732 | (3) |
|
|
735 | (3) |
|
|
738 | (3) |
|
19 Troubleshooting Networks |
|
|
741 | (40) |
|
Troubleshooting Common Network Problems |
|
|
742 | (24) |
|
Opening a Command Prompt or Terminal Window |
|
|
743 | (1) |
|
Command-Line Tools for Network Troubleshooting |
|
|
743 | (2) |
|
|
745 | (15) |
|
Exercise 19-1: Using tracert and pathping |
|
|
757 | (3) |
|
Resolving Slow Network Speed |
|
|
760 | (2) |
|
Troubleshooting DNS Problems |
|
|
762 | (4) |
|
Exercise 19-2: Using nslookup to Troubleshoot DNS |
|
|
764 | (2) |
|
Preventive Maintenance for Networks |
|
|
766 | (2) |
|
|
767 | (1) |
|
Securing and Protecting Network Cabling |
|
|
768 | (1) |
|
|
768 | (1) |
|
|
769 | (2) |
|
|
771 | (4) |
|
|
775 | (6) |
Part VI Security |
|
|
20 Physical Security and User Authentication |
|
|
781 | (50) |
|
Security Threats: An Overview |
|
|
782 | (1) |
|
Securing the Local Physical Environment |
|
|
783 | (8) |
|
|
784 | (1) |
|
|
784 | (1) |
|
|
785 | (1) |
|
Preventing Piggybacking and Tailgating |
|
|
786 | (1) |
|
|
786 | (1) |
|
|
786 | (1) |
|
Preventing Dumpster Diving |
|
|
787 | (1) |
|
|
787 | (1) |
|
Detecting Weapons at Key Entry Points |
|
|
787 | (1) |
|
Preventing Unauthorized Physical Access to Information |
|
|
788 | (1) |
|
Using BIOS/UEFI Passwords |
|
|
788 | (2) |
|
Locking a Computer with Windows |
|
|
790 | (1) |
|
Securely Disposing of Data Storage Hardware |
|
|
791 | (3) |
|
|
791 | (1) |
|
Physically Destroying a Storage Device |
|
|
792 | (2) |
|
Working with User Accounts |
|
|
794 | (27) |
|
|
794 | (5) |
|
Apple IDs and Corporate Accounts |
|
|
799 | (1) |
|
Managing Local User and Group Accounts in Windows |
|
|
799 | (8) |
|
Best Practices to Secure a Workstation |
|
|
807 | (4) |
|
Adjusting User Account Control Settings |
|
|
811 | (2) |
|
Setting Local Security Policies |
|
|
813 | (2) |
|
Exercise 20-1: Using the Local Security Policy Editor |
|
|
814 | (1) |
|
Using Windows Credential Manager |
|
|
815 | (1) |
|
Managing Domain User Accounts |
|
|
816 | (5) |
|
|
821 | (1) |
|
|
821 | (3) |
|
|
824 | (3) |
|
|
827 | (4) |
|
21 Protecting and Managing Data |
|
|
831 | (36) |
|
Configuring Windows Clients for Sharing |
|
|
832 | (6) |
|
Public vs. Private Networks |
|
|
833 | (1) |
|
Exercise 21-1: Changing Between Private and Public Settings |
|
|
834 | (1) |
|
|
834 | (2) |
|
|
836 | (2) |
|
Implementing File Sharing and Security |
|
|
838 | (12) |
|
|
838 | (3) |
|
Exercise 21-2: Viewing Folder Permissions in Windows |
|
|
840 | (1) |
|
Applying Share Permissions |
|
|
841 | (3) |
|
Exercise 21-3: Creating a Share and Modifying Share Permissions |
|
|
844 | (1) |
|
|
844 | (1) |
|
Connecting to a Shared Folder |
|
|
845 | (2) |
|
Applying NTFS File and Folder Encryption |
|
|
847 | (1) |
|
|
847 | (2) |
|
|
849 | (1) |
|
|
850 | (7) |
|
Scheduled vs. Real-Time Backups |
|
|
851 | (1) |
|
Backup Software and Technologies |
|
|
851 | (1) |
|
|
852 | (1) |
|
|
853 | (1) |
|
|
853 | (1) |
|
Using Backup Tools in macOS |
|
|
854 | (1) |
|
Using Backup Tools in Linux |
|
|
854 | (2) |
|
|
856 | (1) |
|
Protecting Storage from Electrical Interruption |
|
|
857 | (1) |
|
|
857 | (1) |
|
Uninterruptible Power Supply |
|
|
857 | (1) |
|
|
858 | (1) |
|
|
859 | (1) |
|
|
860 | (4) |
|
|
864 | (3) |
|
22 Defending Against Malware and Social Engineering |
|
|
867 | (42) |
|
|
868 | (12) |
|
Malicious Software Attacks |
|
|
869 | (1) |
|
|
870 | (2) |
|
Vulnerabilities and Exploits |
|
|
872 | (1) |
|
|
873 | (1) |
|
Methods for Gaining Access and Obtaining Information |
|
|
874 | (6) |
|
Exercise 22-1: What Is Your Phishing IQ? |
|
|
877 | (3) |
|
Identifying the Symptoms of Malware Infection |
|
|
880 | (5) |
|
Internet Connectivity and Browser Behavior |
|
|
880 | (1) |
|
Operating System Problems |
|
|
880 | (3) |
|
Unexpected E-mail Behavior |
|
|
883 | (1) |
|
Symptoms of Infection on a Mobile Device |
|
|
884 | (1) |
|
Implementing a Defense Against Malware |
|
|
885 | (14) |
|
|
885 | (1) |
|
|
885 | (1) |
|
|
886 | (1) |
|
|
887 | (6) |
|
Exercise 22-2: Configuring Windows Defender Firewall |
|
|
890 | (1) |
|
Exercise 22-3: Creating a Firewall Rule |
|
|
891 | (2) |
|
Antivirus and Antimalware Software |
|
|
893 | (3) |
|
|
896 | (3) |
|
|
899 | (1) |
|
|
899 | (2) |
|
|
901 | (3) |
|
|
904 | (5) |
|
|
909 | (12) |
|
|
909 | (2) |
|
|
910 | (1) |
|
Scripting-Related Risks and Hazards |
|
|
910 | (1) |
|
|
911 | (1) |
|
|
912 | (1) |
|
|
913 | (1) |
|
|
913 | (1) |
|
|
913 | (1) |
|
|
913 | (2) |
|
|
914 | (1) |
|
|
915 | (1) |
|
Common Scripting Elements |
|
|
915 | (3) |
|
|
916 | (1) |
|
|
916 | (1) |
|
|
917 | (1) |
|
Active Directory User Logon Scripts |
|
|
918 | (3) |
A About the Online Content |
|
921 | (6) |
|
|
922 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
922 | (1) |
|
|
922 | (1) |
|
Single User License Terms and Conditions |
|
|
922 | (2) |
|
|
924 | (1) |
|
|
924 | (1) |
|
Performance-Based Questions |
|
|
924 | (1) |
|
Video Training from the Author |
|
|
925 | (1) |
|
|
925 | (1) |
|
|
925 | (1) |
|
|
925 | (2) |
Index |
|
927 | |