| 
					Operating Systems - 31% | 
| Identify basic features of Microsoft Windows editions. | - Windows 10 editions 
						Home
						Pro
						Pro for Workstations
						Enterprise 				- Feature differences 
						Domain access vs. workgroup
						Desktop styles/user interface
						Availability of Remote Desktop Protocol (RDP)
						Random-access memory (RAM) support limitations
						BitLocker
						gpedit.msc 				- Upgrade paths | 
| Given a scenario, use the appropriate Microsoft command-line tool. | - Navigation 
						cd
						dir
						rmdir
						Drive navigation inputs:- C: or D: or x:
 				- Command-line tools 
						ipconfig
						ping
						hostname
						netstat
						nslookup
						chkdsk
						net user
						net use
						tracert
						format
						xcopy
						copy
						robocopy
						gpupdate
						gpresult
						shutdown
						sfc
						[command name] /?
						diskpart
						pathping
						winver | 
| Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). | - Task Manager 
						Services
						Startup
						Performance
						Processes
						Users 				- Microsoft Management Console (MMC) snap-in 
						Event Viewer (eventvwr.msc)
						Disk Management (diskmgmt.msc)
						Task Scheduler (taskschd.msc)
						Device Manager (devmgmt.msc)
						Certificate Manager (certmgr.msc)
						Local Users and Groups (lusrmgr.msc)
						Performance Monitor (perfmon.msc)
						Group Policy Editor (gpedit.msc) 				- Additional tools 
						System Information (msinfo32. exe)
						Resource Monitor (resmon.exe)
						System Configuration (msconfig. exe)
						Disk Cleanup (cleanmgr.exe)
						Disk Defragment (dfrgui.exe)
						Registry Editor (regedit.exe) | 
| Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility. | - Internet Options - Devices and Printers
 - Programs and Features
 - Network and Sharing Center
 - System
 - Windows Defender Firewall
 - Mail
 - Sound
 - User Accounts
 - Device Manager
 - Indexing Options
 - Administrative Tools
 - File Explorer Options
 
						Show hidden files
						Hide extensions
						General options
						View options 				- Power Options 
						Hibernate
						Power plans
						Sleep/suspend
						Standby
						Choose what closing the lid does
						Turn on fast startup
						Universal Serial Bus (USB) selective suspend 				- Ease of Access | 
| Given a scenario, use the appropriate Windows settings. | - Time and Language - Update and Security
 - Personalization
 - Apps
 - Privacy
 - System
 - Devices
 - Network and Internet
 - Gaming
 - Accounts
 | 
| Given a scenario, configure Microsoft Windows networking features on a client/desktop. | - Workgroup vs. domain setup 
						Shared resources
						Printers
						File servers
						Mapped drives 				- Local OS firewall settings 
						Application restrictions and exceptions
						Configuration 				- Client network configuration 
						Internet Protocol (IP) addressing scheme
						Domain Name System (DNS) settings
						Subnet mask
						Gateway
						Static vs. dynamic 				- Establish network connections 
						Virtual private network (VPN)
						Wireless
						Wired
						Wireless wide area network (WWAN) 				- Proxy settings- Public network vs. private network
 - File Explorer navigation – network paths
 - Metered connections and limitations
 | 
| Given a scenario, apply application installation and configuration concepts. | - System requirements for applications 
						32-bit vs. 64-bit dependent application requirements
						Dedicated graphics card vs. integrated
						Video random-access memory (VRAM) requirements
						RAM requirements
						Central processing unit (CPU) requirements
						External hardware tokens
						Storage requirements 				- OS requirements for applications 
						Application to OS compatibility
						32-bit vs. 64-bit OS 				- Distribution methods 
						Physical media vs. downloadable
						ISO mountable 				- Other considerations for new applications 
						Impact to device
						Impact to network
						Impact to operation
						Impact to business | 
| Explain common OS types and their purposes. | - Workstation OSs 
						Windows
						Linux
						macOS
						Chrome OS 				- Cell phone/tablet OSs 				- Various filesystem types 
						New Technology File System (NTFS)
						File Allocation Table 32 (FAT32)
						Third extended filesystem (ext3)
						Fourth extended filesystem (ext4)
						Apple File System (APFS)
						Extensible File Allocation Table (exFAT) 				- Vendor life-cycle limitations 
						End-of-life (EOL)
						Update limitations 				- Compatibility concerns between OSs | 
| Given a scenario, perform OS installations and upgrades in a diverse OS environment. | - Boot methods 
						USB
						Optical media
						Network
						Solid-state/flash drives
						Internet-based
						External/hot-swappable drive
						Internal hard drive (partition) 				- Types of installations 
						Upgrade
						Recovery partition
						Clean install
						Image deployment
						Repair installation
						Remote network installation
						Other considerations- Third-party drivers
 				- Partitioning 
						GUID [globally unique identifier] Partition Table (GPT)
						Master boot record (MBR) 				- Drive format- Upgrade considerations
 
