vinsys
Vinsys International
Vinsys IT Services
HomeCorporateIndividualGalleryOur PresenceAbout UsCareerPrivacy PolicyTerms and ConditionsBe An Instructor
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":5,"courseSummary":"In the event that you are preparing for a vocation as a passage level information technology (IT) expert or PC benefit specialist, the CompTIA® A+® course is the initial phase in your readiness. The CompTIA A+ certification training course will expand on your current client level learning and involvement with (PC) programming and equipment to display principal aptitudes and ideas that you will use at work. In this course, you will get the fundamental aptitudes and data you should introduce, design, streamline, investigate, repair, update, and perform preventive upkeep on PCs, computerized gadgets, and working frameworks. This course gives the foundation learning and abilities you will require to be an effective A+ specialist. It can likewise help you in the event that you are planning to take the CompTIA A+ certification examinations, 2016 targets, with a specific end goal to end up a CompTIA A+ Certified Professional.","pageId":"comptia-a-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"project-management","courseName":"CompTIA A+ Certification Training","courseImage":"a-certification.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.5,"courseStartsOn":"","pageURL":"/project-management/comptia-a-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
5
In the event that you are preparing for a vocation as a passage level information technology (IT) expert or PC benefit specialist, the CompTIA® A+® course is the initial phase in your readiness. The CompTIA A+ certification training course will expand on your current client level learning and involvement with (PC) programming and equipment to display principal aptitudes and ideas that you will use at work. In this course, you will get the fundamental aptitudes and data you should introduce, design, streamline, investigate, repair, update, and perform preventive upkeep on PCs, computerized gadgets, and working frameworks. This course gives the foundation learning and abilities you will require to be an effective A+ specialist. It can likewise help you in the event that you are planning to take the CompTIA A+ certification examinations, 2016 targets, with a specific end goal to end up a CompTIA A+ Certified Professional.
comptia-a-certification-training
10000
2000
Technology Training
Online
project-management

CompTIA A+ Certification Training

CompTIA A+ Certification Training

a-certification.png
true
images/
ALL
4.5
WeekEnd
[{"reviewUser":{"firstName":"Mr.Ammar","lastName":"Elkaderi","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I had a keen eye on obtaining the CompTIA A+ Certification. That was because of its major advantages that it provides like higher salary, satisfaction, a larger base of career choices, etc. Thus, I joined Vinsys\u2019 CompTIA A+ Certification Training Program. Their program was very helpful and I was able to bag my Certification easily.","course":"Business Communication","id":null,"ratingCount":5,"title":"Senior Business Analyst"},{"reviewUser":{"firstName":"Mr. Kiran","lastName":"Raghavan","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I had been working as a computer professional for quite a few years and I wanted to specialise on some certain branches and parts in the field so that I could progress. Hence I enrolled for Vinsys\u2019 CompTIA A+ Certification Training Program. The study material provided to me for the course was exceptional and I was able to get my Certification without any hindrances.","course":"Business Communication","id":null,"ratingCount":4,"title":"Senior Business Analyst"},{"reviewUser":{"firstName":"Mr.Pravin","lastName":"Pawar","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"The CompTIA A+ Certification is the one of those certifications which provides the bearer a bunch of further career options. I wanted to have this precious Certification and thus decided to join Vinsys\u2019 CompTIA A+ Certification Training Program after which getting the certification was like a child\u2019s play. ","course":"Business Communication","id":null,"ratingCount":3,"title":"Business Analyst"}]
{"reviewUser":{"firstName":"Mr.Ammar","lastName":"Elkaderi","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I had a keen eye on obtaining the CompTIA A+ Certification. That was because of its major advantages that it provides like higher salary, satisfaction, a larger base of career choices, etc. Thus, I joined Vinsys\u2019 CompTIA A+ Certification Training Program. Their program was very helpful and I was able to bag my Certification easily.","course":"Business Communication","id":null,"ratingCount":5,"title":"Senior Business Analyst"}
{"firstName":"Mr.Ammar","lastName":"Elkaderi","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr.Ammar
Elkaderi
/reviewer.png
/images
1
I had a keen eye on obtaining the CompTIA A+ Certification. That was because of its major advantages that it provides like higher salary, satisfaction, a larger base of career choices, etc. Thus, I joined Vinsys? CompTIA A+ Certification Training Program. Their program was very helpful and I was able to bag my Certification easily.
Business Communication
5
Senior Business Analyst
{"reviewUser":{"firstName":"Mr. Kiran","lastName":"Raghavan","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I had been working as a computer professional for quite a few years and I wanted to specialise on some certain branches and parts in the field so that I could progress. Hence I enrolled for Vinsys\u2019 CompTIA A+ Certification Training Program. The study material provided to me for the course was exceptional and I was able to get my Certification without any hindrances.","course":"Business Communication","id":null,"ratingCount":4,"title":"Senior Business Analyst"}
{"firstName":"Mr. Kiran","lastName":"Raghavan","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr. Kiran
Raghavan
/reviewer.png
/images
1
I had been working as a computer professional for quite a few years and I wanted to specialise on some certain branches and parts in the field so that I could progress. Hence I enrolled for Vinsys? CompTIA A+ Certification Training Program. The study material provided to me for the course was exceptional and I was able to get my Certification without any hindrances.
Business Communication
4
Senior Business Analyst
{"reviewUser":{"firstName":"Mr.Pravin","lastName":"Pawar","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"The CompTIA A+ Certification is the one of those certifications which provides the bearer a bunch of further career options. I wanted to have this precious Certification and thus decided to join Vinsys\u2019 CompTIA A+ Certification Training Program after which getting the certification was like a child\u2019s play. ","course":"Business Communication","id":null,"ratingCount":3,"title":"Business Analyst"}
{"firstName":"Mr.Pravin","lastName":"Pawar","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr.Pravin
Pawar
/reviewer.png
/images
1
The CompTIA A+ Certification is the one of those certifications which provides the bearer a bunch of further career options. I wanted to have this precious Certification and thus decided to join Vinsys? CompTIA A+ Certification Training Program after which getting the certification was like a child?s play.
Business Communication
3
Business Analyst
0
[{"tabName":"What you will learn","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]}],"description":"In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:","_id":2},"_id":2}},{"tabName":"Audience","tabNumber":2,"content":{"ParamDetails":{"features":null,"description":"This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ 220-901 Certification Exam and the CompTIA 220-902 Certification Exam."},"_id":1}},{"tabName":"Eligibility Criteria","tabNumber":3,"content":{"ParamDetails":{"features":null,"description":"To ensure your success in this course, you should have basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts. "},"_id":1}},{"tabName":"Course Topics","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":"Hardware Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]},{"heading":"Managing System Components","_id":1,"listContent":[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]},{"heading":"Managing Data Storage","_id":1,"listContent":[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]},{"heading":"Supporting Display Devices","_id":1,"listContent":[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]},{"heading":"Installing and Configuring Peripheral Components","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]},{"heading":"Customized Client Environments","_id":1,"listContent":[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]},{"heading":"Supporting Printers and Multifunction Devices","_id":1,"listContent":[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]},{"heading":"Networking Technologies","_id":1,"listContent":[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]},{"heading":"Installing and Configuring Networking Capabilities","_id":1,"listContent":[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]},{"heading":"Supporting Mobile Digital Devices","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]},{"heading":"Operating System Fundamentals","_id":1,"listContent":[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]},{"heading":"Installing and Configuring Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]},{"heading":"Optimizing and Maintaining Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]},{"heading":"Working With Other Operating Systems","_id":1,"listContent":[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]},{"heading":"Networking and Security Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]},{"heading":"Security Threats, Vulnerabilities, and Controls","_id":1,"listContent":[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]},{"heading":"Implementing Security Controls","_id":1,"listContent":[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]},{"heading":"Troubleshooting System-Wide Issues","_id":1,"listContent":[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]},{"heading":"Safety and Operational Procedures","_id":1,"listContent":[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]}],"description":"","_id":2},"_id":3}},{"tabName":"Course Objectives","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]}],"description":"","_id":2},"_id":2}},{"tabName":"Key Features","tabNumber":6,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]}],"description":"","_id":2},"_id":3}},{"tabName":"Course Advisor","tabNumber":7,"content":{"advisiorName":"Mr. Pamu Kumar Swamy \u2013 CEH, CCNA, RHCE, RHCSA, SCSA, SCNA","advisiorDescription":"","imageName":"","imageUrl":"","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 Technology Training","achivements":[{"achivement":"Pamu Kumar Swamy has over 25 years of IT experience, in the technology industry especially networking, Virtualization and related areas.","_id":1},{"achivement":"He has trainer more than 5000 students till date across industries and geographies.","_id":1},{"achivement":"Top contributor to various educational publications.","_id":1},{"achivement":"He holds more than 15 certifications in networking and virtualization.","_id":1},{"achivement":"His training expertise includes training on UNIX, LINUX, IBM AIX, Cisco Products, VMWare, Comptia, LAN WAN Administration CEH etc.","_id":1}],"class":"button","version":"2.0","height":"10"}},{"tabName":"FAQ","tabNumber":8,"content":{"ParamDetails":{"features":[{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4},"_id":7}}]
{"tabName":"What you will learn","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]}],"description":"In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:","_id":2},"_id":2}}
What you will learn
1
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]}],"description":"In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]}],"description":"In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]}

