Domain 1: Operating Systems
Key Concepts
• Operating System Types:
o Windows: Known for its GUI, extensive software compatibility, and regular
updates. Key features include the Start Menu, Taskbar, and Windows Defender.
o macOS: Offers seamless integration with Apple devices, known for stability and
security. Key features include the Dock, Spotlight Search, and Time Machine for
backups.
o Linux: Open-source, highly customizable, and secure. Popular distributions
include Ubuntu, Fedora, and CentOS. Known for its command-line interface and
package management systems.
• Windows Features:
o File Systems:
▪ NTFS: Supports large volumes, file permissions, encryption, and
compression. Ideal for modern Windows installations.
▪ FAT32: Limited to 4GB file size, lacks advanced features, used in older
systems and removable drives.
o Command Line Tools:
▪ cmd: Traditional command-line interface for executing basic commands.
▪ PowerShell: Advanced scripting environment for task automation and
configuration management.
▪ Common Commands: ipconfig, ping, netstat, chkdsk, sfc.
o System Utilities:
▪ Disk Management: Tool for managing disk partitions and volumes.
▪ Task Manager: Provides real-time monitoring of system performance and
running processes.
▪ Resource Monitor: Offers detailed insights into system resource usage.
• macOS and Linux Features:
, o Terminal Commands: ls, cp, mv, rm, chmod, chown. Used for file management
and system administration.
o System Preferences: macOS tool for configuring system settings, similar to
Windows Control Panel.
o File Permissions: Read, write, execute permissions for users, groups, and others.
Managed using chmod and chown in Linux.
Practice Questions
1. What are the main differences between NTFS and FAT32 file systems?
2. Describe the purpose of PowerShell in Windows.
3. How do file permissions work in Linux?
Domain 2: Security
Key Concepts
• Security Fundamentals:
o Threats and Vulnerabilities:
▪ Malware: Includes viruses, worms, trojans, ransomware, and spyware.
▪ Phishing: Fraudulent attempts to obtain sensitive information via email or
websites.
▪ Social Engineering: Manipulating individuals to divulge confidential
information.
▪ Physical Security Risks: Unsecured access to hardware and sensitive
areas.
o Authentication Methods:
▪ Passwords: Basic form of authentication; should be complex and
regularly updated.
▪ Multi-factor Authentication (MFA): Combines two or more independent
credentials for security.
▪ Biometrics: Uses physical characteristics like fingerprints or facial
recognition.
o Access Control Models: