Course Name: CompTIA ITF+ (FC0-U61) – Information Technology Fundamentals
Course Overview:
The CompTIA ITF+ (FC0-U61) certification is an entry-level IT credential designed for beginners who want to gain a solid foundation in information technology. This course introduces students to essential IT concepts, terminology, and basic skills across software, hardware, networking, security, and databases. It is perfect for individuals exploring a career in IT, looking to validate their knowledge before pursuing more advanced certifications, or seeking a better understanding of technology in the workplace.
Why We Need It:
In today’s technology-driven world, understanding basic IT concepts is crucial. Whether you plan to work in IT or simply want to improve your tech literacy, ITF+ provides foundational knowledge that helps you make informed decisions, troubleshoot problems, and communicate effectively with technical teams.
How It Is Useful / How It Can Help:
- Career Path: Prepares for further IT certifications like CompTIA A+, Network+, or Cybersecurity fundamentals.
- Practical Skills: Equips students with essential computer, software, and network knowledge useful in everyday IT tasks.
- Confidence: Helps students confidently interact with technology and technical professionals.
- Employability: Validates foundational IT knowledge for entry-level roles or internships.
Course Content Highlights:
- Basic IT concepts and terminology
- Understanding hardware and software fundamentals
- Networking basics and security concepts
- Database fundamentals and software development principles
- Troubleshooting and problem-solving skills
Exam Information:
- Exam Code: FC0-U61
- Format: Multiple-choice and performance-based questions
- Duration: 60 minutes
- Number of Questions: Up to 75
- Passing Score: 70%
- Validity: Certification does not expire, but staying current with IT developments is recommended.
Who Should Take This Course:
- Individuals new to IT
- Students exploring IT careers
- Non-technical professionals wanting basic IT knowledge
- Anyone preparing for further IT certifications
Exam Objectives
DOMAIN WEIGHTS
| Domain | % of Exam |
|---|---|
| 1.0 IT Concepts and Terminology | 17% |
| 2.0 Infrastructure | 22% |
| 3.0 Applications and Software | 18% |
| 4.0 Software Development | 12% |
| 5.0 Database Fundamentals | 11% |
| 6.0 Security | 20% |
| Total | 100% |
1.0 IT Concepts and Terminology (17%)
1.1 Compare and contrast notational systems
1.2 Compare and contrast fundamental data types and their characteristics
1.3 Illustrate the basics of computing and processing
1.4 Explain the value of data and information
- Data and information as assets
- Importance of investing in security
- Relationship of data to creating information
- Intellectual property: trademarks, copyright, patents
- Digital products
- Data-driven business decisions: data capture, correlation, meaningful reporting
1.5 Compare and contrast common units of measure
- Storage units: bit, byte, KB, MB, GB, TB, PB
- Throughput units: bps, Kbps, Mbps, Gbps, Tbps
- Processing speed: MHz, GHz
1.6 Explain the troubleshooting methodology
- Identify the problem
− Gather information
− Duplicate the problem, if possible
− Question users