1
[{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1},{"feature":"Identify the basic components and functions of operating systems","_id":2},{"feature":"Identify networking and security fundamentals.","_id":3},{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3},{"feature":"Install, configure, and troubleshoot display devices.","_id":3},{"feature":"Install and configure peripheral components.","_id":3},{"feature":"Manage system components.","_id":3},{"feature":"Manage data storage.","_id":3},{"feature":"Install and configure Microsoft Windows.","_id":3},{"feature":"Optimize and maintain Microsoft Windows.","_id":3},{"feature":"Work with other operating systems.","_id":3},{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3},{"feature":"Identify network technologies.","_id":3},{"feature":"Install and configure networking capabilities.","_id":3},{"feature":"Support mobile digital devices.","_id":3},{"feature":"Support printers and multifunction devices.","_id":3},{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3},{"feature":"Implement security controls.","_id":3},{"feature":"Troubleshoot system-wide issues.","_id":3}]
{"feature":"Identify the hardware components of personal computers and mobile digital devices","_id":1}
Identify the hardware components of personal computers and mobile digital devices
1
{"feature":"Identify the basic components and functions of operating systems","_id":2}
Identify the basic components and functions of operating systems
2
{"feature":"Identify networking and security fundamentals.","_id":3}
Identify networking and security fundamentals.
3
{"feature":"Identify the operational procedures that should be followed by professional PC technicians.","_id":3}
Identify the operational procedures that should be followed by professional PC technicians.
3
{"feature":"Install, configure, and troubleshoot display devices.","_id":3}
Install, configure, and troubleshoot display devices.
3
{"feature":"Install and configure peripheral components.","_id":3}
Install and configure peripheral components.
3
{"feature":"Manage system components.","_id":3}
Manage system components.
3
{"feature":"Manage data storage.","_id":3}
Manage data storage.
3
{"feature":"Install and configure Microsoft Windows.","_id":3}
Install and configure Microsoft Windows.
3
{"feature":"Optimize and maintain Microsoft Windows.","_id":3}
Optimize and maintain Microsoft Windows.
3
{"feature":"Work with other operating systems.","_id":3}
Work with other operating systems.
3
{"feature":"Identify the hardware and software requirements for client environment configurations.","_id":3}
Identify the hardware and software requirements for client environment configurations.
3
{"feature":"Identify network technologies.","_id":3}
Identify network technologies.
3
{"feature":"Install and configure networking capabilities.","_id":3}
Install and configure networking capabilities.
3
{"feature":"Support mobile digital devices.","_id":3}
Support mobile digital devices.
3
{"feature":"Support printers and multifunction devices.","_id":3}
Support printers and multifunction devices.
3
{"feature":"Identify security threats, vulnerabilities, and controls.","_id":3}
Identify security threats, vulnerabilities, and controls.
3
{"feature":"Implement security controls.","_id":3}
Implement security controls.
3
{"feature":"Troubleshoot system-wide issues.","_id":3}
Troubleshoot system-wide issues.
3
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:
2
2
{"tabName":"Audience","tabNumber":2,"content":{"ParamDetails":{"features":null,"description":"This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ 220-901 Certification Exam and the CompTIA 220-902 Certification Exam."},"_id":1}}
Audience
2
{"ParamDetails":{"features":null,"description":"This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ 220-901 Certification Exam and the CompTIA 220-902 Certification Exam."},"_id":1}
{"features":null,"description":"This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ 220-901 Certification Exam and the CompTIA 220-902 Certification Exam."}
This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ 220-901 Certification Exam and the CompTIA 220-902 Certification Exam.
1
{"tabName":"Eligibility Criteria","tabNumber":3,"content":{"ParamDetails":{"features":null,"description":"To ensure your success in this course, you should have basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts. "},"_id":1}}
Eligibility Criteria
3
{"ParamDetails":{"features":null,"description":"To ensure your success in this course, you should have basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts. "},"_id":1}
{"features":null,"description":"To ensure your success in this course, you should have basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts. "}
To ensure your success in this course, you should have basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts.
1
{"tabName":"Course Topics","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":"Hardware Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]},{"heading":"Managing System Components","_id":1,"listContent":[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]},{"heading":"Managing Data Storage","_id":1,"listContent":[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]},{"heading":"Supporting Display Devices","_id":1,"listContent":[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]},{"heading":"Installing and Configuring Peripheral Components","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]},{"heading":"Customized Client Environments","_id":1,"listContent":[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]},{"heading":"Supporting Printers and Multifunction Devices","_id":1,"listContent":[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]},{"heading":"Networking Technologies","_id":1,"listContent":[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]},{"heading":"Installing and Configuring Networking Capabilities","_id":1,"listContent":[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]},{"heading":"Supporting Mobile Digital Devices","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]},{"heading":"Operating System Fundamentals","_id":1,"listContent":[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]},{"heading":"Installing and Configuring Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]},{"heading":"Optimizing and Maintaining Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]},{"heading":"Working With Other Operating Systems","_id":1,"listContent":[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]},{"heading":"Networking and Security Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]},{"heading":"Security Threats, Vulnerabilities, and Controls","_id":1,"listContent":[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]},{"heading":"Implementing Security Controls","_id":1,"listContent":[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]},{"heading":"Troubleshooting System-Wide Issues","_id":1,"listContent":[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]},{"heading":"Safety and Operational Procedures","_id":1,"listContent":[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]}],"description":"","_id":2},"_id":3}}
