Computer Systems
Motherboards59Processors54Memory53Storage Devices54Input and Output Devices50Operating Systems58Application Software58Programming Languages52Databases58Networking51Threats and Vulnerabilities51Security Measures50Ethical and Legal Issues50Incident Response56Security Standards and Compliance52Preventive Maintenance56Troubleshooting Techniques52Repair and Replacement51System Optimization50Data Recovery59
Networking
Introduction to Networking54Network Devices53Network Media50Network Protocols59Network Security56Network Management51Network Configuration55Network Troubleshooting54Network Security Management58Network Performance Optimization51Network Design Principles53Network Topologies53Network Implementation50Network Testing and Verification50Network Maintenance50Virtualization and Cloud Computing57Software-Defined Networking (SDN)51Network Automation54Network Security Best Practices57Emerging Networking Technologies56
Operating Systems
Definition and Purpose of Operating Systems53Types of Operating Systems51History and Evolution of Operating Systems53Process Concepts and Scheduling56Process Synchronization and Deadlocks56Memory Management51File System Structures and Access Methods50File Allocation and Management59Input Output Management50Security Threats and Vulnerabilities53Security Mechanisms and Countermeasures54Backup and Recovery52Network Concepts and Protocols59Distributed Operating Systems50Cloud Computing54
Database Management
Definition and Purpose of Database Management54Database Management Systems (DBMS)54Data Modeling Concepts53Database Design Process56Normalization Techniques54Database Implementation50SQL Fundamentals51Data Manipulation Language (DML)56Data Query Language (DQL)50Database Administration Tasks57Database Security Concepts54Data Backup and Recovery56Database Transactions57Concurrency Control53Database Performance Tuning51
Web Development
What is Web Development?53Web Development Tools and Technologies53Web Development Process53HTML Structure and Syntax57CSS Selectors and Styling50Responsive Web Design52JavaScript Basics53JavaScript Events and DOM Manipulation55JavaScript Libraries and Frameworks54Web Server Fundamentals58Database Connectivity and Management52Web Security50Planning and Design53Implementation and Testing57Deployment and Maintenance55
Programming
What is Programming?56Types of Programming Languages54Programming Paradigms58Primitive Data Types40Variables and Identifiers50Input and Output56Conditional Statements50Looping Statements53Jump Statements57Functions54Arrays58Strings55Classes and Objects56Inheritance and Polymorphism51Exception Handling50Linked Lists50Stacks and Queues57Searching and Sorting Algorithms53Database Concepts50SQL58Database Design58HTML and CSS53JavaScript29Web Frameworks54
Information Security
Definition and Scope of Information Security54Threats and Vulnerabilities51Security Controls and Countermeasures56Risk Identification and Analysis57Risk Mitigation and Treatment54Business Continuity and Disaster Recovery49Firewalls and Intrusion Detection Systems50Encryption and Cryptography57Security Information and Event Management (SIEM)55Information Security Policies53Security Procedures and Guidelines54Security Awareness and Training57Ethical Implications of Information Security50Legal and Regulatory Compliance55Cybersecurity Laws and Enforcement51
Cloud Computing
Definition and Concepts55Benefits and Challenges39Cloud Computing Providers54Virtualization and Containers54Storage and Networking55Security and Compliance52Cloud-Native Applications57Cloud Development Tools53Cloud Databases53Cloud Cost Management58Cloud Performance Monitoring52Cloud Governance and Compliance56
Project Management
Introduction to Project Management57Project Life Cycle55Project Stakeholders56Project Scope Management53Project Time Management51Project Cost Estimating55Project Cost Budgeting53Project Cost Control55Project Quality Planning54Project Quality Control59Project Quality Assurance52Project Risk Identification54Project Risk Response Planning52Project Risk Monitoring and Control53Project Communication Planning55Project Communication Execution57Project Communication Monitoring and Control50Project Procurement Planning50Project Procurement Execution51Project Procurement Monitoring and Control50Project Integration Planning57Project Integration Execution56Project Integration Monitoring and Control42
Technical Support
Computer Hardware Components54Computer Software51Operating Systems36Network Types and Topologies59Network Security51Firewalls and Intrusion Detection Systems58Troubleshooting Techniques56Problem-Solving Strategies53Documentation and Reporting51Communication Skills57Customer Service Principles52Ethics and Professionalism59