CompTIA A+ Training

Printer Troubleshooting Tools – CompTIA A+ 220-802: 4.9

Printer Troubleshooting Tools – CompTIA A+ 220-802: 4.9

If you’re working on a printer repair, then you’ll need the right tools for the job. In this video, you’ll learn about laser printer maintenance kits, toner vacuums, the best use of compressed air, and managing the Windows Print Spooler.

Continue Reading

Troubleshooting Printer Problems – CompTIA A+ 220-802: 4.9

Troubleshooting Printer Problems – CompTIA A+ 220-802: 4.9

We rely on our printers for some important business tasks, but these mechanical devices bring with them a number of potential hardware and software issues. In this video, you’ll learn about printer tests, bad output, final print issues, paper jams, network connectivity issues, and printer error messages.

Continue Reading

Laptop Disassembly Best Practices – CompTIA A+ 220-802: 4.8

Laptop Disassembly Best Practices – CompTIA A+ 220-802: 4.8

Taking apart a laptop is very different than working on a desktop computer. In this video, you’ll learn some of the best practices to consider when working inside a laptop computer.

Continue Reading

Network+ Training

Application Ports and Protocols – CompTIA Network+ N10-006 – 5.10

Application Ports and Protocols – CompTIA Network+ N10-006 – 5.10

The knowledge of our application ports and protocols is important for network security and management. In this video, you’ll learn about the popular application ports and protocols on your network.

Continue Reading

Common TCP and UDP Ports – CompTIA Network+ N10-006 – 5.9

Common TCP and UDP Ports – CompTIA Network+ N10-006 – 5.9

Network management and security requires a knowledge of TCP and UDP ports. In this video, you’ll learn about some of the most popular TCP and UDP protocols and their corresponding port numbers.

Continue Reading

Change Management Procedures – CompTIA Network+ N10-006 – 5.8

Change Management Procedures – CompTIA Network+ N10-006 – 5.8

There will always be changes to the network, and the management of these changes is critical. In this video, you’ll learn about the change management process.

Continue Reading

Security+ Training

Trust Models – CompTIA Security+ SY0-401: 6.3

Trust Models – CompTIA Security+ SY0-401: 6.3

There are many ways to manage and validate the trust of our encryption keys. In this video, you’ll learn about using CAs, mesh relationships, web-of-trust, and mutual authentication.

Continue Reading

Key Escrow – CompTIA Security+ SY0-401: 6.3

Key Escrow – CompTIA Security+ SY0-401: 6.3

The escrow of encryption keys can be a necessary process, but it isn’t without controversy. In this video, you’ll learn the advantages and disadvantages of escrowing your encryption keys.

Continue Reading

Key Registration – CompTIA Security+ SY0-401: 6.3

Key Registration – CompTIA Security+ SY0-401: 6.3

If a key is going to be associated with a person, there must be a formal way to validate the association. In this video, you’ll learn about the best practices for registering and assigning encryption keys.

Continue Reading

Windows 7 Training

Microsoft 70-680: 8.3 – Windows 7 File Recovery Options

Microsoft 70-680: 8.3 – Windows 7 File Recovery Options

Have you ever accidentally erased that important file? In this video, you’ll learn how to configure file restore points, restore previous versions of files, restore deleted files, and recover Windows 7 user profiles.

Continue Reading

Microsoft 70-680: 8.2 – Windows 7 System Recovery Options

Microsoft 70-680: 8.2 – Windows 7 System Recovery Options

When something goes wrong, you need to have all of the right tools available to fix the problem. In this video, you’ll learn how to create and restore from a system restore point, when to use the last known good configuration, how to rollback a driver, and how to completely restore a Windows 7 system.

Continue Reading

Microsoft 70-680: 8.1 – Windows 7 Backup

Microsoft 70-680: 8.1 – Windows 7 Backup

Windows 7 provides many different options for backing up and restoring your important files. In this video, you’ll learn how to create a system recovery disk, how to schedule backups, and how to back up files, folders, or the entire system.

Continue Reading

Other Recent Posts

?4U

?4U

| August 31, 2015

Which of these would best describe a code sent to your phone using SMS?

Continue Reading

It’s not that kind of CIDR

It’s not that kind of CIDR

| August 28, 2015

Which of these subnet masks is represented by the CIDR notation of /16?

Continue Reading

Professor Messer’s Security+ Study Group – August 2015

Professor Messer’s Security+ Study Group – August 2015

| August 27, 2015 | 0 Comments

Here’s a replay of my August 2015 Security+ Study Group. Follow along with our Q&A and test your Security+ knowledge!

Continue Reading