PART 1: Exam 220-1001
Domain 1.0: Mobile Devices
Module 1.1: Given a scenario, install and configure laptop hardware and components.
Module 1.2: Given a scenario, install components within the display of a laptop.
Module 1.3: Given a scenario, use appropriate laptop features.
Module 1.4: Compare and contrast characteristics of varioustypes of other mobile devices.
Module 1.5: Given a scenario, connect and configure accessories and ports of other mobile devices.
Module 1.6: Given a scenario, configure basic mobile device network connectivity and application support.
Module 1.7: Given a scenario, use methods to perform mobile device synchronization.
Domain 2.0: Networking
Module 2.1: Compare and contrast TCP and UDP ports, protocols, and their purposes.
Module 2.2: Compare and contrast common networking hardware devices.
Module 2.3: Given a scenario, install and configure a basic wired/wireless SOHO network.
Module 2.4: Compare and contrast wireless networking protocols.
Module 2.5: Summarize the properties and purposes of services provided by networked hosts.
Module 2.6: Explain common network configuration concepts.
Module 2.7: Compare and contrast Internet connection types, network types, and their features.
Module 2.8: Given a scenario, use appropriate networking tools.
Domain 3.0: Hardware
Module 3.1: Explain basic cable types, features, and their purposes.
Module 3.2: Identify common connector types.
Module 3.3: Given a scenario, install RAM types.
Module 3.4: Given a scenario, select, install and configure storage devices.
Module 3.5: Given a scenario, install and configure motherboards, CPUs, and add-on cards.
Module 3.6: Explain the purposes and uses of various peripheral types.
Module 3.7: Summarize power supply types and features.
Module 3.8: Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs.
Module 3.9: Given a scenario, install and configure common devices.
Domain 4.0: Virtualization and Cloud Computing
Module 4.1: Compare and contrast cloud computing concepts.
Module 4.2: Given a scenario, set up and configure client-side virtualization.
Domain 5.0: Hardware and Netowrk Troubleshooting
Module 5.1: Given a scenario, use the best practice methodology to resolve problems.
Module 5.2: Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.
Module 5.3: Given a scenario, troubleshoot hard drives and RAID arrays.
Module 5.4: Given a scenario, troubleshoot video, projector, and display issues.
Module 5.5: Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.
Module 5.6: Given a scenario, troubleshoot printers.
Module 5.7: Given a scenario, troubleshoot common wired and wireless network problems.
PART 2: Exam 220-1002
Domain 1.0: Operating Systems
Module 1.1: Compare and contrast common operating system types and their purposes.
Module 1.2: Compare and contrast features of Microsoft Windows versions.
Module 1.3: Summarize general OS installation considerations and upgrade methods.
Module 1.4: Given a scenario, use appropriate Microsoft command line tools.
Module 1.5: Given a scenario, use Microsoft operating system features and tools.
Module 1.6: Given a scenario, use Microsoft Windows Control Panel utilities.
Module 1.7: Summarize application installation and configuration concepts.
Module 1.8: Given a scenario, configure Microsoft Windows networking on a client/desktop.
Module 1.9: Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
Domain 2.0: Security
Module 2.1: Summarize the importance of physical security measures.
Module 2.2: Explain logical security concepts.
Module 2.3: Compare and contrast wireless security protocols and authentication methods.
Module 2.4: Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
Module 2.5: Compare and contrast social engineering, threats, and vulnerabilities.
Module 2.6: Compare and contrast the differences of basic Microsoft Windows OS security settings.
Module 2.7: Given a scenario, implement security best practices to secure a workstation.
Module 2.8: Given a scenario, implement methods for securing mobile devices.
Module 2.9: Given a scenario, implement appropriate data destruction and disposal methods.
Module 2.10: Given a scenario, configure security on SOHO wireless and wired networks.
Domain 3.0: Software Troubleshooting
Module 3.1: Given a scenario, troubleshoot Microsoft Windows OS problems.
Module 3.2: Given a scenario, troubleshoot and resolve PC security issues.
Module 3.3: Given a scenario, use best practice procedures for malware removal.
Module 3.4: Given a scenario, troubleshoot mobile OS and application issues.
Module 3.5: Given a scenario, troubleshoot mobile OS and application security issues.
Domain 4.0: Operational Procedures
Module 4.1: Compare and contrast best practices associated with types of documentation.
Module 4.2: Given a scenario, implement basic change management best practices.
Module 4.3: Given a scenario, implement basic disaster prevention and recovery methods.
Module 4.4: Explain common safety procedures.
Module 4.5: Explain environmental impacts and appropriate controls.
Module 4.6: Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts.
Module 4.7: Given a scenario, use proper communication techniques and professionalism.
Module 4.8: Identify the basics of scripting.
Module 4.9: Given a scenario, use remote access technologies.
Glossary