Course Topics
4
{"ParamDetails":{"features":[{"heading":"Hardware Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]},{"heading":"Managing System Components","_id":1,"listContent":[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]},{"heading":"Managing Data Storage","_id":1,"listContent":[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]},{"heading":"Supporting Display Devices","_id":1,"listContent":[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]},{"heading":"Installing and Configuring Peripheral Components","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]},{"heading":"Customized Client Environments","_id":1,"listContent":[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]},{"heading":"Supporting Printers and Multifunction Devices","_id":1,"listContent":[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]},{"heading":"Networking Technologies","_id":1,"listContent":[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]},{"heading":"Installing and Configuring Networking Capabilities","_id":1,"listContent":[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]},{"heading":"Supporting Mobile Digital Devices","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]},{"heading":"Operating System Fundamentals","_id":1,"listContent":[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]},{"heading":"Installing and Configuring Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]},{"heading":"Optimizing and Maintaining Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]},{"heading":"Working With Other Operating Systems","_id":1,"listContent":[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]},{"heading":"Networking and Security Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]},{"heading":"Security Threats, Vulnerabilities, and Controls","_id":1,"listContent":[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]},{"heading":"Implementing Security Controls","_id":1,"listContent":[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]},{"heading":"Troubleshooting System-Wide Issues","_id":1,"listContent":[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]},{"heading":"Safety and Operational Procedures","_id":1,"listContent":[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]}],"description":"","_id":2},"_id":3}
{"features":[{"heading":"Hardware Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]},{"heading":"Managing System Components","_id":1,"listContent":[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]},{"heading":"Managing Data Storage","_id":1,"listContent":[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]},{"heading":"Supporting Display Devices","_id":1,"listContent":[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]},{"heading":"Installing and Configuring Peripheral Components","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]},{"heading":"Customized Client Environments","_id":1,"listContent":[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]},{"heading":"Supporting Printers and Multifunction Devices","_id":1,"listContent":[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]},{"heading":"Networking Technologies","_id":1,"listContent":[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]},{"heading":"Installing and Configuring Networking Capabilities","_id":1,"listContent":[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]},{"heading":"Supporting Mobile Digital Devices","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]},{"heading":"Operating System Fundamentals","_id":1,"listContent":[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]},{"heading":"Installing and Configuring Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]},{"heading":"Optimizing and Maintaining Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]},{"heading":"Working With Other Operating Systems","_id":1,"listContent":[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]},{"heading":"Networking and Security Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]},{"heading":"Security Threats, Vulnerabilities, and Controls","_id":1,"listContent":[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]},{"heading":"Implementing Security Controls","_id":1,"listContent":[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]},{"heading":"Troubleshooting System-Wide Issues","_id":1,"listContent":[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]},{"heading":"Safety and Operational Procedures","_id":1,"listContent":[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]}],"description":"","_id":2}
[{"heading":"Hardware Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]},{"heading":"Managing System Components","_id":1,"listContent":[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]},{"heading":"Managing Data Storage","_id":1,"listContent":[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]},{"heading":"Supporting Display Devices","_id":1,"listContent":[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]},{"heading":"Installing and Configuring Peripheral Components","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]},{"heading":"Customized Client Environments","_id":1,"listContent":[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]},{"heading":"Supporting Printers and Multifunction Devices","_id":1,"listContent":[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]},{"heading":"Networking Technologies","_id":1,"listContent":[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]},{"heading":"Installing and Configuring Networking Capabilities","_id":1,"listContent":[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]},{"heading":"Supporting Mobile Digital Devices","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]},{"heading":"Operating System Fundamentals","_id":1,"listContent":[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]},{"heading":"Installing and Configuring Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]},{"heading":"Optimizing and Maintaining Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]},{"heading":"Working With Other Operating Systems","_id":1,"listContent":[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]},{"heading":"Networking and Security Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]},{"heading":"Security Threats, Vulnerabilities, and Controls","_id":1,"listContent":[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]},{"heading":"Implementing Security Controls","_id":1,"listContent":[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]},{"heading":"Troubleshooting System-Wide Issues","_id":1,"listContent":[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]},{"heading":"Safety and Operational Procedures","_id":1,"listContent":[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]}]
{"heading":"Hardware Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]}

