CompTIA Complete Self-Paced Outline
The following topics are general guidelines for the content covered in the online
video program, and on the CompTIA exams. However, other related topics may also
appear on any specific delivery of the class and/or exams:
Configure and apply BIOS settings.
Differentiate between motherboard components, their purposes, and properties.
Compare and contrast RAM types and features.
Install and configure expansion cards.
Install and configure storage devices and use appropriate media.
Differentiate among various CPU types and features and select the appropriate cooling
Compare and contrast various connection interfaces and explain their purpose.
Install an appropriate power supply based on a given scenario.
Evaluate and select appropriate components for a custom configuration, to meet customer
specifications or needs.
Given a scenario, evaluate types and features of display devices.
Identify connector types and associated cables.
Install and configure various peripheral devices.
Identify types of network cables and connectors.
Categorize characteristics of connectors and cabling.
Explain properties and characteristics of TCP/IP.
Explain common TCP and UDP ports, protocols, and their purpose.
Compare and contrast wireless networking standards and encryption types.
Install, configure, and deploy a SOHO wireless/wired router using appropriate settings.
Compare and contrast Internet connection types and features.
Identify various types of networks.
Compare and contrast network devices, their functions, and features.
Given a scenario, use appropriate networking tools.
Install and configure laptop hardware and components.
Compare and contrast the components within the display of a laptop.
Compare and contrast laptop features.
Explain the differences between the various printer types and summarize the associated
Given a scenario, install, and configure printers.
Given a scenario, perform printer maintenance.
Given a scenario, use appropriate safety procedures.
Explain environmental impacts and the purpose of environmental controls.
Given a scenario, demonstrate proper communication and professionalism.
Explain the fundamentals of dealing with prohibited content/activity.
Compare and contrast the features and requirements of various Microsoft Operating
Given a scenario, install, and configure the operating system using the most appropriate
Given a scenario, use appropriate command line tools.
Given a scenario, use appropriate operating system features and tools.
Given a scenario, use Control Panel utilities.
Setup and configure Windows networking on a client/desktop.
Perform preventive maintenance procedures using appropriate tools.
Explain the differences among basic OS security settings.
Explain the basics of client-side virtualization.
Apply and use common prevention methods.
Compare and contrast common security threats.
Implement security best practices to secure a workstation.
Given a scenario, use the appropriate data destruction/disposal method.
Given a scenario, secure a SOHO wireless network.
Given a scenario, secure a SOHO wired network.
Explain the basic features of mobile operating systems.
Establish basic network connectivity and configure email.
Compare and contrast methods for securing mobile devices.
Compare and contrast hardware differences in regards to tablets and laptops.
Execute and configure mobile device synchronization.
Given a scenario, explain the troubleshooting theory.
Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU
and power with appropriate tools.
Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
Given a scenario, troubleshoot common video and display issues.
Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
Given a scenario, troubleshoot operating system problems with appropriate tools.
Given a scenario, troubleshoot common security issues with appropriate tools and
Given a scenario, troubleshoot, and repair common laptop issues while adhering to
the appropriate procedures.
Given a scenario, troubleshoot printers with appropriate tools.
Compare the layers of the OSI and TCP/IP models.
Classify how applications, devices, and protocols relate to the OSI model layers.
Explain the purpose and properties of IP addressing.
Explain the purpose and properties of routing and switching.
Identify common TCP and UDP default ports.
Explain the function of common networking protocols.
Summarize DNS concepts and its components.
Given a scenario, implement network troubleshooting methodology
Identify virtual network components.
Network Installation and Configuration
Given a scenario, install and configure routers and switches.
Given a scenario, install and configure a wireless network.
Explain the purpose and properties of DHCP.
Given a scenario, troubleshoot common wireless problems.
Given a scenario, troubleshoot common router and switch problems.
Given a set of requirements, plan and implement a basic SOHO network.
Network Media and Topologies
Categorize standard media types and associated properties.
Categorize standard connector types based on network media.
Compare and contrast different wireless standards.
Categorize WAN technology types and properties.
Describe different network topologies.
Given a scenario, troubleshoot common physical connectivity problems.
Compare and contrast different LAN technologies.
Identify components of wiring distribution.
Explain the purpose and features of various network appliances.
Given a scenario, use appropriate hardware tools to troubleshoot connectivity issues.
Given a scenario, use appropriate software tools to troubleshoot connectivity issues.
Given a scenario, use the appropriate network monitoring resource to analyze traffic.
Describe the purpose of configuration management documentation.
Explain different methods and rationales for network performance optimization.
Given a scenario, implement appropriate wireless security measures.
Explain the methods of network access security.
Explain methods of user authentication.
Explain common threats, vulnerabilities, and mitigation techniques.
Given a scenario, install and configure a basic firewall.
Categorize different types of network security appliances and methods.
Implement security configuration parameters on network devices and other technologies.
Given a scenario, use secure network administration principles.
Explain network design elements and components.
Given a scenario, implement common protocols and services.
Given a scenario, troubleshoot security issues related to wireless networking.
Compliance and Operational Security
Explain the importance of risk related concepts.
Summarize the security implications of integrating systems and data with third parties.
Given a scenario, implement appropriate risk mitigation strategies.
Given a scenario, implement basic forensic procedures.
Summarize common incident response procedures.
Explain the importance of security related awareness and training.
Compare and contrast physical security and environmental controls.
Summarize risk management best practices.
Given a scenario, select the appropriate control to meet the goals of security.
Threats and Vulnerabilities
Explain types of malware.
Summarize various types of attacks.
Summarize social engineering attacks and the associated effectiveness with each
Explain types of wireless attacks.
Explain types of application attacks.
Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
Given a scenario, use appropriate tools and techniques to discover security threats
Explain the proper use of penetration testing versus vulnerability scanning.
Application, Data and Host Security
Explain the importance of application security controls and techniques.
Summarize mobile security concepts and technologies.
Given a scenario, select the appropriate solution to establish host security.
Implement the appropriate controls to ensure data security.
Compare and contrast alternative methods to mitigate security risks in static environments.
Access Control and Identity Management
Compare and contrast the function and purpose of authentication services.
Given a scenario, select the appropriate authentication, authorization or access
Install and configure security controls when performing account management, based
on best practices.
Given a scenario, utilize general cryptography concepts.
Given a scenario, use appropriate cryptographic methods.
Given a scenario, use appropriate PKI, certificate management and associated components.
Distinguish which cryptographic tools and techniques are appropriate for a given
Distinguish and select among different types of virtualized, distributed and shared
Explain the security implications of enterprise storage
Integrate hosts, networks, infrastructures, applications and storage into secure
Distinguish among security controls for hosts
Explain the importance of application security
Given a scenario, distinguish and select the method or tool that is appropriate
to conduct an assessment
Risk Management, Policy / Procedure and Legal
Analyze the security risk implications associated with business decisions
Execute and implement risk mitigation strategies and controls
Explain the importance of preparing for and supporting the incident response and
Implement security and privacy policies and procedures based on organizational requirements.
Research and Analysis
Analyze industry trends and outline potential impact to the enterprise
Carry out relevant analysis for the purpose of securing the enterprise
Integration of Computing, Communications and Business Disciplines
Integrate enterprise disciplines to achieve secure solutions
Explain the security impact of inter-organizational change
Select and distinguish the appropriate security controls with regard to communications
Explain advanced authentication tools, techniques and concepts
Carry out security activities across the technology life cycle
Over the Air Technolgies
802.11 Wireless Technologies
Issues With RF
NON 802.11 Wireless
Governing Bodies And Regulations