CIS-24 Home http://www.c-jump.com/CIS24/CIS24syllabus.htm

Computer Maintenance


  1. What is Computer Maintenance?
  2. Today's Technology
  3. The Role of Computer Technician
  4. The Trained Technician
  5. Types of Troubleshooting
  6. Hardware
  7. Computer Media
  8. Computers
  9. Text Data Files
  10. System files
  11. Images and Multimedia
  12. Records/Logs
  13. Remote Storage and Other Media
  14. Data Volatility
  15. Examples of Data
  16. Organizing Computers
  17. A Word On Software
  18. Documentation

1. What is Computer Maintenance?



2. Today's Technology



3. The Role of Computer Technician


  • Upgrades and Maintenance

  • Solving Problems:

    • Understand what happened, why, and apply knowledge to solve it

  • CompTIA preparation helps us learn from examining

    • OS

    • hosts

    • workstations

    • media

    • logs, and more

  • Network problems solved by examining

    • servers

    • log files

    • ISP records, and more


4. The Trained Technician



5. Types of Troubleshooting


  1. Hardware

  2. Software

  3. Files

  4. Records/Logs

  5. Remote Storage/Other Media

     


6. Hardware



7. Computer Media


  • All sorts of storage devices...

  • ...Getting smaller

  • ...Larger capacity

    thumb drives hard drives CD removable drive smart card floppy

8. Computers



9. Text Data Files



10. System files



11. Images and Multimedia



12. Records/Logs



13. Remote Storage and Other Media



14. Data Volatility



15. Examples of Data


  • Volatile data

    • System date/time

    • Current network connections

    • Open TCP/UDP ports

    • Executables using TCP/UDP

    • Cached NetBIOS name table

    • Current users

    • Internal routing table

    • Running processes

    • Running services

    • Scheduled jobs

    • Open files

    • Process memory dumps

    • Loaded kernel modules

    • Mounted file systems

  • Non-volatile data

    • System version/patch level

    • File system time/date stamps

    • Registry data

    • Auditing policy

    • Login history

    • System event logs

    • Web server logs

    • Suspicious files

    • File system MD5 checksums

    • Current users

    • Syslog logs

    • User accounts

    • User history files


16. Organizing Computers



17. A Word On Software



18. Documentation