Hardware Fundamentals

1
[{"feature":"Topic A: Personal Computer Components","_id":1},{"feature":"Topic B: Storage Devices","_id":2},{"feature":"Topic C: Mobile Digital Devices","_id":2},{"feature":"Topic D: Connection Interfaces","_id":2}]
{"feature":"Topic A: Personal Computer Components","_id":1}
Topic A: Personal Computer Components
1
{"feature":"Topic B: Storage Devices","_id":2}
Topic B: Storage Devices
2
{"feature":"Topic C: Mobile Digital Devices","_id":2}
Topic C: Mobile Digital Devices
2
{"feature":"Topic D: Connection Interfaces","_id":2}
Topic D: Connection Interfaces
2
{"heading":"Managing System Components","_id":1,"listContent":[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]}

Managing System Components

1
[{"feature":"Topic A: Identify Motherboard Components and Features","_id":1},{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2},{"feature":"Topic C: Install Power Supplies","_id":2},{"feature":"Topic D: Troubleshoot System Components","_id":2}]
{"feature":"Topic A: Identify Motherboard Components and Features","_id":1}
Topic A: Identify Motherboard Components and Features
1
{"feature":"Topic B: Install and Configure CPUs and Cooling Systems","_id":2}
Topic B: Install and Configure CPUs and Cooling Systems
2
{"feature":"Topic C: Install Power Supplies","_id":2}
Topic C: Install Power Supplies
2
{"feature":"Topic D: Troubleshoot System Components","_id":2}
Topic D: Troubleshoot System Components
2
{"heading":"Managing Data Storage","_id":1,"listContent":[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]}

Managing Data Storage

1
[{"feature":"Topic A: Identify RAM Types and Features","_id":1},{"feature":"Topic B: Troubleshoot RAM Issues","_id":2},{"feature":"Topic C: Install and Configure Storage Devices","_id":2},{"feature":"Topic D: Configure the System Firmware","_id":2},{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}]
{"feature":"Topic A: Identify RAM Types and Features","_id":1}
Topic A: Identify RAM Types and Features
1
{"feature":"Topic B: Troubleshoot RAM Issues","_id":2}
Topic B: Troubleshoot RAM Issues
2
{"feature":"Topic C: Install and Configure Storage Devices","_id":2}
Topic C: Install and Configure Storage Devices
2
{"feature":"Topic D: Configure the System Firmware","_id":2}
Topic D: Configure the System Firmware
2
{"feature":"Topic E: Troubleshoot Hard Drives and RAID Arrays","_id":2}
Topic E: Troubleshoot Hard Drives and RAID Arrays
2
{"heading":"Supporting Display Devices","_id":1,"listContent":[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]}

Supporting Display Devices

1
[{"feature":"Topic A: Install Display Devices","_id":1},{"feature":"Topic B: Configure Display Devices","_id":2},{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}]
{"feature":"Topic A: Install Display Devices","_id":1}
Topic A: Install Display Devices
1
{"feature":"Topic B: Configure Display Devices","_id":2}
Topic B: Configure Display Devices
2
{"feature":"Topic C: Troubleshoot Video and Display Devices","_id":2}
Topic C: Troubleshoot Video and Display Devices
2
{"heading":"Installing and Configuring Peripheral Components","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]}

Installing and Configuring Peripheral Components

1
[{"feature":"Topic A: Install and Configure Input Devices","_id":1},{"feature":"Topic B: Install and Configure Output Devices","_id":2},{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2},{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}]
{"feature":"Topic A: Install and Configure Input Devices","_id":1}
Topic A: Install and Configure Input Devices
1
{"feature":"Topic B: Install and Configure Output Devices","_id":2}
Topic B: Install and Configure Output Devices
2
{"feature":"Topic C: Install and Configure Input/Output Devices","_id":2}
Topic C: Install and Configure Input/Output Devices
2
{"feature":"Topic D: Install and Configure Expansion Cards","_id":2}
Topic D: Install and Configure Expansion Cards
2
{"heading":"Customized Client Environments","_id":1,"listContent":[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]}

Customized Client Environments

1
[{"feature":"Topic A: Types of Common Business Clients","_id":1},{"feature":"Topic B: Custom Client Environments","_id":2}]
{"feature":"Topic A: Types of Common Business Clients","_id":1}
Topic A: Types of Common Business Clients
1
{"feature":"Topic B: Custom Client Environments","_id":2}
Topic B: Custom Client Environments
2
{"heading":"Supporting Printers and Multifunction Devices","_id":1,"listContent":[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]}

Supporting Printers and Multifunction Devices

1
[{"feature":"Topic A: Printer and Multifunction Technologies","_id":1},{"feature":"Topic B: Install and Configure Printers","_id":2},{"feature":"Topic C: Maintain Printers","_id":2},{"feature":"Topic D: Troubleshoot Printers","_id":2}]
{"feature":"Topic A: Printer and Multifunction Technologies","_id":1}
Topic A: Printer and Multifunction Technologies
1
{"feature":"Topic B: Install and Configure Printers","_id":2}
Topic B: Install and Configure Printers
2
{"feature":"Topic C: Maintain Printers","_id":2}
Topic C: Maintain Printers
2
{"feature":"Topic D: Troubleshoot Printers","_id":2}
Topic D: Troubleshoot Printers
2
{"heading":"Networking Technologies","_id":1,"listContent":[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]}

Networking Technologies

1
[{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1},{"feature":"Topic B: TCP/IP","_id":2},{"feature":"Topic C: Internet Connections","_id":2},{"feature":"Topic D: Ports and Protocols","_id":2},{"feature":"Topic E: Networking Tools","_id":2}]
{"feature":"Topic A: TCP/IP Properties and Characteristics","_id":1}
Topic A: TCP/IP Properties and Characteristics
1
{"feature":"Topic B: TCP/IP","_id":2}
Topic B: TCP/IP
2
{"feature":"Topic C: Internet Connections","_id":2}
Topic C: Internet Connections
2
{"feature":"Topic D: Ports and Protocols","_id":2}
Topic D: Ports and Protocols
2
{"feature":"Topic E: Networking Tools","_id":2}
Topic E: Networking Tools
2
{"heading":"Installing and Configuring Networking Capabilities","_id":1,"listContent":[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]}

