Comprehensive IT User Support Specialist Training: Accelerate Your Career - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

Comprehensive IT User Support Specialist Training: Accelerate Your Career

4.6/5

Enroll in our comprehensive IT Support Specialist Training Series, designed for individuals aspiring to excel in the dynamic field of IT. This career path training is perfect for those looking to establish themselves as IT Technical Support Specialists, IT Support Analysts, or Computer User Support Specialists.

Original price was: $129.00.Current price is: $51.60.

This Comprehensive IT User Support Specialist Training: Accelerate Your Career Features

hours
128 Hrs 51 Min
Videos
621 On-demand Videos
Closed Captions

Closed Captions

Course Topics
66  Topics
Question & Answers
1,079 Prep Questions
Certificate of Completion

Certificate of Completion

The Job Role of an IT User Support Specialist

As an IT Support Specialist, the primary role is to serve as the frontline of support for an organization’s IT infrastructure, ensuring that all technology systems operate smoothly and efficiently. This position involves a blend of technical expertise and strong communication skills, as specialists are responsible for addressing and resolving a wide range of technical issues. They play a crucial role in maintaining the organization’s productivity by providing timely and effective solutions to hardware, software, and network problems. Additionally, IT Support Specialists are instrumental in educating users, managing system security, and staying abreast of the latest technological advancements to continually improve the IT support provided.

The IT User Support Specialist, often known as a Desktop Support Specialist or Computer Support Specialist, is the go-to person for handling day-to-day tech issues. These professionals work diligently to troubleshoot problems and are an essential part of a System Support Specialist team, ensuring that systems are updated and running efficiently. Whether it’s a user facing a perplexing software glitch or a full-blown system outage, the Technology Support Specialist is on the case, providing solutions that keep the organization humming along.

Embark on a journey to become the backbone of organizational IT infrastructure. As an IT Support Specialist, you will ensure seamless operation of all technological systems, troubleshoot a wide array of issues, and provide expert assistance in hardware, software, and network troubleshooting, essential for the growth and productivity of any enterprise.

  1. Responding to User Inquiries: As the first line of contact, the IT Support Specialist addresses and resolves queries related to software, hardware, and network issues to ensure seamless operation for all users.
  2. Troubleshooting Technical Issues: Expertly diagnosing and resolving technical issues, a Desktop Support Specialist might tackle system errors, network connectivity, or hardware malfunctions.
  3. Providing Technical Assistance and Support: Offering comprehensive support, the Computer Support Specialist assists with the installation and configuration of hardware and software, ensuring users have the tools they need for success.
  4. Maintaining IT Documentation: Diligent record-keeping by the IT User Support Specialist ensures that all user issues, solutions, and IT system updates are meticulously documented.
  5. Conducting Regular System Maintenance: Regular maintenance tasks, a hallmark of a System Support Specialist’s role, are crucial for optimal system performance and robust security.
  6. Assisting in Network Management: A Technology Support Specialist aids in managing network infrastructure, setting up network accounts, and swiftly resolving any connectivity issues.
  7. Ensuring Security Compliance: The role involves implementing and monitoring security protocols, safeguarding systems from threats like viruses and malware, a task often associated with an Information Technology Support Specialist.
  8. Training Users: An Information Support Specialist educates staff on new technologies and IT policies, enhancing their competency and enabling efficient use of IT resources.
  9. Collaborating with IT Teams: Collaboration is key, and IT Technical Support Specialists often work alongside other IT staff to troubleshoot complex issues and refine IT services.
  10. Monitoring System Performance: Regular system checks are conducted to assess IT performance, a responsibility of the IT Systems Support Specialist aimed at continual improvement.
  11. Staying Updated with Technology Trends: Keeping abreast of the latest technology trends and developments is essential for providing relevant and up-to-date IT support and advice.
  12. Managing User Accounts and Access: IT Support Specialists are responsible for setting up and managing user accounts, ensuring correct permissions and access to IT resources.
  13. Providing Remote Support: Offering remote assistance is a critical aspect of an IT Support Specialist’s role, especially for users who are off-site or working from home, ensuring support continuity regardless of location.

Course: 1 - Estimated 2 Week(s) To Complete
CompTIA FC0-U61: IT Fundamentals Course Content
12 Hours 50 Minutes 51 Videos 160 Prep Questions
This course is the stepping stone for beginners in IT, covering basic IT literacy and concepts. It's essential for understanding the fundamentals of computing, networks, and cybersecurity, setting the stage for more advanced topics in the series.

