Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Comptia ITF | Comptia IT Fundamentals (ITF+) FC0-U61 Prep
Introduction to IT Fundamentals
History of Computer (1:40)
What is a Computer? (1:26)
Benefits of Using Computer (0:37)
Types of Computer (1:07)
Quiz
Components of Computer
Input Processing - Output Cycle (6:14)
Computer Inputs (0:57)
What is Processing (1:18)
Cyper Attacks to CPU (1:04)
What is Storing? (0:53)
Output (1:23)
Computer Components (2:54)
Input Devices (2:28)
Quiz
Storage Devices
RAM (1:18)
Primary and Secondary Memory (4:20)
SRAM and DRAM (1:28)
ROM (1:12)
PROM, EPROM, EEPROM (1:04)
Storage Devices (2:19)
Network attached storage (1:40)
Cloud Storage (1:31)
Quiz
Processing Devices
Processing Devices (3:00)
GPU (2:46)
Motherboard (1:15)
Output Devices (0:38)
Quiz
IoT & Mobile
Where does IoT Exist in Our Lives? (1:47)
What is IoT (3:29)
How does IoT work (0:47)
Connection Standarts (9:06)
IoT Security (6:59)
Mobile Security Threats (8:00)
Network Components
Internet (OSI & TCP/IP Referans Models) (15:55)
Reference Models: OSI vs TCP/IP (3:05)
Data Link Layer and Protocols (4:47)
DNS: Domain Name System (7:13)
Network Interface Card (2:06)
What is Hub? (1:23)
What is Switch? (1:46)
How does switch work? (2:21)
What is Router? (1:33)
What is Bridge? (2:25)
Modem Types (2:59)
Wireless Access Point (WAP) (1:06)
Firewall and Network Components (7:49)
Quiz
Operating Systems
What is Operating System (2:35)
Functions Of Operating Systems (10:25)
Kinds of Operating System (1:47)
Server Operating Systems (7:53)
Classification of Operating Systems (2:01)
Linux Systems (5:13)
Windows and MacOS (3:28)
Virtualbox Virtualization Software (3:13)
Quiz
Libraries and Virtualization
What is a Library - 1 (4:40)
What is Virtualization? (1:06)
Types of Virtualization (1:37)
Functions of Virtualization (1:06)
Security of the Virtualization (3:01)
Virtualization Lab Exercise - 1 (8:14)
Virtualization Lab Exercise - 2 (12:35)
What is a Library - 2 (4:21)
Quiz
Programming Languages
Programming Languages (4:54)
Types of Programming (9:19)
Cloud Computing
What is Cloud Computing (3:31)
Characteristics of Cloud Computing (9:19)
Cloud Service Modules - 1 (7:31)
Cloud Service Modules - 2 (6:27)
Security
The CIA Triad What is Cybersecurity? Principles What is Threat? (26:42)
Security vs Privacy What are Bot/Botnet and Zombies? (33:04)
Hacker Types Types of Malware (16:33)
Cyber Kill Chain Advanced Persistent Threat (APT) (19:26)
Advanced Persistent Threat (APT) (1:53)
What is IAM (8:11)
Firewall (12:18)
Cryptography Fundamentals (7:48)
Cryptographic Algorithms (8:34)
Storage Devices
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock