Description
This training in which practical work plays a central role, will present you with the different tools, techniques and methods for configuring your systems for preventing and managing incidents involving data loss. The training covers all versions of Windows.
Who is this training for ?
For whom ?
PC support specialists, technicians involved in the installation, operation, maintenance and support of PCs.
Prerequisites
Solid notions of the architecture of a microcomputer.
Training objectives
Training program
- Analysis of risks incurred and existing solutions
- Costs linked to loss and security of data.
- What tools to secure data?
- Data storage
- Drives, controllers: IDE, PATA, SATA, E-IDE, SCSI and Ultra-SCSI, Ultra2Wide-SCSI.
- Hard drives: logical, physical structure, formatting.
- BIOS boot sequence (MBR, UEFI).
- Startup: requested files.
- Step mode options.
- Practical work Low-level formatting.
- Partitioning a HD.
- Modifying partitions.
- Optimizing the size and occupancy of Clusters and partition size.
- Conversion from FAT to NTFS.
- Hard drive recovery
- RAID systems, troubleshooting.
- Recovery after accidental formatting.
- Practical work Complete implementation of a backup strategy (design and achieved with market standards).
- Recovery of files under FATxx, NTFS.
- Recovery after accidental formatting.
- Hardware settings
- Inputs/outputs, IRQ, DMA.
- RAM addresses, ROM.
- Slot number.
- Plug and play.
- Parameter visualization tools.
- Driver management.
- Search for the latest drivers, WDM, WHQL.
- Return to the previous version.
- Practical workrnInstallation of software to view the hardware without dismantling it.
- Optimization of the configuration.
- Analysis of the 'architecture, bottlenecks.'}
- Boot media, troubleshooting tools
- How to create a bootable CD or disk/USB key? (With its diagnostic tools).
- Microsoft tools, WAIK.
- Practical work rnCreating a USB key.
- System repair
- Image creation and customization with Ghost, DriveImage.
- The SID.
- Registry database backup.
- Optimize with the correct keys of the registry.
- Practical work Creation of restore point and use.
- Preparation of reference station.
- Restoration of the image on his computer.
- Backup, editing of registry bases.
- Security
- The inverter.
- Types of viruses.
- Propagation vectors.
- Installation and update of antivirus.
- Securing the BIOS.
- Protecting the boot sector.
- Presentation of the Firewall.
- The right tools.
- Practical work Implementation of an antivirus policy.