Module 1 - IT Concepts and Terminology
   Module 1 Notes
   0.1 Instructor Intro
   1.1 Compare and Contrast Notational Systems
   1.1 Compare and Contrast Notational Systems Demo
   1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
   1.3 Illustrate the Basics of Computing and Processing
   1.4 Explain the Value of Data and Information
   1.5 Compare and Contrast Common Units of Measures
   1.5 Compare and Contrast Common Units of Measures Demo
   1.6 Explain the Troubleshooting Methodology

Module 2 - Infrastructure
   Module 2 Notes
   2.1 Classify Common Types of Input-Output Device Interfaces
   2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
   2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
   2.3 Explain the Purpose of Common Internal Computing Components
   2.4 Compare & Contrast Common Internet Service Types-
   2.5 Compare & Contrast Storage Types
   2.6 Compare & Contrast Common Computing Devices & Their Purposes
   2.7 Explain Basic Networking Concepts
   2.7 Explain Basic Networking Concepts Demo
   2.7 Explain Basic Networking Concepts Part 2
   2.7 Explain Basic Networking Concepts Part 3
   2.7 Explain Basic Networking Concepts Part 4
   2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
   2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

Module 3 - Applications and Software
   Module 3 Notes
   3.1 Explain the Purpose of Operating Systems
   3.1 Explain the Purpose of Operating Systems Demo
   3.2 Compare & Contrast Components of an Operating System
   3.2 Compare & Contrast Components of an Operating System Demo
   3.3 Explain the Purpose & Proper Use of Software
   3.4 Explain Methods of Application Architecture & Delivery Models
   3.5 Given a Scenario Configure & Use Web Browsers
   3.5 Given a Scenario Configure & Use Web Browsers FireFox
   3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
   3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
   3.6 Compare & Contrast General Application Concepts & Uses

Module 4 - Software Development
   Module 4 Notes
   4.1 Compare & Contrast Programming Language Categories-
   4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
   4.3 Explain the Purpose & Use of Programming Concepts-
   4.3 HTML Demo

Module 5 - Database Fundamentals
   Module 5 Notes
   5.1 Explain Database Concepts and the Purpose of Databases
   5.2 Compare and Contrast Various Database Structures
   5.3 Summarize Methods Used to Interface with Databases
   5.3 Summarize Methods Used to Interface with Databases Demo

Module 6 - Security
   Module 6 Notes
   6.1 Summarize Confidentiality, Integrity, and Availability Concerns
   6.2 Explain Methods to Secure Devices and Best Practices
   6.3 Summarize Behavioral Security Concepts
   6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
   6.5 Explain Password Best Practices
   6.6 Explain Common Uses of Encryption
   6.7 Explain Business Continuity Concepts
   6.8 Takeaways-
   6.9 ITF Fundamentals Conclusion

Course: 2 - Estimated 0 Week(s) To Complete
ChatGPT and AI Business Fundamentals Course Content
02 Hours 44 Minutes 38 Videos 20 Prep Questions
This course introduces the rapidly evolving field of artificial intelligence, focusing on ChatGPT and its applications in business. It's crucial for IT support specialists to understand AI's role in modern business environments and how to leverage these tools for enhanced user support.

Module 1 - ChatGPT Fundamentals
   1.1 Course Welcome
   1.2 Instructor Introduction
   1.3 Download Course Resources
   1.4 ChatGPT Fundamentals
   1.5 What is ChatGPT
   1.6 Use Cases for ChatGPT
   1.7 Role of ChatGPT
   1.8 Future of ChatGPT
   1.9 ChatGPT Statistics, Facts & Trends
   1.10 Limitations
   1.11 What is a Chatbot
   1.12 Understanding AI-ML
   1.13 Demonstration - Tools to Use with ChatGPT
   1.14 Business Benefits
   1.15 Whiteboard - How it all works
   1.16 Demonstration - How to Get Started with ChatGPT
   1.17 Demonstration - Example Prompts
   1.18 Discussion - ChatGPT Performance Issues
   1.19 Module Summary

Module 2 - ChatGPT Prompt Demonstrations
   2.1 ChatGPT Prompt Demonstrations
   2.2 What is a Prompt
   2.3 Best Practices For Writing Prompts
   2.4 Prompt Demonstration - Asking Questions
   2.5 Prompt Demonstration - Top Ten Lists
   2.6 Prompt Demonstration - Long Form Docs
   2.7 Prompt Demonstration - Complex Form and Code
   2.8 Prompt Demonstration - Feedback
   2.9 Prompt Demonstration - Content Modification
   2.10 Prompt Demonstration - Instruction Generation
   2.11 Prompt Demonstration - Information Extraction
   2.12 Prompt Demonstration - Writing Computer Code
   2.13 Prompt Demonstration - Solving Math Problems
   2.14 Prompt Demonstration - Create YT Video Outline
   2.15 Prompt Demonstration - Write a Blog Article
   2.16 Prompt Demonstration - SEO Keywords
   2.17 Comparing Google Bard vs ChatGPT
   2.18 Module Summary
   2.19 Course Closeout

Course: 1 - Estimated 3 Week(s) To Complete
CompTIA A+ 220-1101 (Core 1) Course Content
21 Hours 52 Minutes 139 Videos 125 Prep Questions
This course provides entry-level information security specialists with essential knowledge of computing hardware and peripherals, which is critical for understanding and safeguarding the physical components of information systems against security threats.

