Section 1 : Introduction
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | About A+ copy | 00:02:15 Duration |
|
Lecture 3 | Exam Info | 00:04:10 Duration |
|
Lecture 4 | How to use this course | 00:01:42 Duration |
|
Lecture 5 | How to build the lab for this course | 00:10:54 Duration |
Section 2 : Operating System Basics
|
Lecture 1 | Intro to Operating Systems | 00:01:30 Duration |
|
Lecture 2 | 32 Bit vs 64 Bit | 00:06:10 Duration |
|
Lecture 3 | Open vs Close Source OS | 00:03:30 Duration |
Section 3 : Installing and Configuring Windows
|
Lecture 1 | Different Versions of Windows | 00:06:21 Duration |
|
Lecture 2 | Windows Home vs Pro | 00:04:53 Duration |
|
Lecture 3 | Compatibility mode in Windows | 00:03:16 Duration |
|
Lecture 4 | Upgrade vs Clean install | 00:04:30 Duration |
|
Lecture 5 | Downloading and Installing VirtualBox | 00:02:45 Duration |
|
Lecture 6 | Installing Windows 7 on Virtualbox | 00:14:18 Duration |
|
Lecture 7 | Installing Windows 10 on Virtualbox | 00:09:45 Duration |
|
Lecture 8 | Other Ways to install Windows | 00:10:39 Duration |
|
Lecture 9 | What should be done after installing Windows | 00:07:02 Duration |
Section 4 : Managing Hard Drives in Windows
|
Lecture 1 | What are partitions | 00:05:17 Duration |
|
Lecture 2 | GPT vs | 00:13:21 Duration |
|
Lecture 3 | Mirror vs Spanned vs Striped | 00:17:12 Duration |
|
Lecture 4 | Windows File System Types | 00:09:11 Duration |
|
Lecture 5 | Other File systems | 00:02:40 Duration |
|
Lecture 6 | Creating NTFS and FAT32 partition | 00:06:28 Duration |
|
Lecture 7 | Using Convert to convert Fat32 to NTFS | 00:02:35 Duration |
|
Lecture 8 | Format from NTFS to Fat32 | 00:02:03 Duration |
|
Lecture 9 | Using Diskpart | 00:05:42 Duration |
|
Lecture 10 | Changing a drive letter and Storage Spaces | 00:08:06 Duration |
|
Lecture 11 | Extending and Splitting Partitions | 00:07:16 Duration |
|
Lecture 12 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM |
Section 5 : Windows Utilities
|
Lecture 1 | Control Panel Utilities | 00:13:43 Duration |
|
Lecture 2 | Uninstalling Applications | 00:02:17 Duration |
|
Lecture 3 | Task Manager | 00:07:46 Duration |
|
Lecture 4 | Using Performance and Resource Monitor | 00:04:29 Duration |
|
Lecture 5 | How to Access the Registry | 00:01:33 Duration |
|
Lecture 6 | Managing Windows Services | 00:03:58 Duration |
|
Lecture 7 | Computer Management | 00:05:48 Duration |
|
Lecture 8 | Managing user accounts | 00:04:11 Duration |
|
Lecture 9 | Creating and Updating Group Policies | 00:07:56 Duration |
|
Lecture 10 | Component and Data Services | 00:03:21 Duration |
|
Lecture 11 | MSConfig | 00:04:52 Duration |
|
Lecture 12 | Using Advanced Startup | 00:05:15 Duration |
|
Lecture 13 | Using Dxdiag | 00:02:29 Duration |
|
Lecture 14 | Using MSinfo32 | 00:01:02 Duration |
|
Lecture 15 | Using the Event Viewer | 00:01:23 Duration |
|
Lecture 16 | Printer Management | 00:04:50 Duration |
|
Lecture 17 | Using the MMC | 00:01:39 Duration |
|
Lecture 18 | Working with Windows System Restore | 00:02:56 Duration |
|
Lecture 19 | Windows Memory Diagnostics | 00:02:06 Duration |
|
Lecture 20 | Using Task Scheduler to Run a Task | 00:02:50 Duration |
Section 6 : Windows Commands
|
Lecture 1 | Using the command prompt | 00:05:37 Duration |
|
Lecture 2 | Using the SFC Command | 00:01:27 Duration |
|
Lecture 3 | Using copy commands in Windows | 00:04:46 Duration |
|
Lecture 4 | Using DISM and Shutdown Command | 00:04:22 Duration |
|
Lecture 5 | Using the Bootrec command | |
|
Lecture 6 | Using TaskList and TaskKill Commands | 00:03:02 Duration |
|
Lecture 7 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 8 | Using the Net User Command | 00:03:13 Duration |
Section 7 : Windows Networking
|
Lecture 1 | Workgroup vs Domains | 00:10:35 Duration |
|
Lecture 2 | Homegroups | 00:03:41 Duration |
|
Lecture 3 | Windows Network Connections | 00:05:43 Duration |
|
Lecture 4 | Network Profiles | 00:03:47 Duration |
|
Lecture 5 | Sharing Network Folders and Printers | 00:14:47 Duration |
|
