Print Page
Active as of Fall Semester 2022
I. General Information
1. Course Title:
A+
2. Course Prefix & Number:
COMP 1125
3. Course Credits and Contact Hours:
Credits: 5
Lecture Hours: 5
4. Course Description:
This course is designed to provide students with core and foundational knowledge, skills, and concepts related to IT hardware and end point operating systems in order to prepare students to troubleshoot and problem solve a wide variety of issues, ranging from networking and operating systems to mobile devices and security.
Career Preparation: The studies in this course will help students prepare for careers in fields such as Service Desk Analyst, Data Support Technician, Help Desk Tech, Desktop Support Administrator, Technical Support Specialist, End User Computing Technician Field Service Technician, Help Desk Technician, Associate Network Engineer and System Support Specialist.
5. Placement Tests Required:
Accuplacer (specify test): |
No placement tests required |
Score: |
|
6. Prerequisite Courses:
COMP 1125 - A+
There are no prerequisites for this course.
9. Co-requisite Courses:
COMP 1125 - A+
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
Hennepin Technical College, Hennepin MN
- CCIS2675 A+ HARDWARE SUPPORT & CCIS2680 A+ SOFTWARE SUPPORT
Lakes Superior College, Duluth MN
- CIS 1521 A+ Operating Systems Technologies & CIS 1522 A+ Core Hardware
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Military Experience
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
Program-Applicable Courses – This course is required for the following program(s):
Computer Information Technology, AAS
Computer IT Security & Networking, AAS
Computer Information Technology, Diploma
Computer IT Networking & Security, Diploma
Computer CompTIA IT Core, Certificate
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Assess alternative solutions to a problem |
Apply troubleshooting theory and an iterative approach to identify a problem, determine the cause, apply a solution, and then implement preventative measures. |
Analyze and follow a sequence of operations |
Follow troubleshooting and repair procedures, and identify iterative paths to resolving specific software/operating system-related computer repair problems. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Set up and support basic home and small office networks;
- Implement cybersecurity controls appropriate to helpdesk and technical support roles;
- Troubleshoot and support end-user access to applications and data;
- Identify, use and connect hardware components and devices;
- Explain types of networks and connections including transmission control protocol/internet; protocol (TCP/IP), Wi-Fi and small office/home office (SOHO);
- Troubleshoot network hardware and network issues;
- Identify and protect against security vulnerabilities for devices and their network connections;
- Install and support operarting systems, including command line and client support; and
- Troubleshoot PC and mobile device issues, including application security support.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Mobile Devices
- Install and configure laptop hardware and components
- Hardware/device replacement
- Install components within the display of a laptop
- Appropriate laptop features
- Characteristics of various types of other mobile devices
- Connect and configure accessories and ports of other mobile devices
- Configure basic mobile device network connectivity and application support
- Methods to perform mobile device synchronization
- Networking
- TCP and UDP ports, protocols, and their purposes
- Common networking hardware devices
- Install and configure a basic wired/wireless SOHO network
- Wireless networking protocols
- The properties and purposes of services provided by networked hosts
- Common network configuration concepts
- Internet connection types, network types, and their features
- Appropriate networking tools
- Hardware
- Basic cable types, features, and their purposes
- Common connector types
- Install RAM types
- Select, install, and configure storage devices
- Install and configure motherboards, CPUs, and add-on cards
- The purposes and s of various peripheral types
- Power supply types and features
- Install and configure common devices
- Configure SOHO multifunction devices/printers and settings
- Install and maintain various print technologies
- Virtualization and Cloud Computing
- Cloud computing concepts
- Set up and configure client-side virtualization
- Hardware and Network Troubleshooting
- The best practice methodology to resolve problems
- Troubleshoot problems related to motherboards, RAM, CPUs, and power
- Troubleshoot hard drives and RAID arrays
- Troubleshoot video, projector, and display issues
- Troubleshoot common mobile device issues while adhering to the appropriate procedures
- Troubleshoot printers
- Troubleshoot common wired and wireless network problems
- Operating Systems
- Common operating system types and their purposes
- Features of operating system versions
- General operating system installation considerations and upgrade methods
- Appropriate command line tools
- Operating system features and tools
- Control Panel utilities
- Application installation and configuration concepts
- Configure networking on a client/desktop
- Features and tools of different vendor based operating systems
- Security
- The importance of physical security measures
- Logical security concepts
- Wireless security protocols and authentication methods
- Detect, remove, and prevent malware using appropriate tools and methods
- Social engineering, threats, and vulnerabilities
- The differences of basic operating system security settings
- Implement security best practices to secure a workstation
- Implement methods for securing mobile devices
- Implement appropriate data destruction and disposal methods
- Configure security on SOHO wireless and wired networks
- Software Troubleshooting
- Troubleshoot operating system problems
- Troubleshoot and resolve PC security issues
- Best practice procedures for malware removal
- Troubleshoot mobile operating system and application issues
- Troubleshoot mobile operating system and application security issues
- Operational Procedures
- Best practices associated with types of documentation
- Implement basic change management best practices
- Implement basic disaster prevention and recovery methods
- Common safety procedures
- Environmental impacts and appropriate controls
- The processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
- Proper communication techniques and professionalism
- The basics of scripting
- Remote access technologies
I. General Information
1. Course Title:
A+
2. Course Prefix & Number:
COMP 1125
3. Course Credits and Contact Hours:
Credits: 5
Lecture Hours: 5
4. Course Description:
This course is designed to provide students with core and foundational knowledge, skills, and concepts related to IT hardware and end point operating systems in order to prepare students to troubleshoot and problem solve a wide variety of issues, ranging from networking and operating systems to mobile devices and security.