Module 1 - Devices, Setups, and Installs
   1.1 Introduction to the Course, Meet the Instructor
   1.2 Appropriate Safety Procedures
   1.3 PC Components
   1.4 Guidlines for PC Disassembly
   1.5 Motherboards
   1.6 CPU Sockets
   1.7 PCI Bus
   1.8 Storage Bus (SATA and IDE)
   1.9 Discussing PC Components
   1.10 Common Connection Interfaces
   1.11 Wired and Wireless Connection Standards
   1.12 Install Peripheral Devices
   1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices
   2.1 Displays and Multimedia
   2.2 Display Device Connections and Cables
   2.3 Discussing Display Device Installation and Configuration
   2.4 Troubleshoot Display Devices
   2.5 Guidelines for Troubleshooting Display Devices
   2.6 Discussing Display Device Troubleshooting
   2.7 Install and Configure Multimedia Devices
   2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types
   3.1 Supporting Multiple Drive Types and Memory
   3.2 Memory Types
   3.3 RAM Types
   3.4 Memory Modules
   3.5 DIMM and SO-DIMM Technologies
   3.6 Parity and ECC RAM
   3.7 Memory Compatibility Issues
   3.8 Discussing System Memory Installation
   3.9 Install and Configure Mass Storage Devices
   3.10 Storage Adapters and Cables
   3.11 Solid State Drives
   3.12 Guidlines for Installing Mass Storage Devices
   3.13 Discussing Mass Storage Device Installation and Configuration
   3.14 Install and Configure Removable Storage
   3.15 Discussing Removable Storage Device Istallation and Configuration
   3.16 Configure RAID
   3.17 RAID Configuration Options
   3.18 Discussing RAID Configuration
   3.19 Troubleshoot Storage Devices
   3.20 Boot Failures
   3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components
   4.1 Install Upgrade CPUs
   4.2 Multiprocessing and Multicore Processors
   4.3 Discussing CPU Upgrades
   4.4 Configure and Update BIOS UEFI
   4.5 Discussing BOIS-UEFI Configuration and Updates
   4.6 Install Power Supplies
   4.7 Discussing Power Supply Installation
   4.8 Troubleshoot Internal System Components
   4.9 POST and Boot Problems
   4.10 Boot Troubleshooting and Log Entries
   4.11 Motherboard Component Problems
   4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories
   5.1 Wired Networks
   5.2 Common Ethernet Network Implementations
   5.3 Taps and Mirrors
   5.4 Discussing Wired Networks
   5.5 Network Hardware Devices
   5.6 Switches
   5.7 Power Over Ethernet
   5.8 Discussing Network Hardware Devices
   5.9 Wireless Networks
   5.10 Access Points and Wireless Network Modes
   5.11 Discussing Wireless Networks
   5.12 Internet Connection Types
   5.13 Wireless Internet Service Providers WISP
   5.14 Discussing Internet Connection Types
   5.15 Network Configuration Concepts
   5.16 The TCIP-IP Protocol Suite
   5.17 Internet Protocol and IP Addressing
   5.18 Public and Private IP Addresses
   5.19 IPv6
   5.20 Discussing Network Configuration Concepts
   5.21 Network Services
   5.22 DNS
   5.23 Dynamic and Static IP Configurations
   5.24 DNS Records MX and A
   5.25 Web Servers and HTTP-HTTPS
   5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics
   6.1 Configuring and Troubleshooting Networks
   6.2 Network Connections in Windows
   6.3 Install and Configure SOHO Networks
   6.4 Configure SOHO Network Security
   6.5 Firewalls
   6.6 Port Fowarding and Port Triggering
   6.7 Windows Firewall
   6.8 Network Security and Embedded Appliances
   6.9 Configure Remote Access
   6.10 Discussing Remote Access Configuration
   6.11 Troubleshoot Network Connections
   6.12 IP Configuration Issues
   6.13 Routing Issues
   6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing
   7.1 Configure Client-Side Virtulaization
   7.2 Hypervisors
   7.3 Processor Support and Resource Requirements
   7.4 Virtual Networks
   7.5 Client-Side Virtualization
   7.6 Cloud Computing Concepts
   7.7 Internal and External Shared Resources
   7.8 Cloud Service Options
   7.9 Virtual Desktops
   7.10 Software-Defined Networking (SDN)
   7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting
   8.1 Use Laptop Features
   8.2 Expansion Options
   8.3 Discussing Laptop Features
   8.4 Install and Configure Laptop Hardware
   8.5 Discussing Laptop Hardware Installation and Configuration
   8.6 Troubleshoot Common Laptop Issues
   8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices
   9.1 Syncing and Setup of Mobile Devices
   9.2 Connect and Configure Mobile Devices
   9.3 Configure Mobile Device Network Connectivity
   9.4 Mobile VPN Configuration
   9.5 Email Configuration Options
   9.6 Discussing Mobile Device Network Connectivity Configuration
   9.7 Support Mobile Apps
   9.8 Discussing Mobile App Support

Module 10 - All Things Printing
   10.1 All Things Printing
   10.2 Discussing Laser Printer Maintenance
   10.3 Maintain Inkjet Printers
   10.4 Discussing Inkjet Printer Maintenance
   10.5 Maintain Impact, Thermal, and 3D Printers
   10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
   10.7 Install and Configure Printers
   10.8 Discussing Printer Installation and Configuration
   10.9 Troubleshoot Print Device Issues
   10.10 Install and Configure Imaging Devices
   10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing
   11.1 Introduction to Resources and Testing
   11.2 Resources and Testing
   11.3 Joining a Domain with Windows 10
   11.4 Boot Order and BIOS
   11.5 Virtual Machine Install & Configure
   11.6 PC Teardown
   11.7 Exploring the Laptop
   11.8 Install Windows 10 Demonstration

Course: 2 - Estimated 3 Week(s) To Complete
CompTIA A+ 220-1102 (Core 2) Course Content
20 Hours 34 Minutes 135 Videos 125 Prep Questions
It builds upon the hardware knowledge by delving into operating systems, software troubleshooting, and operational procedures, equipping entry-level specialists with the capabilities to manage and protect systems software and ensure operational security.