						Backup files and user preferences
						Application and driver support/backward compatibility
						Hardware compatibility 				- Feature updates | 
| Identify common features and tools of the macOS/desktop OS. | - Installation and uninstallation of applications 
						File types- .dmg
 - .pkg
 - .app
						App Store
						Uninstallation process 				- Apple ID and corporate restrictions- Best practices
 
						Backups
						Antivirus
						Updates/patches 				- System Preferences 
						Displays
						Networks
						Printers
						Scanners
						Privacy
						Accessibility
						Time Machine 				- Features 
						Multiple desktops
						Mission Control
						Keychain
						Spotlight
						iCloud
						Gestures
						Finder
						Remote Disc
						Dock 				- Disk Utility- FileVault
 - Terminal
 - Force Quit
 | 
| Identify common features and tools of the Linux client/desktop OS. | - Common commands 
						ls
						pwd
						mv
						cp
						rm
						chmod
						chown
						su/sudo
						apt-get
						yum
						ip
						df
						grep
						ps
						man
						top
						find
						dig
						cat
						nano 				- Best practices 
						Backups
						Antivirus
						Updates/patches 				- Tools | 
| 
					Security - 25% | 
| Summarize various security measures and their purposes. | - Physical security 
						Access control vestibule
						Badge reader
						Video surveillance
						Alarm systems
						Motion sensors
						Door locks
						Equipment locks
						Guards
						Bollards
						Fences 				- Physical security for staf 
						Key fobs
						Smart cards
						Keys
						Biometrics- Retina scanner
 - Fingerprint scanner
 - Palmprint scanner
						Lighting
						Magnetometers 				- Logical security 
						Principle of least privilege
						Access control lists (ACLs)
						Multifactor authentication (MFA)
						Email
						Hard token
						Soft token
						Short message service (SMS)
						Voice call
						Authenticator application 				- Mobile device management (MDM)- Active Directory
 
						Login script
						Domain
						Group Policy/updates
						Organizational units
						Home folder
						Folder redirection
						Security groups | 
| Compare and contrast wireless security protocols and authentication methods. | - Protocols and encryption 
						WiFi Protected Access 2 (WPA2)
						WPA3
						Temporal Key Integrity Protocol (TKIP)
						Advanced Encryption Standard (AES) 				- Authentication 
						Remote Authentication Dial-In User Service (RADIUS)
						Terminal Access Controller Access-Control System (TACACS+)
						Kerberos
						Multifactor | 
| Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods. | - Malware 
						Trojan
						Rootkit
						Virus
						Spyware
						Ransomware
						Keylogger
						Boot sector virus
						Cryptominers 				- Tools and methods 
						Recovery mode
						Antivirus
						Anti-malware
						Software firewalls
						Anti-phishing training
						User education regarding common threats
						OS reinstallation | 
| Explain common social-engineering attacks, threats, and vulnerabilities. | - Social engineering 
						Phishing
						Vishing
						Shoulder surfing
						Whaling
						Tailgating
						Impersonation
						Dumpster diving
						Evil twin 				- Threats 
						Distributed denial of service (DDoS)
						Denial of service (DoS)
						Zero-day attack
						Spoofing
						On-path attack
						Brute-force attack
						Dictionary attack
						Insider threat
						Structured Query Language (SQL) injection
						Cross-site scripting (XSS) - Vulnerabilities 
						Non-compliant systems
						Unpatched systems
						Unprotected systems (missing antivirus/missing firewall)
						EOL OSs
						Bring your own device (BYOD) | 
| Given a scenario, manage and configure basic security settings in the Microsoft Windows OS. | - Defender Antivirus 
						Activate/deactivate
						Updated definitions 				- Firewall 
						Activate/deactivate
						Port security
						Application security 				- Users and groups 
						Local vs. Microsoft account
						Standard account
						Administrator
						Guest user
						Power user 				- Login OS options 
						Username and password
						Personal identification number (PIN)
						Fingerprint
						Facial recognition
						Single sign-on (SSO) 				- NTFS vs. share permissions 
						File and folder attributes
						Inheritance 				- Run as administrator vs. standard user 
						User Account Control (UAC) 				- BitLocker- BitLocker To Go
 - Encrypting File System (EFS)
 | 
| Given a scenario, configure a workstation to meet best practices for security. | - Data-at-rest encryption - Password best practices
 