Career Preparation: The studies in this course will help students prepare for careers in fields such as Service Desk Analyst, Data Support Technician, Help Desk Tech, Desktop Support Administrator, Technical Support Specialist, End User Computing Technician Field Service Technician, Help Desk Technician, Associate Network Engineer and System Support Specialist.
5. Placement Tests Required:
Accuplacer (specify test): |
No placement tests required |
Score: |
|
6. Prerequisite Courses:
COMP 1125 - A+
There are no prerequisites for this course.
9. Co-requisite Courses:
COMP 1125 - A+
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
Hennepin Technical College, Hennepin MN
- CCIS2675 A+ HARDWARE SUPPORT & CCIS2680 A+ SOFTWARE SUPPORT
Lakes Superior College, Duluth MN
- CIS 1521 A+ Operating Systems Technologies & CIS 1522 A+ Core Hardware
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Military Experience
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
1. Program-Applicable Courses – This course is required for the following program(s):
Computer Information Technology, AAS
Computer IT Security & Networking, AAS
Computer Information Technology, Diploma
Computer IT Networking & Security, Diploma
Computer CompTIA IT Core, Certificate
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Analyze and follow a sequence of operations |
Follow troubleshooting and repair procedures, and identify iterative paths to resolving specific software/operating system-related computer repair problems. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Set up and support basic home and small office networks;
- Implement cybersecurity controls appropriate to helpdesk and technical support roles;
- Troubleshoot and support end-user access to applications and data;
- Identify, use and connect hardware components and devices;
- Explain types of networks and connections including transmission control protocol/internet; protocol (TCP/IP), Wi-Fi and small office/home office (SOHO);
- Troubleshoot network hardware and network issues;
- Identify and protect against security vulnerabilities for devices and their network connections;
- Install and support operarting systems, including command line and client support; and
- Troubleshoot PC and mobile device issues, including application security support.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Mobile Devices
- Install and configure laptop hardware and components
- Hardware/device replacement
- Install components within the display of a laptop
- Appropriate laptop features
- Characteristics of various types of other mobile devices
- Connect and configure accessories and ports of other mobile devices
- Configure basic mobile device network connectivity and application support
- Methods to perform mobile device synchronization
- Networking
- TCP and UDP ports, protocols, and their purposes
- Common networking hardware devices
- Install and configure a basic wired/wireless SOHO network
- Wireless networking protocols
- The properties and purposes of services provided by networked hosts
- Common network configuration concepts
- Internet connection types, network types, and their features
- Appropriate networking tools
- Hardware
- Basic cable types, features, and their purposes
- Common connector types
- Install RAM types
- Select, install, and configure storage devices
- Install and configure motherboards, CPUs, and add-on cards
- The purposes and s of various peripheral types
- Power supply types and features
- Install and configure common devices
- Configure SOHO multifunction devices/printers and settings
- Install and maintain various print technologies
- Virtualization and Cloud Computing
- Cloud computing concepts
- Set up and configure client-side virtualization
- Hardware and Network Troubleshooting
- The best practice methodology to resolve problems
- Troubleshoot problems related to motherboards, RAM, CPUs, and power
- Troubleshoot hard drives and RAID arrays
- Troubleshoot video, projector, and display issues
- Troubleshoot common mobile device issues while adhering to the appropriate procedures
- Troubleshoot printers
- Troubleshoot common wired and wireless network problems
- Operating Systems
- Common operating system types and their purposes
- Features of operating system versions
- General operating system installation considerations and upgrade methods
- Appropriate command line tools
- Operating system features and tools
- Control Panel utilities
- Application installation and configuration concepts
- Configure networking on a client/desktop
- Features and tools of different vendor based operating systems
- Security
- The importance of physical security measures
- Logical security concepts
- Wireless security protocols and authentication methods
- Detect, remove, and prevent malware using appropriate tools and methods
- Social engineering, threats, and vulnerabilities
- The differences of basic operating system security settings
- Implement security best practices to secure a workstation
- Implement methods for securing mobile devices
- Implement appropriate data destruction and disposal methods
- Configure security on SOHO wireless and wired networks
- Software Troubleshooting
- Troubleshoot operating system problems
- Troubleshoot and resolve PC security issues
- Best practice procedures for malware removal
- Troubleshoot mobile operating system and application issues
- Troubleshoot mobile operating system and application security issues
- Operational Procedures
- Best practices associated with types of documentation
- Implement basic change management best practices
- Implement basic disaster prevention and recovery methods
- Common safety procedures
- Environmental impacts and appropriate controls
- The processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
- Proper communication techniques and professionalism
- The basics of scripting
- Remote access technologies