Module 1 - Operating System Management
   1.1 Introduction to the Course, Meet the Instructor
   1.2 Identify Common Operating Systems
   1.3 Microsoft Windows
   1.4 Work and Education Features
   1.5 Windows System Limits
   1.6 Apple Operating Systems
   1.7 Linux Disk and File Management
   1.8 Discussing OS Types
   1.9 Use Windows Features and Tools
   1.10 Administrative Tools
   1.11 Manage Files in Windows
   1.12 System Hierarchies
   1.13 File Attributes
   1.14 Discussing Windows Features and Tools
   1.15 Manage Disks in Windows
   1.16 Discussing File Management in Windows
   1.17 The Windows Disk Management Console
   1.18 Discussing Windows Disk Management
   1.19 Manage Devices in Windows
   1.20 Device Manager
   1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS
   2.1 Configuring and Installing the OS
   2.2 Installation Boot Methods
   2.3 Disk Formatting and Partitioning
   2.4 Networking Considerations
   2.5 Post Installation Tasks
   2.6 OS Installation Types
   2.7 Unattended Installations
   2.8 Maintain OSs
   2.9 OS Updates
   2.10 Anti-Malware Updates
   2.11 Scheduled Backups
   2.12 Task Schedulers part 1
   2.13 Task Schedulers part 2
   2.14 Install Windows 10 Demonstration
   2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS
   3.1 Install and Manage Windows Applications
   3.2 Windows OS Tools
   3.3 Application and Print Services
   3.4 Task Manager
   3.5 Manage Windows Performance
   3.6 Windows Performance Management Tools
   3.7 Troubleshoot Windows
   3.8 Event Viewer
   3.9 The System Configuration Utility
   3.10 Troubleshooting Tips Boot Process
   3.11 Troubleshooting Tips for Windows System Issues
   3.12 Blue Screens and Spontaneous Shutdowns
   3.13 Troubleshooting Tips for File and Memory Corruption
   3.14 Safe Boot
   3.15 System Repair Disc
   3.16 System Restore
   3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools
   4.1 Network Management Tools
   4.2 Network Connectivity
   4.3 IP Addressing and Connection Types
   4.4 Proxy Settings
   4.5 Windows Client Configuration
   4.6 Location Services
   4.7 Firewalls
   4.8 Network Troubleshooting
   4.9 Remote Desktop Tools
   4.10 Desktop Management and Remote Monitoring Tools
   4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management
   5.1 Sharing Resources and Wrights Management
   5.2 User Group Accounts
   5.3 Local Secutity Policy
   5.4 SSO and Credential Manager
   5.5 Workgroups and Homegroups
   5.6 Network and Sharing Center
   5.7 Network Share Configuration
   5.8 NTSF File and Folder Permissions
   5.9 Configure Active Directory Accounts and Policies
   5.10 Domain Membership and Group Policy Objects
   5.11 Basic AD Functions
   5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures
   6.1 Threats and Security Measures
   6.2 Logical Security Concepts
   6.3 Encryption
   6.4 PKI and Certificates
   6.5 Execution Control
   6.6 NAC
   6.7 Discussing Logical Decurity Concepts
   6.8 Threats and Vulnerablilities
   6.9 Types of Password Attacks
   6.10 Discussing Threats and Vulnerabilities
   6.11 Physical Security Controls
   6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data
   7.1 Policies to Protect Data
   7.2 Implement Security Best Practices
   7.3 Guidlines for Implementing Security Best Practices
   7.4 Discussing Security Best Practices Implementation
   7.5 Implement Data Protection Policies
   7.6 ACLs and Directory Permissions
   7.7 Full Disk Encryption
   7.8 Guildlines for Implementing Data Protection Policies
   7.9 Discussing Data Protection Policies
   7.10 Protect Data During Incident Response
   7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats
   8.1 Prevent Malware and Security Threats
   8.2 Detect, Remove, and Prevent Malware
   8.3 Trojan Horses and Spyware
   8.4 Sources of Malware Infection
   8.5 Best Practices for Malware Removal
   8.6 Discussing Detecting, Removing, and Preventing Malware Infections
   8.7 Troubleshoot Common Workstation Security Issues
   8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices
   9.1 Supporting and Troubleshooting Mobile Devices
   9.2 Secure Mobile Devices
   9.3 IOT Internet of Things
   9.4 Discussing Mobile Device Security
   9.5 Troubleshoot Mobile Device Issues
   9.6 Mobile Device Security Troubleshooting
   9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures
   10.1 Implementing Operational Procedures
   10.2 Environmental Impacts and Controls
   10.3 Discussing Environmental Impact and Controls
   10.4 Create and Maintain Documentation
   10.5 Discussing Documentation Creation and Maintenance
   10.6 Use Basic Change Management Best Practices
   10.7 Discussing Change Management Best Practices
   10.8 Implement Disaster Prevention and Recovery Methods
   10.9 Discussing Implement Disaster Prevention and Recovery Methods
   10.10 Basic Scripting Concepts
   10.11 Discussing Scripting
   10.12 Professionalism and Communication
   10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing
   11.1 Introduction to Resources and Testing
   11.2 Resources and Testing
   11.3 Joining a Domain with Windows 10
   11.4 Boot Order and BIOS
   11.5 Virtual Machine Install & Configure
   11.6 PC Teardown
   11.7 Exploring the Laptop
   11.8 Install Windows 10 Demonstration

