ITF+ Content Guide
ITF+ Content Guide
ITF+
Official CompTIA learning resources for Instructor-Led Training are designed with
the instructor in mind, providing insights and tools for successfully training learners
pursuing their CompTIA IT Fundamentals (ITF+) certification.
OVERVIEW
The Official CompTIA IT Fundamentals (ITF+) (Exam FC0-U61) will provide students with the fundamental IT skills and concepts required to
identify and explain the basics of computing, IT infrastructure, software development, and database use. In addition, students will acquire
the essential skills and information they need to set up, configure, maintain, troubleshoot, and perform preventative maintenance of the
hardware and software components of a basic personal computer workstation and basic wireless devices. Students will also learn to
implement basic security measures and implement basic computer and user support practices as well as prepare candidates to take the
CompTIA IT Fundamentals (ITF+) certification exam.
LABS
CompTIA Labs, hosted by Learn on Demand Systems, allow students to learn in actual software applications through a remote lab
environment. Labs allow students to practice what they are learning using real, hands-on experiences. Students have access
to the software environment for 180 days after a CompTIA Labs access key is redeemed, providing a post-class resource for
students to practice their skills.
• Course-specific delivery tips provide the instructor with • eBook: An interactive online version of the book, along
additional insights to deliver the course successfully with secure PDF and downloadable versions
• Facilitator notes in instructor guide • Files: Any course files available to download
• Solutions to activities and discussions • Videos: Brief videos, developed exclusively for CompTIA
• PowerPoint slides: A complete set of slides to facilitate by ITProTV, provide demonstrations of key activities in
the class including lists, tables, diagrams, illustrations, the course
annotated screens and activity summaries • Assessment: A series of different assessments for each
• Presentation Planners help plan and schedule courses lesson as well an overall self-assessment
based on different course lengths • PowerPoint slides
• Solutions: Instructors have solutions to Activities and • Solutions to activities and discussions
Discussion Questions embedded within the Instructor
• Strengths and Weaknesses Dashboard: Students
Guide.
assessments results are aggregated in the Strengths and
Weaknesses dashboard to provide an indicator of their
overall performance in the course.
Module 1 The Value of Data Multimedia Ports and Devices Module 4 / Unit 5: Using Mobile
Using Computers Intellectual Property Printer Types Devices
Module 1 / Unit 1: Common Data-driven Business Decisions Installing and Configuring a Using a Mobile Device
Computing Devices Module 2 / Unit 2: Using Apps Printer Mobile Applications and App
Information Technology Installing Applications Scanners and Cameras Stores
Personal Computers (PC) Application Management Module 3 / Unit 4: Using Storage Network Connectivity
Mobile and IoT Devices Managing Software Licensing Devices Email Configuration
Module 1 / Unit 2: Using a Productivity Software System Memory Synchronization and Data Transfer
Workstation Collaboration Software Mass Storage Devices
Setting up a PC System Business Software Optical Discs and Drives Module 5
Ergonomic Concepts Module 2 / Unit 3: Programming and Flash Memory Devices Security Concepts
Navigating an OS App Development Module 3 / Unit 5: Using File Module 5 / Unit 1: Security Concerns
Using Input Devices Programming Logic Systems Computer Security Basics
Icons and Windows Programming Languages Managing the File System Social Engineering
Module 1 / Unit 3: Using an OS Programming Concepts Folders and Directories Business Continuity
Functions of an Operating System Object-Oriented Programming File Explorer Disaster Recovery
Types of Operating System Scripting Languages Files Module 5 / Unit 2: Using Best
Virtualization Application Platforms and Delivery File Attributes and Permissions Practices
Microsoft Windows Module 2 / Unit 4: Using Databases Searching for Folders and Files Securing Devices
Apple macOS and iOS Database Concepts File Types and Extensions Malware
Linux, Chrome, and Android Database Structures Preventing Malware Infections
File Explorer Relational Methods Module 4 Spam
Windows Settings and Control Database Access Methods Using Networks Software Sources and Patch
Panel Application Architecture Models Module 4 / Unit 1: Networking Management
Using a Web Browser Concepts Module 5 / Unit 3: Using Access
Module 1 / Unit 4: Managing an OS Module 3 Network Components Controls
Management Interfaces Using Computer Hardware TCP/IP Access Controls
Process and Service Management Module 3 / Unit 1: System Components Internet Protocol User Account Types
Memory and Disk Management Selecting a Computer Address Resolution Protocol Authentication Factors
Command Line Interfaces Motherboard Components DNS and URLs Uses of Encryption
Access Control and Protection Processors Internet Application Services Password Cracking and
Module 1 / Unit 5: Troubleshooting Features of Processors Module 4 / Unit 2: Connecting Management
and Support Expansion Bus to a Network Module 5 / Unit 4: Behavioral S
Support and Troubleshooting System Cooling Internet Service Types ecurity Concepts
Identifying the Problem BIOS and UEFI System Firmware Wireless Internet Services Policies and Procedures
Understanding the Problem Setting Up a Wireless Network Handling Confidential Information
Resolving and Documenting the Module 3 / Unit 2: Using Device Configuring a Wireless Client Acceptable Use Policies
Problem Interfaces Module 4 / Unit 3: Secure Web Expectations of Privacy
Developing a Troubleshooting Computer Connector Types Browsing Taking the Exam
Approach USB and Firewire Safe Browsing Practices Career Advice
Troubleshooting PC Issues Graphic Devices Configuring Browser Security Glossary
Getting Support Graphic Device Interfaces Managing Cookies and PII
Using a Search Engine Input Devices Digital Certificates and Anti-
Configuring Peripherals phishing
Module 2 Bluetooth and NFC Enabling a Firewall
Using Apps and Databases Networking Interfaces Module 4 / Unit 4: Using Shared
Module 2 / Unit 1: Using Data Types Module 3 / Unit 3: Using Peripheral Storage
and Units Devices Local Sharing and Storage
Notational Systems Installing and Uninstalling Windows File Sharing
Units of Measure Peripherals Hosted Sharing and Storage
Data Types Display Devices Backups
Data Representation Display Settings Windows Backup
© 2020 CompTIA, Inc., used under license by CompTIA, Inc. All rights reserved. All certification programs and education related to such programs are operated
exclusively by CompTIA, Inc. CompTIA is a registered trademark of CompTIA, Inc. in the U.S. and internationally. Other brands and company names mentioned
herein may be trademarks or service marks of CompTIA, Inc. or of their respective owners. Reproduction or dissemination prohibited without the written
consent of CompTIA, Inc. Printed in the U.S. 07231-Jan2020