− Identify symptoms
− Determine if anything has changed
− Approach multiple problems individually - Research knowledge base/internet, if applicable
- Establish a theory of probable cause
− Question the obvious
− Consider multiple approaches
◦ Divide and conquer - Test the theory to determine the cause
− Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem
− If the theory is not confirmed, establish a new theory or escalate - Establish a plan of action to resolve the problem and identify potential effects
- Implement the solution or escalate as necessary
- Verify full system functionality and, implement preventive measures
- Document findings/lessons, learned, actions, and outcomes
2.0 Infrastructure (22%)
2.1 Classify common types of input/output device interfaces
- Networking
Wired
◦ Telephone connector (RJ-11)
◦ Ethernet connector (RJ-45) - Wireless
◦Bluetooth
◦NFC - Peripheral devices
− USB,
− FireWire,
− Thunderbolt,
− Bluetooth,
− RF - Graphic devices
− VGA
− HDMI
− DVI
− DisplayPort
− Mini DisplayPort
2.2 Set up and install common peripheral devices to a laptop/PC
- Devices
− printer
− scanner
− keyboard
− mouse
− camera
− external hard drive
− speakers
− display - Installation types
− plug-and-play vs driver installation on
− Other required steps
− IP-based peripherals
− web-based configuration steps
2.3 Explain the purpose of common internal computing components
- Motherboard/system board
- Firmware/BIOS
- RAM
- CPU
− ARM
◦ Mobile phone
◦ Tablet
− 32-bit
◦ Laptop
◦ Workstation
◦ Server
− 64-bit
◦Laptop
◦ Workstation
◦ Server - Storage
− HDD
− SSD - GPU
- Cooling
- NIC
− Wired vs. wireless
− On-board vs. add-on card
2.4 Compare and contrast common Internet service types
2.5 Compare and contrast storage types
- Volatile vs non-volatile
- Local storage
− RAM
− Hard drive
◦ Solid state vs. spinning disk
− optical
− Flash drive - Local network storage types
− NAS
− File server - Cloud storage services
2.6 Compare and contrast computing devices and their purposes
- Mobile phones
- Tablets
- Laptops
- Workstations
- Servers
- Gaming consoles
- IoT:
− Home appliances
− Home automation devices
◦ thermostats
◦ security systems
− modern cars
− IP cameras
− streaming media devices
− medical devices
2.7 Explain basic networking concepts
- Basics of network communication
− basics, packet transmission
− DNS
◦ URL-to-IP translation
− LAN vs WAN - Device addresses
− IP addresses
− MAC addresses - Basic protocols
− HTTP/S
− POP3
− IMAP
− SMTP - Devices
− modem
− router
− switch
− access point
− firewall
2.8 Install, configure, and secure a basic wireless network
- 802.11a/b/g/n/ac
− Older vs. newer standards
− Speed limitations
− Interference and attenuation factors - Best practices
− Change SSID
− Change default password
− Encrypted vs. unencrypted
◦ open
▪ captive portal
◦ WEP
◦ WPA
◦ WPA2
3.0 Applications and Software (18%)
3.1 Explain the purpose of operating systems.
- Interface between applications and hardware
- Disk management
- Process management/scheduling
− Kill process/end task - Application management
- Memory management
- Device management
- Access control/protection
Types of OS
− Mobile device OS
− Workstation OS
− Server OS
− Embedded OS
◦ Firmware
− Hypervisor (Type 1)