Course: 5 - Estimated 1 Week(s) To Complete
Microsoft Managing Modern Desktops Course Content
04 Hours 56 Minutes 43 Videos 75 Prep Questions
This course is centered on managing and deploying Windows 10 in a corporate environment. It's vital for IT support specialists to master these skills to efficiently manage, secure, and monitor devices and client applications in a modern workplace.

Module 1: Deploy and Update Operating Systems
   1.1 Instructor and Course Introduction
   1.2 Exam Information
   1.3 Deploy and Update Operating Systems Introduction
   1.4 Plan and Implement Windows 10 by Using Dynamic Deployment
   1.5 Plan and Implement Windows 10 by Using Windows Autopilot
   1.6 Upgrade Devices to Windows 10
   1.7 Manage Updates
   1.8 Manage Device Authentication
   1.9 Install VMware Workstation 15 in Windows 10 Demo
   1.10 Performing a Clean Install of Windows 10 Demo
   1.11 Upgrading Windows 8.1 to Windows 10 Demo
   1.12 Configuring Locales Demo
   1.13 Troubleshooting Failed Installation with Setup Logs Demo
   1.14 Installing Windows 16 Server Demo
   1.15 Installing Microsoft Deployment Toolkits (MDT) Part 1 Demo
   1.16 Installing Microsoft Deployment Toolkits (MDT) Part 2 Demo
   1.17 Setting Up an On-Site Domain Controller Demo
   1.18 Joining Windows 10 Client Machine to an On-Site Domain Controller Demo
   1.19 Getting Started with Free Azure Subscription Demo
   1.20 Getting Familiarized with Azure Portal Options Demo
   1.21 Create a Virtual Machine Demo

Module 2: Manage Policies and Profiles
   2.1 Managing Policies and Profiles Introduction
   2.2 Plan and Implement Co-Management
   2.3 Implement Conditional Access and Compliance Policies
   2.4 Configure Device Profiles
   2.5 Manage User Profiles
   2.6 Deploy Azure Container Instances Demo
   2.7 Manage Access with RBAC Demo
   2.8 Secure Network Traffic Demo
   2.9 Installing OneDrive Demo

Module 3: Manage and Protect Devices
   3.1 Manage and Protect Devices Introduction
   3.2 Manage Windows Defender
   3.3 Manage Intune Device Enrollment and Inventory
   3.4 Monitor Devices
   3.5 Windows Defender Security Center Overview Demo
   3.6 Installing Windows Defender Application Guard Demo
   3.7 Creating a New Inbound Rule Demo

Module 4: Manage Apps and Data
   4.1 Manage Apps and Data Introduction
   4.2 Deploy and Update Applications
   4.3 Implement Mobile Application Management
   4.4 Setting up a Microsoft Intune Account Demo
   4.5 Create a New Group Demo
   4.6 Confirm the Version of Windows Demo

Course: 4 - Estimated 7 Week(s) To Complete
CompTIA Network+ N10-008 Course Content
46 Hours 35 Minutes 190 Videos 179 Prep Questions
It provides a deep dive into networking technologies, an essential skill set for entry-level information security specialists to analyze, secure, and administer network infrastructures, which are often targeted in cyber attacks.

Module 0 - Course introduction
   0.1 Instructor Intro
   0.2 Course Overview

Module 1 - Networking Fundamentals
   1.1 Intro to Networking
   1.1.1 Activity: Creating a Network
   1.2 Common Terminology
   1.2.1 Activity: Examining Ports and Sockets
   1.3 OSI Model
   1.4 DoD Model
   1.4.1 Activity: Examining Network Layers
   1.5 TCP, UDP, IP
   1.5.1 Activity: Examining TCP
   1.5.2 Activity: Examining UDP
   1.5.3 Activity: Examining IP
   1.6 ICMP, IGMP, ARP
   1.6.1 Activity: Examining ICMP
   1.6.2 Activity: Examining ARP
   1.6.3 Activity: Examining IGMP
   1.7 Network Topologies
   1.8 Network Types
   1.9 Part 1: Network Characteristics
   1.9 Part 2: Network Characteristics
   1.10 Module 1 outro