Installing and Configuring Networking Capabilities

1
[{"feature":"Topic A: Configure Basic Windows Networking","_id":1},{"feature":"Topic B: Configure Network Perimeters","_id":2},{"feature":"Topic C: Using Windows Networking Features","_id":2},{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}]
{"feature":"Topic A: Configure Basic Windows Networking","_id":1}
Topic A: Configure Basic Windows Networking
1
{"feature":"Topic B: Configure Network Perimeters","_id":2}
Topic B: Configure Network Perimeters
2
{"feature":"Topic C: Using Windows Networking Features","_id":2}
Topic C: Using Windows Networking Features
2
{"feature":"Topic D: Install and Configure SOHO Networks","_id":2}
Topic D: Install and Configure SOHO Networks
2
{"heading":"Supporting Mobile Digital Devices","_id":1,"listContent":[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]}

Supporting Mobile Digital Devices

1
[{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1},{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2},{"feature":"Topic C: Other Mobile Devices","_id":2},{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2},{"feature":"Topic E: Mobile Device Connectivity","_id":2},{"feature":"Topic F: Mobile Device Synchronization","_id":2},{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}]
{"feature":"Topic A: Install and Configure Exterior Laptop Components","_id":1}
Topic A: Install and Configure Exterior Laptop Components
1
{"feature":"Topic B: Install and Configure Interior Laptop Components","_id":2}
Topic B: Install and Configure Interior Laptop Components
2
{"feature":"Topic C: Other Mobile Devices","_id":2}
Topic C: Other Mobile Devices
2
{"feature":"Topic D: Mobile Device Accessories and Ports","_id":2}
Topic D: Mobile Device Accessories and Ports
2
{"feature":"Topic E: Mobile Device Connectivity","_id":2}
Topic E: Mobile Device Connectivity
2
{"feature":"Topic F: Mobile Device Synchronization","_id":2}
Topic F: Mobile Device Synchronization
2
{"feature":"Topic G: Troubleshoot Mobile Device Hardware","_id":2}
Topic G: Troubleshoot Mobile Device Hardware
2
{"heading":"Operating System Fundamentals","_id":1,"listContent":[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]}

Operating System Fundamentals

1
[{"feature":"Topic A: PC and Mobile Operating Systems","_id":1},{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}]
{"feature":"Topic A: PC and Mobile Operating Systems","_id":1}
Topic A: PC and Mobile Operating Systems
1
{"feature":"Topic B: PC Operating System Tools and Utilities","_id":2}
Topic B: PC Operating System Tools and Utilities
2
{"heading":"Installing and Configuring Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]}

Installing and Configuring Microsoft Windows

1
[{"feature":"Topic A: Implement Client-Side Virtualization","_id":1},{"feature":"Topic B: Install Microsoft Windows","_id":2},{"feature":"Topic C: Use Microsoft Windows","_id":2},{"feature":"Topic D: Configure Microsoft Windows","_id":2},{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}]
{"feature":"Topic A: Implement Client-Side Virtualization","_id":1}
Topic A: Implement Client-Side Virtualization
1
{"feature":"Topic B: Install Microsoft Windows","_id":2}
Topic B: Install Microsoft Windows
2
{"feature":"Topic C: Use Microsoft Windows","_id":2}
Topic C: Use Microsoft Windows
2
{"feature":"Topic D: Configure Microsoft Windows","_id":2}
Topic D: Configure Microsoft Windows
2
{"feature":"Topic E: Upgrade Microsoft Windows","_id":2}
Topic E: Upgrade Microsoft Windows
2
{"heading":"Optimizing and Maintaining Microsoft Windows","_id":1,"listContent":[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]}

Optimizing and Maintaining Microsoft Windows

1
[{"feature":"Topic A: Optimize Microsoft Windows","_id":1},{"feature":"Topic B: Back Up and Restore System Data","_id":2},{"feature":"Topic C: Perform Disk Maintenance","_id":2},{"feature":"Topic D: Update Software","_id":2}]
{"feature":"Topic A: Optimize Microsoft Windows","_id":1}
Topic A: Optimize Microsoft Windows
1
{"feature":"Topic B: Back Up and Restore System Data","_id":2}
Topic B: Back Up and Restore System Data
2
{"feature":"Topic C: Perform Disk Maintenance","_id":2}
Topic C: Perform Disk Maintenance
2
{"feature":"Topic D: Update Software","_id":2}
Topic D: Update Software
2
{"heading":"Working With Other Operating Systems","_id":1,"listContent":[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]}

Working With Other Operating Systems

1
[{"feature":"Topic A: The OS X Operating System","_id":1},{"feature":"Topic B: The Linux Operating System","_id":2}]
{"feature":"Topic A: The OS X Operating System","_id":1}
Topic A: The OS X Operating System
1
{"feature":"Topic B: The Linux Operating System","_id":2}
Topic B: The Linux Operating System
2
{"heading":"Networking and Security Fundamentals","_id":1,"listContent":[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]}

Networking and Security Fundamentals

1
[{"feature":"Topic A: Network Types","_id":1},{"feature":"Topic B: Network Components","_id":2},{"feature":"Topic C: Common Network Services","_id":2},{"feature":"Topic D: Cloud Concepts","_id":2},{"feature":"Topic E: Security Fundamentals","_id":2}]
{"feature":"Topic A: Network Types","_id":1}
Topic A: Network Types
1
{"feature":"Topic B: Network Components","_id":2}
Topic B: Network Components
2
{"feature":"Topic C: Common Network Services","_id":2}
Topic C: Common Network Services
2
{"feature":"Topic D: Cloud Concepts","_id":2}
Topic D: Cloud Concepts
2
{"feature":"Topic E: Security Fundamentals","_id":2}
Topic E: Security Fundamentals
2
{"heading":"Security Threats, Vulnerabilities, and Controls","_id":1,"listContent":[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]}