Lecture 6 | Using Remote Desktop and Remote assistance | 00:09:06 Duration |
|
Lecture 7 | Setting up a computer on a domain | 00:05:33 Duration |
|
Lecture 8 | Configure Static IP Address in Windows | 00:02:47 Duration |
|
Lecture 9 | Using ipconfig command | |
|
Lecture 10 | Viewing and Flushing the DNS Cache with ipconfig | 00:03:38 Duration |
|
Lecture 11 | Using the Ping command | |
|
Lecture 12 | Using the Tracert Command in Windows | 00:02:07 Duration |
|
Lecture 13 | Using the ARP command | 00:02:34 Duration |
|
Lecture 14 | Using Netstat and Nslookup | 00:03:03 Duration |
|
Lecture 15 | Using Internet Options and Proxy Setting | 00:03:19 Duration |
|
Lecture 16 | NIC Card Setting | 00:07:20 Duration |
|
Lecture 17 | Configuring Windows Firewall | 00:04:17 Duration |
Section 8 : Linux and Mac Administration
|
Lecture 1 | Linux OS | 00:03:10 Duration |
|
Lecture 2 | Installing Ubuntu in Virtualbox | 00:10:14 Duration |
|
Lecture 3 | Navigating Linux | 00:05:21 Duration |
|
Lecture 4 | Basic Linux Commands | 00:17:31 Duration |
|
Lecture 5 | Using apt-get in Linux | 00:01:29 Duration |
|
Lecture 6 | Using apt-get install command in Linux | |
|
Lecture 7 | Using ifconfig on Linux | 00:06:28 Duration |
|
Lecture 8 | Other Linux Commands | 00:09:58 Duration |
|
Lecture 9 | Managing Linux Permissions | 00:15:56 Duration |
|
Lecture 10 | Mac OS Best Practices and tools | 00:07:19 Duration |
|
Lecture 11 | Mac OS Features | 00:06:02 Duration |
Section 9 : Security
|
Lecture 1 | Physical Security Controls | 00:09:09 Duration |
|
Lecture 2 | Managing Active Directory User Accounts | 00:18:39 Duration |
|
Lecture 3 | Logical Security Concepts | 00:26:05 Duration |
|
Lecture 4 | Wireless Security Protocols and Authentication methods | 00:12:53 Duration |
|
Lecture 5 | Different Types of Malware | 00:08:13 Duration |
|
Lecture 6 | Malware Protection | 00:10:11 Duration |
|
Lecture 7 | Social engineering | |
|
Lecture 8 | What is a DOS, DDOS and Zombie | 00:05:36 Duration |
|
Lecture 9 | Man-in-the-middle | 00:04:39 Duration |
|
Lecture 10 | Cracking Passwords | 00:08:01 Duration |
|
Lecture 11 | Spoofing | 00:02:41 Duration |
|
Lecture 12 | Non-Compliant Systems | 00:01:46 Duration |
|
Lecture 13 | Windows Security Setting | 00:26:12 Duration |
|
Lecture 14 | Best Practices to secure a workstation | 00:12:27 Duration |
|
Lecture 15 | Securing Mobile Devices | 00:11:46 Duration |
|
Lecture 16 | Data Destruction and Disposal | 00:08:54 Duration |
|
Lecture 17 | Securing SOHO wireless and wired networks | 00:10:05 Duration |
Section 10 : Software Troubleshooting
|
Lecture 1 | Fixing Windows OS Problems | 00:13:49 Duration |
|
Lecture 2 | Troubleshoot and resolve PC security issues | 00:13:24 Duration |
|
Lecture 3 | Best practice procedures for malware removal | 00:10:36 Duration |
|
Lecture 4 | Mobile OS and Application Issues | 00:07:14 Duration |
|
Lecture 5 | Mobile OS and Application Security Issues | 00:04:57 Duration |
Section 11 : Operational Procedures
|
Lecture 1 | Different Types of Documentations | 00:09:52 Duration |
|
Lecture 2 | Change Management Best Practices | 00:07:57 Duration |
|
Lecture 3 | Basic disaster prevention and recovery methods | 00:09:42 Duration |
|
Lecture 4 | Safety procedures | 00:07:46 Duration |
|
Lecture 5 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 6 | Incidents, privacy and licenses | 00:07:46 Duration |
|
Lecture 7 | Communication techniques and professionalism | 00:13:36 Duration |
|
Lecture 8 | Basics of scripting | 00:12:04 Duration |
|
Lecture 9 | Remote access technologies | 00:03:19 Duration |
Section 12 : Performance Based Questions
|
Lecture 1 | Performance Based Questions | 00:02:02 Duration |
|
Lecture 2 | PBQ Using IPconfig | 00:02:05 Duration |
|
Lecture 3 | PBQ Using MSConfig to disable services | 00:02:06 Duration |
|
Lecture 4 | PBQ - Malware Procedures | 00:02:10 Duration |
|
Lecture 5 | PBQ - Changing Internet options | 00:01:40 Duration |
|
Lecture 6 | PBQ Bootrec | 00:04:19 Duration |
|
Lecture 7 | PBQ - Setting up an Email on a mobile Device | 00:04:48 Duration |