Module 2 - Cables and Connectors
   2.1 Ethernet Standards
   2.2 Copper Cable Types
   2.3 Fiber Optic Cable Types
   2.4 Connector Types
   2.4.1 Activity: Selecting the Right Cable
   2.5 Media Converters and Transceivers
   2.6 Cable Management
   2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)
   3.1 IPv4 Basics
   3.2 IP Packet and Interface Types
   3.2.1 Activity: Configuring Client IP Settings
   3.3 Binary Numbering System
   3.4 Classful and Classless Addressing
   3.5 Understanding CIDR Notation
   3.6 IPv4 Subnetting Method
   3.7 Verifying with Binary
   3.8 Finding Subnet IDs
   3.8.1 Activity: Subnetting a Class C Network
   3.9 The Delta in Action
   3.9.1 Activity: Subnetting With the Delta
   3.10 Subnetting Based on Hosts
   3.11 Subnetting in Other Octets
   3.12 Supernetting
   3.12.1 Activity: Supernetting
   3.13 IPv6
   3.14 IPv4 - IPv6 Transition Mechanisms
   3.15 Module 3 Outro

Module 4 - Layer 7 Protocols
   4.1 Remote Control Protocols
   4.2 File Sharing Protocols
   4.3 Web Protcols
   4.4 Email Protocols
   4.5 Database Protocols
   4.6 Voice Protocols
   4.7 Security Protocols
   4.8 Management Protocols
   4.9 Module 4 Outro

Module 5 - Network Services
   5.1 DHCP
   5.1.1 Activity: Configuring DHCP
   5.1.2 Activity: Configuring a DHCP Relay Agent
   5.2 DNS
   5.2.1 Activity: Configuring DNS - Part 1
   5.2.2 Activity: Configuring DNS - Part 2
   5.3 NTP
   5.4 Corporate and Datacenter Network Architecture
   5.5 Cloud Concepts and Connectivity Options
   5.6 Module 5 Outro

Module 6 - Networking Devices
   6.1 Introductory Concepts
   6.2 Repeaters and Hubs
   6.2.1 Activity: Connecting Devices with a Hub
   6.3 Bridges and Switches
   6.3.1 Activity: Connecting Devices with a Switch
   6.4 Routers and Multilayer Switches
   6.5 Security Devices
   6.6 Modems
   6.7 Module 6 Outro

Module 7 - Networked Devices
   7.1 IP Devices
   7.2 IoT
   7.2.1 Activity - Programming IoT Devices
   7.3 ICS/SCADA
   7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management
   8.1 Routing Basics
   8.1.1 Activity: Configuring Static Routes
   8.2 Packet Delivery on the Same Network
   8.3 IP Routing Across a Single Router
   8.4 IP Routing Across Multiple Hops
   8.4.1 Activity: Static Routes - CHALLENGE
   8.5 Route Selection
   8.6 RIP
   8.6.1 Activity: Configuring RIP - CHALLENGE
   8.7 OSPF
   8.8 EIGRP
   8.9 BGP
   8.10 NAT/PAT
   8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching
   9.1 Ethernet Basics
   9.2 Switching Overview
   9.2.1 Activity: Examining a MAC Table
   9.3 VLANs
   9.3.1 Activity: Creating VLANs
   9.4 VLAN Trunking
   9.4.1 Activity: Configuring VLAN Trunking
   9.5 VLAN Routing
   9.5.1 Activity: Configuring VLAN Routing
   9.6 Contention Management
   9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies
   10.1 Wireless Overview
   10.2 Radio Basics
   10.3 Modulation
   10.4 Wi-Fi Standards
   10.5 Antennas
   10.6 Wi-Fi Service Sets
   10.7 Wi-Fi Security
   10.8 Cellular

Module 11 Network Performance
   11.1 Monitoring Performance
   11.2 Common Metrics
   11.2.1 Activity: Examining Interface Statistics
   11.3 SNMP
   11.4 Netflow
   11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery
   12.1 HA and DR Concepts
   12.2 High Availability Mechanisms
   12.3 Disaster Recovery Mechanisms
   12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents
   13.1 Plans and Procedures
   13.2 Security Policies
   13.3 Loss Prevention
   13.4 Common Agreements
   13.5 Common Documentation
   13.6 Structured Cabling - MDF and IDF
   13.7 Horizontal and Vertical Cabling
   13.7.1 Activity - Implementing Cable Management
   13.8 Labeling
   13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security
   14.1 Common Security Concepts
   14.2 Common Attack Types
   14.3 Spoofing-based Attacks
   14.4 Hijacking and MITM
   14.5 Social Engineering
   14.6 Network Segmentation
   14.7 Private VLANs
   14.8 Single Organization Authentication
   14.9 Extending Authentication
   14.10 Authorization
   14.11 Network Device Hardening
   14.12 Wireless Security
   14.13 Remote Access Security
   14.14 IoT Security
   14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting
   15.1 Troubleshooting Methodology
   15.2 Physical Connectivity Issues
   15.3 Hardware Testing Tools
   15.3.1 Activity - Testing an Ethernet Cable
   15.3.2 Activity - Crimping on an RJ-45 Connector
   15.3.3 Activity - Punching Down Twisted Pair
   15.3.4 Activity - Using a Telephone Toner
   15.4 Understanding Electricity
   15.4.1 Activity - Checking Cable Continuity
   15.4.2 Activity - Testing DC Voltage
   15.4.3 Activity - Testing AC Voltage
   15.5 Twisted Pair Pinout Problems
   15.6 Twisted Pair Termination Problems
   15.7 Repairing Damaged Twisted Pair Cable
   15.8 Fiber Optic Connectivity Issues
   15.8.1 Activity - Testing a Fiber Optic Cable
   15.9 Common Port Problems
   15.9.1 Working with Ports and Their Devices
   15.10 Common Software Testing Tools
   15.10.1 Activity - Scanning for Open Ports
   15.11 Common Command Line Utilities
   15.12 Troubleshooting Basic IP Networking Issues
   15.13 Common Switching Issues
   15.14 Switching Test Tools and Techniques
   15.15 Common IP Routing Issues
   15.16 Wi-Fi Access Point Issues
   15.17 Wirelss Interference
   15.17.1 Activity - Using a Spectrum Analyzer
   15.18 Wireless Antenna Issues
   15.18.1 Activity - Configuring a Wi-Fi Router
   15.19 WAP Placement Strategies
   15.20 Infrastructure Service Issues (DHCP)
   15.21 Infrastructure Service Issues (DNS)
   15.22 Infrastructure Service Issues (NTP)
   15.23 Fireall / ACL Issues
   15.24 VPN Issues
   15.25 Additional Network Security Troubleshooting and Tips
   15.26 Advanced Networking Issues
   15.27 Troubleshooting Server Services (with Module 15 Outro)
   CompTIA Network+ N10-008 Course Outro

