Domain 1 – Identify basic features of Microsoft Windows editions00:33:13
Domain 1 – Given a scenario, use the appropriate Microsoft command-line tool – Part 1.00:29:09
Domain 1 – Given a scenario, use the appropriate Microsoft command-line tool – Part 2.00:00:00
Domain 1 – Given a scenario, use the appropriate Microsoft command-line tool – Part 3.00:35:04
Domain 1 – Given a scenario, use the appropriate Microsoft command-line tool – Part 4.00:00:00
Domain 1 – Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) – Part 1.00:24:50
Domain 1 – Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) – Part 2.00:35:17
Domain 1 – Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) – Part 3.00:20:18
Domain 1 – Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility.00:42:05
Domain 1 – Given a scenario, use the appropriate Windows settings.00:17:25
Domain 1 – Given a scenario, configure Microsoft Windows networking features on a client/desktop.00:59:12
Domain 1 – Given a scenario, apply application installation and configuration concepts.00:23:06
Domain 1 – Explain common OS types and their purposes00:25:00
Domain 1 – Given a scenario, perform OS installations and upgrades in a diverse OS environment.00:35:14
Domain 1 – Identify common features and tools of the macOS/desktop OS.00:26:48
Domain 1 – Identify common features and tools of the Linux client/desktop OS Part 1.01:07:29
Domain 1 – Identify common features and tools of the Linux client/desktop OS Part 2.00:09:44
Domain 2 – Summarize various security measures and their purposes Part 1.00:33:07
Domain 2 – Summarize various security measures and their purposes Part 2.00:44:21
Domain 2 – Compare and contrast wireless security protocols and authentication methods.00:00:00
Domain 2 – Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods.00:26:04
Domain 2 – Explain common social-engineering attacks, threats, and vulnerabilities.01:13:34
Domain 2 – Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.00:50:27
Domain 2 – Given a scenario, configure a workstation to meet best practices for security.00:19:13
Domain 2 – Explain common methods for securing mobile and embedded devices.00:15:40
Domain 2 – Given a scenario, use common data destruction and disposal methods.00:12:51
Domain 2 – Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.00:29:02
Domain 2 – Given a scenario, install and configure browsers and relevant security settings.00:21:13
Domain 3 – Given a scenario, troubleshoot common Windows OS problems.00:47:26
Domain 3 – Given a scenario, troubleshoot common personal computer (PC) security issues.00:15:15
Domain 3 – Given a scenario, troubleshoot common mobile OS and application issues.00:15:24
Domain 3 – Given a scenario, use best practice procedures for malware removal.00:12:36
Domain 3 – Given a scenario, troubleshoot common mobile OS and application security issues.00:18:03
Domain 4 – Given a scenario, implement best practices associated with documentation and support systems information management.00:35:21
Domain 4 – Explain basic change-management best practices.00:14:42
Domain 4 – Given a scenario, implement workstation backup and recovery methods.00:17:33
Domain 4 – Given a scenario, use common safety procedures.00:16:10
Domain 4 – Summarize environmental impacts and local environmental controls.00:16:24
Domain 4 – Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.00:26:05
Domain 4 – Given a scenario, use proper communication techniques and professionalism.00:27:24
Domain 4 – Identify the basics of scripting.00:18:04
Domain 4 – Given a scenario, use remote access technologies00:24:37