Security Threats, Vulnerabilities, and Controls

1
[{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1},{"feature":"Topic B: General Security Controls","_id":2},{"feature":"Topic C: Mobile Security Controls","_id":2},{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}]
{"feature":"Topic A: Common Security Threats and Vulnerabilities","_id":1}
Topic A: Common Security Threats and Vulnerabilities
1
{"feature":"Topic B: General Security Controls","_id":2}
Topic B: General Security Controls
2
{"feature":"Topic C: Mobile Security Controls","_id":2}
Topic C: Mobile Security Controls
2
{"feature":"Topic D: Data Destruction and Disposal Methods","_id":2}
Topic D: Data Destruction and Disposal Methods
2
{"heading":"Implementing Security Controls","_id":1,"listContent":[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]}

Implementing Security Controls

1
[{"feature":"Topic A: Secure Operating Systems","_id":1},{"feature":"Topic B: Secure Workstations","_id":2},{"feature":"Topic C: Secure SOHO Networks","_id":2},{"feature":"Topic D: Secure Mobile Devices","_id":2}]
{"feature":"Topic A: Secure Operating Systems","_id":1}
Topic A: Secure Operating Systems
1
{"feature":"Topic B: Secure Workstations","_id":2}
Topic B: Secure Workstations
2
{"feature":"Topic C: Secure SOHO Networks","_id":2}
Topic C: Secure SOHO Networks
2
{"feature":"Topic D: Secure Mobile Devices","_id":2}
Topic D: Secure Mobile Devices
2
{"heading":"Troubleshooting System-Wide Issues","_id":1,"listContent":[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]}

Troubleshooting System-Wide Issues

1
[{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1},{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2},{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2},{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}]
{"feature":"Topic A: Troubleshoot PC Operating Systems","_id":1}
Topic A: Troubleshoot PC Operating Systems
1
{"feature":"Topic B: Troubleshoot Mobile Device Operating Systems and Applications","_id":2}
Topic B: Troubleshoot Mobile Device Operating Systems and Applications
2
{"feature":"Topic C: Troubleshoot Wired and Wireless Networks","_id":2}
Topic C: Troubleshoot Wired and Wireless Networks
2
{"feature":"Topic D: Troubleshoot Common Security Issues","_id":2}
Topic D: Troubleshoot Common Security Issues
2
{"heading":"Safety and Operational Procedures","_id":1,"listContent":[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]}

Safety and Operational Procedures

1
[{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1},{"feature":"Topic B: Personal and Electrical Safety","_id":2},{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2},{"feature":"Topic D: Professionalism and Communication","_id":2},{"feature":"Topic E: Organizational Policies and Procedures","_id":2},{"feature":"Topic F: Troubleshooting Theory","_id":2}]
{"feature":"Topic A: Basic Maintenance Tools and Techniques","_id":1}
Topic A: Basic Maintenance Tools and Techniques
1
{"feature":"Topic B: Personal and Electrical Safety","_id":2}
Topic B: Personal and Electrical Safety
2
{"feature":"Topic C: Environmental Safety and Materials Handling","_id":2}
Topic C: Environmental Safety and Materials Handling
2
{"feature":"Topic D: Professionalism and Communication","_id":2}
Topic D: Professionalism and Communication
2
{"feature":"Topic E: Organizational Policies and Procedures","_id":2}
Topic E: Organizational Policies and Procedures
2
{"feature":"Topic F: Troubleshooting Theory","_id":2}
Topic F: Troubleshooting Theory
2
2
3
{"tabName":"Course Objectives","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]}],"description":"","_id":2},"_id":2}}
Course Objectives
5
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]}],"description":"","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]}]
{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]}

1
[{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1},{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}]
{"feature":"CompTIA A+ Certification Training prepares you to appear in the exam ","_id":1}
CompTIA A+ Certification Training prepares you to appear in the exam
1
{"feature":"This course also improves the ability of a person to help laptops/Desktops hardware issues","_id":2}
This course also improves the ability of a person to help laptops/Desktops hardware issues
2
2
2
{"tabName":"Key Features","tabNumber":6,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]}],"description":"","_id":2},"_id":3}}
Key Features
6
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]}],"description":"","_id":2},"_id":3}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]}],"description":"","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]}]
{"heading":"","_id":1,"listContent":[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]}

1
[{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1},{"feature":"Entire trainers are certified from Comptia","_id":1},{"feature":"Students are provided with accredited training materials from Comptia","_id":1},{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1},{"feature":"Question bank will be provided and discussed by trainers","_id":1},{"feature":"Results will be assessed","_id":1},{"feature":"Proper feedback and analysis of students is provided","_id":1},{"feature":"Individual suggestions are given to students by trainers","_id":1}]
{"feature":"CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.","_id":1}
CompTIA A+ Certification Training lab is fully equipped to facilitate the practical aspects of course.
1
{"feature":"Entire trainers are certified from Comptia","_id":1}
Entire trainers are certified from Comptia
1
{"feature":"Students are provided with accredited training materials from Comptia","_id":1}
Students are provided with accredited training materials from Comptia
1
{"feature":"A certificate will be provided to students from Vinsys after completion","_id":1}
A certificate will be provided to students from Vinsys after completion
1
{"feature":"Question bank will be provided and discussed by trainers","_id":1}
Question bank will be provided and discussed by trainers
1
{"feature":"Results will be assessed","_id":1}
Results will be assessed
1
{"feature":"Proper feedback and analysis of students is provided","_id":1}
Proper feedback and analysis of students is provided
1
{"feature":"Individual suggestions are given to students by trainers","_id":1}
Individual suggestions are given to students by trainers
1
2
3
{"tabName":"Course Advisor","tabNumber":7,"content":{"advisiorName":"Mr. Pamu Kumar Swamy \u2013 CEH, CCNA, RHCE, RHCSA, SCSA, SCNA","advisiorDescription":"","imageName":"","imageUrl":"","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 Technology Training","achivements":[{"achivement":"Pamu Kumar Swamy has over 25 years of IT experience, in the technology industry especially networking, Virtualization and related areas.","_id":1},{"achivement":"He has trainer more than 5000 students till date across industries and geographies.","_id":1},{"achivement":"Top contributor to various educational publications.","_id":1},{"achivement":"He holds more than 15 certifications in networking and virtualization.","_id":1},{"achivement":"His training expertise includes training on UNIX, LINUX, IBM AIX, Cisco Products, VMWare, Comptia, LAN WAN Administration CEH etc.","_id":1}],"class":"button","version":"2.0","height":"10"}}
Course Advisor
7
{"advisiorName":"Mr. Pamu Kumar Swamy \u2013 CEH, CCNA, RHCE, RHCSA, SCSA, SCNA","advisiorDescription":"","imageName":"","imageUrl":"","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 Technology Training","achivements":[{"achivement":"Pamu Kumar Swamy has over 25 years of IT experience, in the technology industry especially networking, Virtualization and related areas.","_id":1},{"achivement":"He has trainer more than 5000 students till date across industries and geographies.","_id":1},{"achivement":"Top contributor to various educational publications.","_id":1},{"achivement":"He holds more than 15 certifications in networking and virtualization.","_id":1},{"achivement":"His training expertise includes training on UNIX, LINUX, IBM AIX, Cisco Products, VMWare, Comptia, LAN WAN Administration CEH etc.","_id":1}],"class":"button","version":"2.0","height":"10"}