Course: 5 - Estimated 3 Week(s) To Complete
CompTIA Security+ SY0-601 (2022) Course Content
19 Hours 17 Minutes 25 Videos 146 Prep Questions
This course is integral for entry-level information security specialists, as it covers the core knowledge required to implement, monitor, and manage a secure network and understand the principles of risk management, cryptography, and identity management.

Module 1 - Introduction to Security
   1.1 Introduction to Security

Module 2 - Malware and Social Engineering Attacks
   2.1 Malware and Social Engineering Attacks

Module 3 - Basic Cryptography
   3.1 Basic Cryptography

Module 4 - Advanced Cryptography and PKI
   4.1 Advanced Cryptography and PKI

Module 5 - Networking and Server Attacks
   5.1 Networking and Server Attacks

Module 6 - Network Security Devices, Designs and Technology
   6.1 Network Security Devices, Designs and Technology

Module 7 - Administering a Secure Network
   7.1 Administering a Secure Network

Module 8 - Wireless Network Security
   8.1 Wireless Network Security

Module 9 - Client and Application Security
   9.1 Client and Application Security

Module 10 - Mobile and Embedded Device Security
   10.1 Mobile and Embedded Device Security

Module 11 - Authentication and Account Management
   11.1 Authentication and Account Management

Module 12 - Access Management
   12.1 Access Management

Module 13 - Vulnerability Assessment and Data Security
   13.1 Vulnerability Assessment and Data Security

Module 14 - Business Continuity
   14.1 Business Continuity

Module 15 - Risk Mitigation
   15.1 Risk Mitigation

Module 16 - Security Plus Summary and Review
   16.1 - Security Plus Summary and Review

Module 17 - Hands-On Training
   17.1 Hands-On Scanning Part 1
   17.2 Hands-On Scanning Part 2
   17.3 Hands-On Advanced Scanning
   17.4 Hands-On MetaSploit
   17.5 Hands-On BurpSuite
   17.6 Hands-On Exploitation Tools Part 1
   17.7 Hands-On Exploitation Tools Part 2
   17.8 Hands-On Invisibility Tools
   17.9 Hands-On Connect to Tor

Expanding Career Opportunities: From Desktop Support to Network Troubleshooting With roles such as Desktop Support Specialist and Computer Support Specialist, our courses prepare you for day-to-day tech challenges. You’ll learn to manage user accounts, provide remote support, and stay updated with the latest technology trends. Our curriculum also includes a unique module on troubleshooting common networking issues, reflecting real-world IT scenarios.

Our learning path is crafted to guide you through the essentials of technical support, preparing you for career advancement in the field. Discover the intricacies of network management, system maintenance, and security compliance, and prepare for a prosperous career in tech support with a clear understanding of the IT Support job role and requirements.

In the current dynamic tech realm, the surge for adept IT professionals has skyrocketed, creating an urgent need for qualified IT Support Specialists, Desktop Support Specialists, and more. Our exhaustive training programs are strategically devised to fulfill this demand, paving the way for aspirants to excel as IT User Support Specialists and other integral IT roles. These courses delve into both the hands-on and theoretical dimensions of IT support, ensuring that trainees are thoroughly prepared to navigate the complexities of today’s technological infrastructures.

The multifaceted role of an IT Support Specialist encompasses a spectrum of responsibilities, from adeptly troubleshooting hardware and software conundrums to delivering critical assistance to end-users. Our curriculum dives deep, readying learners for a plethora of positions such as Computer Support Specialists, Technology Support Specialists, and System Support Specialists. It’s meticulously crafted to endow participants with essential capabilities—problem-solving acumen, technical mastery, and superior communication prowess. For those pondering “What is an IT Support Specialist?” or “What does an IT Support Specialist do?”, our series renders exhaustive insights through hands-on experiences and scenarios that mirror the real world.