						Complexity requirements- Length
 - Character types
						Expiration requirements
						Basic input/output system (BIOS)/Unified Extensible Firmware Interface (UEFI) passwords 				- End-user best practices 
						Use screensaver locks
						Log off when not in use
						Secure/protect critical hardware (e.g., laptops)
						Secure personally identifiable information (PII) and passwords 				- Account management 
						Restrict user permissions
						Restrict login times
						Disable guest account
						Use failed attempts lockout
						Use timeout/screen lock 				- Change default administrator’s user account/password- Disable AutoRun
 - Disable AutoPlay
 | 
| Explain common methods for securing mobile and embedded devices. | - Screen locks 
						Facial recognition
						PIN codes
						Fingerprint
						Pattern
						Swipe 				- Remote wipes- Locator applications
 - OS updates
 - Device encryption
 - Remote backup applications
 - Failed login attempts restrictions
 - Antivirus/anti-malware
 - Firewalls
 - Policies and procedures
 
						BYOD vs. corporate owned
						Profile security requirements 				- Internet of Things (IoT) | 
| Given a scenario, use common data destruction and disposal methods. | - Physical destruction 
						Drilling
						Shredding
						Degaussing
						Incinerating 				- Recycling or repurposing best practices 
						Erasing/wiping
						Low-level formatting
						Standard formatting 				- Outsourcing concepts 
						Third-party vendor
						Certification of destruction/recycling | 
| Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks. | - Home router settings 
						Change default passwords
						IP filtering
						Firmware updates
						Content filtering
						Physical placement/secure locations
						Dynamic Host Configuration Protocol (DHCP) reservations
						Static wide-area network (WAN) IP
						Universal Plug and Play (UPnP)
						Screened subnet 				- Wireless specific 
						Changing the service set identifier (SSID)
						Disabling SSID broadcast
						Encryption settings
						Disabling guest access
						Changing channels 				- Firewall settings 
						Disabling unused ports
						Port forwarding/mapping | 
| Given a scenario, install and configure browsers and relevant security settings. | - Browser download/installation 
						Trusted sources- Hashing
						Untrusted sources 				- Extensions and plug-ins 
						Trusted sources
						Untrusted sources 				- Password managers- Secure connections/sites – valid certificates
 - Settings
 
						Pop-up blocker
						Clearing browsing data
						Clearing cache
						Private-browsing mode
						Sign-in/browser data synchronization
						Ad blockers | 
| 
					Software Troubleshooting - 22% | 
| Given a scenario, troubleshoot common Windows OS problems. | - Common symptoms 
						Blue screen of death (BSOD)
						Sluggish performance
						Boot problems
						Frequent shutdowns
						Services not starting
						Applications crashing
						Low memory warnings
						USB controller resource warnings
						System instability
						No OS found
						Slow profile load
						Time drift 				- Common troubleshooting steps 
						Reboot
						Restart services
						Uninstall/reinstall/update applications
						Add resources
						Verify requirements
						System file check
						Repair Windows
						Restore
						Reimage
						Roll back updates
						Rebuild Windows profiles | 
| Given a scenario, troubleshoot common personal computer (PC) security issues. | - Common symptoms 
						Unable to access the network
						Desktop alerts
						False alerts regarding antivirus protection
						Altered system or personal files- Missing/renamed files
						Unwanted notifications within the OS
						OS update failures 				- Browser-related symptoms 
						Random/frequent pop-ups
						Certificate warnings
						Redirection | 
| Given a scenario, use best practice procedures for malware removal. | - Investigate and verify malware symptoms - Quarantine infected systems
 - Disable System Restore in Windows
 - Remediate infected systems
 