3.2 Compare and contrast components of an operating system.
- File systems and features
− File systems
◦ NTFS
◦ FAT32
◦ HFS
◦ Ext4 - Features
− Compression
− Encryption
− Permissions
− Journaling
− Limitations
− Naming rules - File management
− Folders/directories
− File types and extensions
− Permissions - Services
- Processes
- Drivers
- Utilities
− Task scheduling - Interfaces
− Console/command line
− GUI
3.3 Explain the purpose and proper use of software.
- Productivity software
− Word processing software
− Spreadsheet software
− Presentation software
− Web browser
− Visual diagramming software - Collaboration software
− Email client
− Conferencing software
− Instant messaging software
− Online workspace
− Document sharing - Business software
− Database software
− Project management software
− Business-specific applications
− Accounting software
3.4 Explain methods of application architecture and delivery models.
- Application delivery methods
− Locally installed
◦ Network not required
◦ Application exists locally
◦ Files saved locally
◦ Local network hosted
◦ Network required
◦ Internet access not required
− Cloud hosted
◦ Internet access required
◦ Service required
◦ Files saved in the cloud - Application architecture models
− One tier
− Two tier
− Three tier
− n-tier
3.5 Given a scenario, configure and use web browsers.
- Caching/clearing cache
- Deactivate client-side scripting
- Browser add-ons/extensions
− Add
− Remove
− Enable/disable - Private browsing
- Proxy settings
- Certificates
− Valid
− Invalid
3.6 Compare and contrast general application concepts and uses.
- Single-platform software
- Cross-platform software
− Compatibility concerns - Licensing
− Single use
− Group use/site license
− Concurrent license
− Open source vs. proprietary
− Subscription vs. one-time purchase
− Product keys and serial numbers - Software installation best practices
− Reading instructions
− Reading agreements
− Advanced options
4.0 Software Development (12%)
4.1 Compare programming language categories
- Interpreted
− Scripting languages
− Scripted languages
− Markup languages - Compiled programming languages
- Query languages
- Assembly language
4.2 Programming organizational techniques and logic
- Organizational techniques
− Pseudocode concepts
− Flow-chart concepts
◦ Sequence - Logic components
− Branching
− Looping
4.3 Explain the purpose and use of programming concepts.
- Identifiers
− Variables
− Constants - Containers
− Arrays
− Vectors - Functions
- Objects
− Properties
− Attributes
− Methods
5.0 Database Fundamentals (11%)
5.1 Explain database concepts and purpose
- Usage of database
− Create
− Import/input
− Query
− Reports - Flat file vs. database
− Multiple concurrent users
− Scalability
− Speed
− Variety of data - Records
- Storage
− Data persistence
5.2 Compare and contrast various database structures.
- Structured vs. semi-structured
vs. non-structured - Relational databases
− Schema
− Tables
◦ Rows/records
− Fields/columns
◦ Primary key
◦ Foreign key
− Constraints - Non-relational databases
− Key/value databases
− Document databases
5.3 Summarize methods used to interface with databases.
- Relational methods
− Data manipulation
◦ Select
◦ Insert
◦ Delete
◦ Update
− Data definition
◦ Create
◦ Alter
◦ Drop
◦ Permissions - Database access methods
− Direct/manual access
− Programmatic access
− User interface/utility access
− Query/report builders - Export/import
− Database dump
− Backup
6.0 Security (20%)
6.1 Summarize confidentiality, integrity and availability concerns.
- Confidentiality concerns
− Snooping
− Eavesdropping
− Wiretapping
− Social engineering
− Dumpster diving - Integrity concerns
− Man-in-the-middle
− Replay attack
− Impersonation
− Unauthorized information alteration - Availability concerns
− Denial of service
− Power outage
− Hardware failure
− Destruction
− Service outage
6.2 Explain methods to secure devices and best practices.
- Securing devices (mobile/
workstation)
− Antivirus/Anti-malware
− Host firewall
− Changing default passwords
− Enabling passwords
− Safe browsing practices
− Patching/updates - Device use best practices
− Software sources
◦ Validating legitimate sources
◦ Researching legitimate sources
◦ OEM websites vs. thirdparty websites
− Removal of unwanted software
− Removal of unnecessary software
− Removal of malicious software
6.3 Summarize behavioral security concepts.
- Expectations of privacy when using:
− The Internet
◦ Social networking sites
◦ Email
◦ File sharing
◦ Instant messaging
− Mobile applications
− Desktop software
− Business software
− Corporate network - Written policies and procedures
- Handling of confidential information
− Passwords
− Personal information
− Customer information
− Company confidential information
6.4 Compare and contrast authentication, authorization, accounting and non-repudiation
concepts.
- Authentication
− Single factor
− Multifactor
− Examples of factors
◦ Password
◦ PIN
◦ One-time password
◦ Software token
◦ Hardware token
◦ Biometrics
◦ Specific location
◦ Security questions
− Single sign-on - Authorization
− Permissions
− Least privilege model
− Role-based access
◦ User account types
− Rule-based access
− Mandatory access controls
− Discretionary access controls - Accounting
− Logs
− Tracking
− Web browser history
6.5 Explain password best practices.
- Password length
- Password complexity
- Password history
- Password expiration
- Password reuse across sites
- Password managers
- Password reset process
6.6 Explain common uses of encryption.
- Plain text vs. cipher text
- Data at rest
− File level
− Disk level
− Mobile device - Data in transit
− Email
− HTTPS
− VPN
− Mobile application
6.7 Explain business continuity concepts.
- Fault tolerance
− Replication
− Redundancy
◦ Data
◦ Network
◦ Power
− Backup considerations
◦ Data
▪ File backups
▪ Critical data
▪ Database
▪ OS backups
◦ Location
▪ Stored locally
▪ Cloud storage
▪ On-site vs. off-site
− Contingency plan - Disaster recovery
− Data restoration
− Prioritization
− Restoring access