Additionally, our series marks the perfect launchpad for anyone aspiring to carve out an IT support career. It addresses pivotal inquiries like “What is an IT Technical Support Specialist?” and “What qualifications do IT Support Specialists need?”, while charting a clear trajectory toward securing those credentials. Designed to align with current IT Support job requirements and to stay a step ahead of emerging industry trends, this foresight equips our trainees not only for the present job market but also primes them for the tech innovations on the horizon.

Beyond foundational topics, our training series sheds light on the vast array of career opportunities in the sector, including roles like Computer User Support Specialist jobs and positions as IT Systems Support Specialists. It arms participants with the necessary IT Support Specialist qualifications, making this series an indispensable tool for those steadfast in forging a successful IT support career.

The job outlook for IT User Support Specialists is positive. According to the U.S. Bureau of Labor Statistics (BLS), overall employment for computer support specialists is projected to grow by 5% from 2022 to 2032, which is faster than the average for all occupations. The BLS anticipates about 66,500 openings for computer support specialists each year, on average, over the decade​​. This growth is likely driven by the continuous adoption of new technology and the need for support services in various sectors.

Below is a table of the median salary for an IT User Support Specialist across major U.S. cities based on the latest available data:

CityMedian Salary
San Francisco, CA$71,567
Washington, DC$63,735
Miami, FL$55,566
Chicago, IL$60,397
Boston, MA$64,508
New York, NY$67,273
Dallas, TX$56,882

Please note that the salary ranges can vary widely depending on many important factors, including education, certifications, additional skills, and the number of years spent in the profession. The median salary figures are as of October 25, 2023​​. Check Salary.com for any more current salary data.

Whether you’re kickstarting your career, seeking a career change, or looking to advance in IT, our series is for you. It’s also ideal for students, freelancers, small business owners, and technology enthusiasts eager to deepen their IT knowledge.

This IT User Support Specialist training series is ideal for a wide range of individuals looking to either enter or advance in the field of information technology support. Here are some specific groups who would greatly benefit from this series:

  1. Career Starters: Individuals who are just beginning their careers and have an interest in technology will find this series a solid foundation. It’s perfect for those who aspire to become IT Support Specialists, Desktop Support Specialists, or any entry-level IT support role.
  2. Career Changers: Professionals looking to transition into the IT field from other industries will find this training invaluable. The comprehensive coverage of fundamental IT support skills and concepts makes it an excellent starting point for a new career path.
  3. IT Professionals Seeking Advancement: Those already working in IT who wish to upskill, specialize, or move up the career ladder will benefit from the advanced modules and certifications. Roles like System Support Specialist, IT Systems Support Specialist, or IT Technical Support Specialist often require the advanced knowledge and certifications that this series provides.
  4. Students and Recent Graduates: College students or recent graduates with a focus on computer science, information technology, or related fields will find this series enhances their theoretical knowledge with practical, real-world skills, making them more marketable for Computer User Support Specialist jobs and other roles.
  5. Freelancers and Independent Consultants: Individuals who offer freelance IT support services or wish to start their own IT support consultancy will gain a wealth of knowledge and credentials from this series, enhancing their ability to serve a diverse range of clients.
  6. Small Business Owners: Owners of small businesses who need to manage their IT infrastructure effectively will find this training useful for understanding and handling basic IT support tasks, reducing the need for external support.
  7. Enthusiasts and Hobbyists: Even if not pursuing IT support as a career, those with a keen interest in technology and computer systems will find this series enriching and enjoyable, providing a deeper understanding of the IT world.

In summary, this training series is tailored to meet the needs of a diverse audience, ranging from beginners to seasoned professionals, and is particularly beneficial for anyone looking to establish or advance a career in IT support.

What does an IT User Support Specialist do?

An IT Support Specialist is responsible for maintaining computer systems, resolving network issues, providing technical support to users, and ensuring the smooth operation of IT infrastructure within an organization.

What qualifications are required to become an IT User Support Specialist?

Typically, an IT Support Specialist should have a strong foundation in computer science or a related field, along with certifications or training in specific IT support areas, such as those offered in our training series.

Are there specific IT Support job requirements?

Yes, IT Support roles often require a mix of technical knowledge, problem-solving skills, and the ability to communicate effectively with users. Our training series covers these areas comprehensively.

What opportunities are available for Computer User Support Specialists?

Computer User Support Specialists can find opportunities in various sectors, including corporate IT departments, tech firms, and as part of IT support teams in non-tech companies.

How does this training series prepare for a career in IT Support?

Our series provides hands-on experience, theoretical knowledge, and prepares participants for industry-recognized certifications, equipping them with the skills and qualifications needed for a successful IT support career.

Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
1-5 of 14 reviews
  1. A
  2. MF
  3. AT

    I’ve enjoyed the training so far. Wish it was more focused on Linux like other training, but still good.

  4. F

    The educators at ituonline.com are highly skilled but could improve their methods of instruction. In the CCNA 200-301 course, there’s a heavy emphasis on oral lectures, and it would be beneficial to include more in-depth visual aids. Annotating labs and graphics could also make the educational journey more effective. On the other hand, the N10-008 course instructor consistently offers top-notch material.

  5. JT

    This course is super detailed but not boring, and they give you cool projects to actually practice what you’re learning.

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass