{"id":13154,"date":"2022-08-16T16:03:01","date_gmt":"2022-08-16T13:03:01","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=13154"},"modified":"2024-12-21T20:07:34","modified_gmt":"2024-12-21T17:07:34","slug":"it-fundamentals-plus","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/it-fundamentals-plus\/","title":{"rendered":"CompTIA IT Fundamentals (ITF+) Course"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">The CompTIA IT Fundamentals certification is designed to help you to become in the world of information technology (IT). It helps to decide if a career in IT is right for them or to build up a more extensive understanding of IT. CompTIA IT Fundamentals likewise be a venturing stone to further developed certifications such as CompTIA A+, and, with particular experience, CompTIA Network+ and CompTIA Security+.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">CompTIA certificates are supported by HADAF Program in Saudi Arabia<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Benefits<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Software installation and configuration, network connectivity, security issues, and basic<\/li>\n<li>Prepare and pass the CompTIA IT Fundamentals FC0-U61 Certification<\/li>\n<li>Using security &amp; web browsing best<\/li>\n<li>Using features &amp; functions of common operating systems and establishing network connectivity.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li style=\"text-align: left;\">Module 1: using computer<\/li>\n<li style=\"text-align: left;\">Module 2 : using apps and database<\/li>\n<li style=\"text-align: left;\">Module 3 : using computer hardware<\/li>\n<li style=\"text-align: left;\">Module 4 using network<\/li>\n<li style=\"text-align: left;\">Module 5 security concepts<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course requirements<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">There are no specific prerequisites required to attend CompTIA IT Fundamentals training.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Exam requirements<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">There are no specific prerequisites required to attend CompTIA IT Fundamentals Exam<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>LAB Requirement<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">It is recommended to have LAB in this course<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 1: Using Computer<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li style=\"text-align: left;\">Computing Devices<\/li>\n<li style=\"text-align: left;\">Information Technology<\/li>\n<li style=\"text-align: left;\">Personal Computers (PC)<\/li>\n<li style=\"text-align: left;\">Mobile and IoT Devices<\/li>\n<li style=\"text-align: left;\">Workstation<\/li>\n<li style=\"text-align: left;\">Setting up a PC System<\/li>\n<li style=\"text-align: left;\">Ergonomic Concepts<\/li>\n<li style=\"text-align: left;\">Navigating an OS<\/li>\n<li style=\"text-align: left;\">Using Input Devices<\/li>\n<li style=\"text-align: left;\">Icons and Windows<\/li>\n<li style=\"text-align: left;\">Functions of an Operating System<\/li>\n<li style=\"text-align: left;\">Types of Operating System<\/li>\n<li style=\"text-align: left;\">Virtualization<\/li>\n<li>Microsoft Windows<\/li>\n<li>Apple macOS and iOS<\/li>\n<li>Linux, Chrome, and Android<\/li>\n<li>File Explorer<\/li>\n<li>Windows Settings and Control Panel<\/li>\n<li>Using a Web Browser<\/li>\n<li>Management Interfaces<\/li>\n<li>Process and Service Management<\/li>\n<li>Memory and Disk Management<\/li>\n<li>Command Line Interfaces<\/li>\n<li>Access Control and Protection<\/li>\n<li>Support and Troubleshooting<\/li>\n<li>Identifying the Problem<\/li>\n<li>Understanding the Problem<\/li>\n<li>Resolving and Documenting the Problem<\/li>\n<li>Developing a Troubleshooting Approach<\/li>\n<li>Troubleshooting PC Issues<\/li>\n<li>Getting Support<\/li>\n<li>Using a Search Engine<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 2 : Using Apps and Database<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Notational Systems<\/li>\n<li>Units of Measure<\/li>\n<li>Data Types<\/li>\n<li>Data Representation<\/li>\n<li>The Value of Data<\/li>\n<li>Intellectual Property<\/li>\n<li>Data-driven Business Decisions<\/li>\n<li>Installing Applications<\/li>\n<li>Application Management<\/li>\n<li>Managing Software Licensing<\/li>\n<li>Productivity Software<\/li>\n<li>Collaboration Software<\/li>\n<li>Business Software<\/li>\n<li>Programming Logic<\/li>\n<li>Programming Languages<\/li>\n<li>Programming Concepts<\/li>\n<li>Object-Oriented Programming<\/li>\n<li>Scripting Languages<\/li>\n<li>Application Platforms and Delivery<\/li>\n<li>Database Concepts<\/li>\n<li>Database Structures<\/li>\n<li>Relational Methods<\/li>\n<li>Database Access Methods<\/li>\n<li>Application Architecture Models<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 3 : Using Computer Hardwar<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Selecting a Computer<\/li>\n<li>Motherboard Components<\/li>\n<li>Processors<\/li>\n<li>Features of Processors<\/li>\n<li>Expansion Bus<\/li>\n<li>System Cooling<\/li>\n<li>BIOS and UEFI System Firmware<\/li>\n<li>Computer Connector Types<\/li>\n<li>USB and Firewire<\/li>\n<li>Graphic Devices<\/li>\n<li>Graphic Device Interfaces<\/li>\n<li>Input Devices<\/li>\n<li>Configuring Peripherals<\/li>\n<li>Bluetooth and NFC<\/li>\n<li>Networking Interfaces<\/li>\n<li>Installing and Uninstalling<\/li>\n<li>Peripherals<\/li>\n<li>Display Devices<\/li>\n<li>Display Settings<\/li>\n<li>Multimedia Ports and Devices<\/li>\n<li>Printer Types<\/li>\n<li>Installing and Configuring a Printer<\/li>\n<li>Scanners and Cameras<\/li>\n<li>System Memory<\/li>\n<li>Mass Storage Devices<\/li>\n<li>Optical Discs and Drives<\/li>\n<li>Flash Memory Devices<\/li>\n<li>Managing the File System<\/li>\n<li>Folders and Directories<\/li>\n<li>File Explorer<\/li>\n<li>Files<\/li>\n<li>File Attributes and Permissions<\/li>\n<li>Searching for Folders and Files<\/li>\n<li>File Types and Extensions<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 4: Using Network<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Network Components<\/li>\n<li>TCP\/IP<\/li>\n<li>Internet Protocol<\/li>\n<li>Address Resolution Protocol<\/li>\n<li>DNS and URLs<\/li>\n<li>Internet Application Services<\/li>\n<li>Internet Service Types<\/li>\n<li>Wireless Internet Services<\/li>\n<li>Setting Up a Wireless Network<\/li>\n<li>Configuring a Wireless Client<\/li>\n<li>Safe Browsing Practices<\/li>\n<li>Configuring Browser Security<\/li>\n<li>Managing Cookies and PII<\/li>\n<li>Digital Certificates and Antiphishing<\/li>\n<li>Enabling a Firewall<\/li>\n<li>Local Sharing and Storage<\/li>\n<li>Windows File Sharing<\/li>\n<li>Hosted Sharing and Storage Backups<\/li>\n<li>Windows Backup<\/li>\n<li>Using a Mobile Device<\/li>\n<li>Mobile Applications and App Stores<\/li>\n<li>Network Connectivity<\/li>\n<li>Email Configuration<\/li>\n<li>Synchronization and Data Transfer<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 5: Security Concepts<\/p>\n<ul dir=\"ltr\">\n<li style=\"text-align: justify;\">Computer Security Basics<\/li>\n<li style=\"text-align: justify;\">Social Engineering<\/li>\n<li style=\"text-align: justify;\">Business Continuity<\/li>\n<li style=\"text-align: justify;\">Disaster Recovery<\/li>\n<li style=\"text-align: justify;\">Securing Devices Malware<\/li>\n<li style=\"text-align: justify;\">Preventing Malware Infections Spam<\/li>\n<li style=\"text-align: justify;\">Software Sources and Patch Management<\/li>\n<li style=\"text-align: justify;\">Access Controls<\/li>\n<li style=\"text-align: justify;\">User Account Types<\/li>\n<li style=\"text-align: justify;\">Authentication Factors<\/li>\n<li style=\"text-align: justify;\">Uses of Encryption<\/li>\n<li style=\"text-align: justify;\">Password Cracking and Management<\/li>\n<li style=\"text-align: justify;\">Policies and Procedures<\/li>\n<li style=\"text-align: justify;\">Handling Confidential Information<\/li>\n<li style=\"text-align: justify;\">Acceptable Use Policies<\/li>\n<li style=\"text-align: justify;\">Expectations of Privacy<\/li>\n<li style=\"text-align: justify;\">Taking the Exam<\/li>\n<li style=\"text-align: justify;\">Career Advice<\/li>\n<li style=\"text-align: justify;\">Glossary<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":13252,"template":"","course_category":[74,38],"class_list":["post-13154","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-compatia-en","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":8,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13154\/revisions"}],"predecessor-version":[{"id":27599,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13154\/revisions\/27599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/13252"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13154"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}