Mr. Pamu Kumar Swamy ? CEH, CCNA, RHCE, RHCSA, SCSA, SCNA

100
true
1
Senior SME ? Technology Training
[{"achivement":"Pamu Kumar Swamy has over 25 years of IT experience, in the technology industry especially networking, Virtualization and related areas.","_id":1},{"achivement":"He has trainer more than 5000 students till date across industries and geographies.","_id":1},{"achivement":"Top contributor to various educational publications.","_id":1},{"achivement":"He holds more than 15 certifications in networking and virtualization.","_id":1},{"achivement":"His training expertise includes training on UNIX, LINUX, IBM AIX, Cisco Products, VMWare, Comptia, LAN WAN Administration CEH etc.","_id":1}]
{"achivement":"Pamu Kumar Swamy has over 25 years of IT experience, in the technology industry especially networking, Virtualization and related areas.","_id":1}
Pamu Kumar Swamy has over 25 years of IT experience, in the technology industry especially networking, Virtualization and related areas.
1
{"achivement":"He has trainer more than 5000 students till date across industries and geographies.","_id":1}
He has trainer more than 5000 students till date across industries and geographies.
1
{"achivement":"Top contributor to various educational publications.","_id":1}
Top contributor to various educational publications.
1
{"achivement":"He holds more than 15 certifications in networking and virtualization.","_id":1}
He holds more than 15 certifications in networking and virtualization.
1
{"achivement":"His training expertise includes training on UNIX, LINUX, IBM AIX, Cisco Products, VMWare, Comptia, LAN WAN Administration CEH etc.","_id":1}
His training expertise includes training on UNIX, LINUX, IBM AIX, Cisco Products, VMWare, Comptia, LAN WAN Administration CEH etc.
1
button
2.0
10
{"tabName":"FAQ","tabNumber":8,"content":{"ParamDetails":{"features":[{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4},"_id":7}}
FAQ
8
{"ParamDetails":{"features":[{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4},"_id":7}
{"features":[{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4}
[{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}]
{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}

Why one should join Vinsys?