						Update anti-malware software
						Scanning and removal techniques (e.g., safe mode, preinstallation environment) 				- Schedule scans and run updates- Enable System Restore and create a restore point in Windows
 - Educate the end user
 | 
| Given a scenario, troubleshoot common mobile OS and application issues. | - Common symptoms 
						Application fails to launch
						Application fails to close/crashes
						Application fails to update
						Slow to respond
						OS fails to update
						Battery life issues
						Randomly reboots
						Connectivity issues- Bluetooth
 - WiFi
 - Near-field communication (NFC)
 - AirDrop
						Screen does not autorotate | 
| Given a scenario, troubleshoot common mobile OS and application security issues. | - Security concerns 
						Android package (APK) source
						Developer mode
						Root access/jailbreak
						Bootleg/malicious application- Application spoofing
 				- Common symptoms 
						High network traffic
						Sluggish response time
						Data-usage limit notification
						Limited Internet connectivity
						No Internet connectivity
						High number of ads
						Fake security warnings
						Unexpected application behavior
						Leaked personal files/data | 
| 
					Operational Procedures - 22% | 
| Given a scenario, implement best practices associated with documentation and support systems information management. | - Ticketing systems 
						User information
						Device information
						Description of problems
						Categories
						Severity
						Escalation levels
						Clear, concise written communication- Problem description
 - Progress notes
 - Problem resolution
 				- Asset management 
						Inventory lists
						Database system
						Asset tags and IDs
						Procurement life cycle
						Warranty and licensing
						Assigned users 				- Types of documents 
						Acceptable use policy (AUP)
						Network topology diagram
						Regulatory compliance requirements- Splash screens
						Incident reports
						Standard operating procedures- Procedures for custom installation of software package
						New-user setup checklist
						End-user termination checklist 				- Knowledge base/articles | 
| Explain basic change-management best practices. | - Documented business processes 
						Rollback plan
						Sandbox testing
						Responsible staff member 				- Change management 
						Request forms
						Purpose of the change
						Scope of the change
						Date and time of the change
						Affected systems/impact
						Risk analysis- Risk level
						Change board approvals
						End-user acceptance | 
| Given a scenario, implement workstation backup and recovery methods. | - Backup and recovery 
						Full
						Incremental
						Differential
						Synthetic 				- Backup testing 				- Backup rotation schemes 
						On site vs. off site
						Grandfather-father-son (GFS)
						3-2-1 backup rule | 
| Given a scenario, use common safety procedures. | - Electrostatic discharge (ESD) straps - ESD mats
 - Equipment grounding
 - Proper power handling
 - Proper component handling and storage
 - Antistatic bags
 - Compliance with government regulations
 - Personal safety
 
						Disconnect power before repairing PC
						Lifting techniques
						Electrical fire safety
						Safety goggles
						Air filtration mask | 
| Summarize environmental impacts and local environmental controls. | - Material safety data sheet (MSDS)/documentation for handling and disposal 
						Proper battery disposal
						Proper toner disposal
						Proper disposal of other devices and assets 				- Temperature, humidity-level awareness, and proper ventilation 
						Location/equipment placement
						Dust cleanup
						Compressed air/vacuums 				- Power surges, under-voltage events, and power failures 
						Battery backup
						Surge suppressor | 
| Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. | - Incident response 
						Chain of custody
						Inform management/law enforcement as necessary
						Copy of drive (data integrity and preservation)
						Documentation of incident 				- Licensing/digital rights management (DRM)/end-user license agreement (EULA) 
						Valid licenses
						Non-expired licenses
						Personal use license vs. corporate use license
						Open-source license 				- Regulated data 
						Credit card transactions
						Personal government-issued information
						PII
						Healthcare data
						Data retention requirements | 
| Given a scenario, use proper communication techniques and professionalism. | - Professional appearance and attire 
						Match the required attire of the given environment- Formal
 - Business casual
 - Use proper language and avoid jargon, acronyms, and slang, when applicable- Maintain a positive attitude/project confidence
 - Actively listen, take notes, and avoid interrupting the customer
 - Be culturally sensitive
 
						Use appropriate professional titles, when applicable - Be on time (if late, contact the customer)- Avoid distractions
 
						Personal calls
						Texting/social media sites
						Personal interruptions - Dealing with difficult customers or situations 
						Do not argue with customers or be defensive
						Avoid dismissing customer problems
						Avoid being judgmental
						Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
						Do not disclose experience via social media outlets - Set and meet expectations/time line and communicate status with the customer 
						Offer repair/replacement options, as needed
						Provide proper documentation on the services provided
						Follow up with customer/user at a later date to verify satisfaction - Deal appropriately with customers’ confidential and private materials 
						Located on a computer, desktop, printer, etc. | 
| Identify the basics of scripting. | - Script file types 
						.bat
						.ps1
						.vbs
						.sh
						.js
						.py 				- Use cases for scripting 
						Basic automation
						Restarting machines
						Remapping network drives
						Installation of applications
						Automated backups
						Gathering of information/data
						Initiating updates 				- Other considerations when using scripts 
						Unintentionally introducing malware
						Inadvertently changing system settings
						Browser or system crashes due to mishandling of resources | 
| Given a scenario, use remote access technologies. | - Methods/tools 
						RDP
						VPN
						Virtual network computer (VNC)
						Secure Shell (SSH)
						Remote monitoring and management (RMM)
						Microsoft Remote Assistance (MSRA)
						Third-party tools- Screen-sharing software
 - Video-conferencing software
 - File transfer software
 - Desktop management software
 				- Security considerations of each access method |