4
[{"feature":"We are PMI Global R.E.P. 2739","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"PMI Approved course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]
{"feature":"We are PMI Global R.E.P. 2739","_id":62}
We are PMI Global R.E.P. 2739
62
{"feature":"Experiential Education","_id":62}
Experiential Education
62
{"feature":"Experienced Industry Experts","_id":62}
Experienced Industry Experts
62
{"feature":"PMI Approved course material","_id":62}
PMI Approved course material
62
{"feature":"Quality Courseware","_id":62}
Quality Courseware
62
{"feature":"Post training support","_id":62}
Post training support
62
4
7
5af4359468f8e31708fd89bf
{"courses":[{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"In order to provide a flexible, scalable, and service- oriented solution to simplify data integration efforts between Hybris and external data storage solutions and systems, the SAP Hybris Data Hub provides a flexible environment. The SAP Hybris course focuses on the architecture of the SAP Hybris Data Hub and all essential programming. The Hybris Data Hub training program also helps professionals to define the raw and canonical data model, writing custom composition handlers, target system definition, look-up tables, data publication to the SAP Hybris Commerce Suite and flow automation via events.","pageId":"sap-hybris-data-hub","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"SAP Hybris Data Hub","courseImage":"sap-hybris.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.9,"courseStartsOn":"","pageURL":"/technology-training/sap-hybris-data-hub","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"VMware vSphere: Install, Configure, Manage [v6.5] Training Program is the upgraded version of ICM 6.0 that characterize installing, configuring and managing the vSphere 6.5 infrastructure. Having been built on the Software-Defined Data Center (SDDC), the knowledge to this program will help you attain application virtualization, data center simplification and operational efficiency in an enterprise of any size. The vSphere 6.5 Certification infrastructure is inclusive of VMware ESXi 6.5 and VMware vCenter Server 6.5 that will be helpful in managing virtual machine, creating and optimizing templates, clones, and snapshots. The workshop is advisable to Network/IT Administrators or consultants who marshal vSphere platforms on behalf of their clients.","pageId":"vmware-vsphere-install-configure-manage-vcp","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"VMware vSphere: Install, Configure, Manage (VCP6.5) Training Course","courseImage":"vmware.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.5,"courseStartsOn":"","pageURL":"/technology-training/vmware-vsphere-install-configure-manage-vcp","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"LoadRunner is an industry leading Performance and Load Test automation tool, for examining system behavior, software performance under load conditions. The Load Running Training course can help emulate hundreds of concurrent users to put the application through the rigors of actual load conditions. This Load Runner Program is designed to make participants comfortable to understand the performance testing using the Load Runner and understand the performance issues and monitoring the run time performance of any web application using Load Runner.","pageId":"load-runner","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Load Runner Training Course","courseImage":"load-runner.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/load-runner","id":null,"batchType":"WeekEnd","isFavourite":null}],"totalCount":null}
[{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"In order to provide a flexible, scalable, and service- oriented solution to simplify data integration efforts between Hybris and external data storage solutions and systems, the SAP Hybris Data Hub provides a flexible environment. The SAP Hybris course focuses on the architecture of the SAP Hybris Data Hub and all essential programming. The Hybris Data Hub training program also helps professionals to define the raw and canonical data model, writing custom composition handlers, target system definition, look-up tables, data publication to the SAP Hybris Commerce Suite and flow automation via events.","pageId":"sap-hybris-data-hub","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"SAP Hybris Data Hub","courseImage":"sap-hybris.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.9,"courseStartsOn":"","pageURL":"/technology-training/sap-hybris-data-hub","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"VMware vSphere: Install, Configure, Manage [v6.5] Training Program is the upgraded version of ICM 6.0 that characterize installing, configuring and managing the vSphere 6.5 infrastructure. Having been built on the Software-Defined Data Center (SDDC), the knowledge to this program will help you attain application virtualization, data center simplification and operational efficiency in an enterprise of any size. The vSphere 6.5 Certification infrastructure is inclusive of VMware ESXi 6.5 and VMware vCenter Server 6.5 that will be helpful in managing virtual machine, creating and optimizing templates, clones, and snapshots. The workshop is advisable to Network/IT Administrators or consultants who marshal vSphere platforms on behalf of their clients.","pageId":"vmware-vsphere-install-configure-manage-vcp","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"VMware vSphere: Install, Configure, Manage (VCP6.5) Training Course","courseImage":"vmware.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.5,"courseStartsOn":"","pageURL":"/technology-training/vmware-vsphere-install-configure-manage-vcp","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"LoadRunner is an industry leading Performance and Load Test automation tool, for examining system behavior, software performance under load conditions. The Load Running Training course can help emulate hundreds of concurrent users to put the application through the rigors of actual load conditions. This Load Runner Program is designed to make participants comfortable to understand the performance testing using the Load Runner and understand the performance issues and monitoring the run time performance of any web application using Load Runner.","pageId":"load-runner","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Load Runner Training Course","courseImage":"load-runner.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/load-runner","id":null,"batchType":"WeekEnd","isFavourite":null}]
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"In order to provide a flexible, scalable, and service- oriented solution to simplify data integration efforts between Hybris and external data storage solutions and systems, the SAP Hybris Data Hub provides a flexible environment. The SAP Hybris course focuses on the architecture of the SAP Hybris Data Hub and all essential programming. The Hybris Data Hub training program also helps professionals to define the raw and canonical data model, writing custom composition handlers, target system definition, look-up tables, data publication to the SAP Hybris Commerce Suite and flow automation via events.","pageId":"sap-hybris-data-hub","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"SAP Hybris Data Hub","courseImage":"sap-hybris.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.9,"courseStartsOn":"","pageURL":"/technology-training/sap-hybris-data-hub","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
In order to provide a flexible, scalable, and service- oriented solution to simplify data integration efforts between Hybris and external data storage solutions and systems, the SAP Hybris Data Hub provides a flexible environment. The SAP Hybris course focuses on the architecture of the SAP Hybris Data Hub and all essential programming. The Hybris Data Hub training program also helps professionals to define the raw and canonical data model, writing custom composition handlers, target system definition, look-up tables, data publication to the SAP Hybris Commerce Suite and flow automation via events.
sap-hybris-data-hub
10000
2000
Technology Training
Online
technology-training

SAP Hybris Data Hub

SAP Hybris Data Hub

sap-hybris.png
true
images/
ALL
3.9
WeekEnd
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"VMware vSphere: Install, Configure, Manage [v6.5] Training Program is the upgraded version of ICM 6.0 that characterize installing, configuring and managing the vSphere 6.5 infrastructure. Having been built on the Software-Defined Data Center (SDDC), the knowledge to this program will help you attain application virtualization, data center simplification and operational efficiency in an enterprise of any size. The vSphere 6.5 Certification infrastructure is inclusive of VMware ESXi 6.5 and VMware vCenter Server 6.5 that will be helpful in managing virtual machine, creating and optimizing templates, clones, and snapshots. The workshop is advisable to Network/IT Administrators or consultants who marshal vSphere platforms on behalf of their clients.","pageId":"vmware-vsphere-install-configure-manage-vcp","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"VMware vSphere: Install, Configure, Manage (VCP6.5) Training Course","courseImage":"vmware.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.5,"courseStartsOn":"","pageURL":"/technology-training/vmware-vsphere-install-configure-manage-vcp","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
VMware vSphere: Install, Configure, Manage [v6.5] Training Program is the upgraded version of ICM 6.0 that characterize installing, configuring and managing the vSphere 6.5 infrastructure. Having been built on the Software-Defined Data Center (SDDC), the knowledge to this program will help you attain application virtualization, data center simplification and operational efficiency in an enterprise of any size. The vSphere 6.5 Certification infrastructure is inclusive of VMware ESXi 6.5 and VMware vCenter Server 6.5 that will be helpful in managing virtual machine, creating and optimizing templates, clones, and snapshots. The workshop is advisable to Network/IT Administrators or consultants who marshal vSphere platforms on behalf of their clients.
vmware-vsphere-install-configure-manage-vcp
10000
2000
Technology Training
Online
technology-training

VMware vSphere: Install, Configure, Manage (VCP6.5) Training Course

VMware vSphere: Install, Configure, Manage (VCP6.5) Training Course

vmware.png
true
images/
ALL
4.5
WeekEnd
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"LoadRunner is an industry leading Performance and Load Test automation tool, for examining system behavior, software performance under load conditions. The Load Running Training course can help emulate hundreds of concurrent users to put the application through the rigors of actual load conditions. This Load Runner Program is designed to make participants comfortable to understand the performance testing using the Load Runner and understand the performance issues and monitoring the run time performance of any web application using Load Runner.","pageId":"load-runner","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Load Runner Training Course","courseImage":"load-runner.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/load-runner","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
LoadRunner is an industry leading Performance and Load Test automation tool, for examining system behavior, software performance under load conditions. The Load Running Training course can help emulate hundreds of concurrent users to put the application through the rigors of actual load conditions. This Load Runner Program is designed to make participants comfortable to understand the performance testing using the Load Runner and understand the performance issues and monitoring the run time performance of any web application using Load Runner.
load-runner
10000
2000
Technology Training
Online
technology-training

Load Runner Training Course

Load Runner Training Course

load-runner.png
true
images/
ALL
4.2
WeekEnd