ITF: Information Technology Fundamentals
Master IT concepts, careers, hardware, networking, security, and programming
💼 Unit 1: Career Exploration & Employability Skills
Discover IT careers, build professional skills, and plan your future in technology.
🎯 IT Career Pathways
Popular IT Careers in Alabama:
💻 IT Support Specialist
What they do: Help users with technical problems, install software, troubleshoot hardware
Education: Associate's or certifications
Salary: $40,000-$55,000/year
Certifications: CompTIA A+, Network+
👨💻 Software Developer
What they do: Design, code, and test applications and systems
Education: Bachelor's in CS or bootcamp
Salary: $70,000-$110,000/year
Skills: Python, Java, JavaScript, Git
🔌 Network Technician
What they do: Install, maintain, and troubleshoot network infrastructure
Education: Associate's or certifications
Salary: $45,000-$65,000/year
Certifications: CompTIA Network+, CCNA
🔐 Cybersecurity Analyst
What they do: Protect systems from threats, monitor security, respond to incidents
Education: Bachelor's in Cybersecurity
Salary: $75,000-$120,000/year
Certifications: Security+, CEH, CISSP
☁️ Cloud Engineer
What they do: Design and manage cloud infrastructure (AWS, Azure, Google Cloud)
Education: Bachelor's in IT/CS
Salary: $85,000-$140,000/year
Certifications: AWS Solutions Architect, Azure Administrator
📊 Data Analyst
What they do: Analyze data, create reports, find insights for business decisions
Education: Bachelor's in Data Science/Analytics
Salary: $60,000-$90,000/year
Skills: SQL, Python, Excel, Tableau
Job Market Trends:
- 🔥 High Demand: IT jobs growing 13% faster than average (2020-2030)
- 💰 Great Pay: Median IT salary $97,430 vs. $45,760 for all occupations
- 📈 Hot Areas: Cybersecurity, Cloud Computing, AI/ML, Data Science
- 🏠 Remote Work: Many IT jobs can be done remotely
- 🌐 Alabama Growth: Huntsville and Birmingham tech hubs expanding rapidly
📜 Industry Certifications
CompTIA Certification Path:
Hardware, software, troubleshooting basics
📅 2 exams | 💰 $246 each | ⏱️ 90 minutes each
Networking concepts, protocols, troubleshooting
📅 1 exam | 💰 $358 | ⏱️ 90 minutes
Cybersecurity fundamentals, risk management
📅 1 exam | 💰 $404 | ⏱️ 90 minutes
Advanced cybersecurity analysis and testing
Professional-level security certifications
🎯 Professional Skills & Resume Building
Essential Soft Skills for IT:
Explain technical concepts to non-technical people clearly
Collaborate on projects, pair programming, group troubleshooting
Break down complex issues, think critically, debug systematically
Take initiative, mentor others, lead projects
Prioritize tasks, meet deadlines, handle multiple projects
Stay calm under pressure, handle criticism, maintain work-life balance
Resume Tips for IT Students:
- Skills Section: List programming languages, OS familiarity, tools you know
- Projects: Include class projects, personal projects, GitHub repos
- Certifications: List any completed or in-progress certifications
- CTSO Involvement: List leadership roles in FBLA, SkillsUSA, TSA
- Action Verbs: Use "developed," "designed," "implemented," "troubleshot"
- Quantify: "Built website with 500+ daily visitors" vs "Built a website"
Interview Preparation:
- Research the company and role beforehand
- Prepare STAR stories (Situation, Task, Action, Result)
- Practice technical questions (e.g., "Explain what an IP address is")
- Ask thoughtful questions about the role and company
- Follow up with a thank-you email within 24 hours
🖥️ Unit 2: Computer Basics & Hardware/Software Fundamentals
Understand how computers work from the inside out - components, software, and file systems.
⚙️ Internal Components
Essential Computer Components:
Function: "Brain" of computer - executes instructions
Key Specs: Clock speed (GHz), cores (2, 4, 8+), cache
Example: Intel Core i7, AMD Ryzen 5
Function: Temporary storage while computer is on
Key Specs: Capacity (8GB, 16GB, 32GB), Speed (DDR4, DDR5)
Rule: More RAM = more programs open at once
HDD: Mechanical, slower, cheaper, larger capacity
SSD: Electronic, faster, more expensive, reliable
Sizes: 256GB, 512GB, 1TB, 2TB+
Function: Main circuit board connecting all components
Contains: CPU socket, RAM slots, PCIe slots, chipset
Important: Must match CPU socket type!
Function: Renders graphics, video, 3D
Types: Integrated (built-in) or Dedicated (separate card)
Use Cases: Gaming, video editing, 3D modeling
Function: Converts AC power to DC for components
Key Spec: Wattage (e.g., 500W, 750W)
Tip: Calculate total power needed + 20% headroom
How They Work Together:
1. PSU provides power to all components 2. CPU reads instructions from RAM 3. CPU processes instructions 4. Results stored in RAM or written to Storage 5. GPU renders output to Monitor 6. Motherboard coordinates all communication
🔌 Peripherals & Connectivity
Input Devices:
- Keyboard: Types - Mechanical, Membrane, Wireless
- Mouse: Types - Wired, Wireless, Trackpad, Trackball
- Scanner: Converts physical documents to digital
- Webcam: Video input for meetings, recording
- Microphone: Audio input
Output Devices:
- Monitor: Specs - Resolution (1080p, 1440p, 4K), Refresh Rate (60Hz, 144Hz)
- Speakers/Headphones: Audio output
- Printer: Types - Inkjet (color), Laser (fast, B&W), 3D
Common Ports & Connections:
USB-A (rectangular), USB-C (oval, reversible)
Speeds: USB 2.0 (480 Mbps), USB 3.0 (5 Gbps), USB 3.1 (10 Gbps)
Video/audio output to monitors and TVs
HDMI more common, DisplayPort better for gaming
Wired network connection
More stable and faster than WiFi
Headphones, speakers, microphone
Color coded: Green (out), Pink (mic), Blue (line in)
Troubleshooting Common Hardware Issues:
- Device not recognized: Check connections, try different port, update drivers
- Monitor no signal: Check cable connection, verify input source, test cable
- Computer won't turn on: Check power cable, test outlet, inspect PSU
- Keyboard/mouse not working: Check batteries (wireless), try different port, check drivers
💿 Software Types & Licenses
Operating Systems (OS):
Most popular for desktops, gaming, business
Pros: Wide software support, familiar interface
Cons: Costs money, more vulnerable to malware
Apple's OS for Mac computers
Pros: User-friendly, secure, great for creative work
Cons: Expensive hardware, limited gaming
Free, open-source OS (Ubuntu, Fedora, Mint)
Pros: Free, customizable, secure, learning tool
Cons: Steeper learning curve, less gaming support
Application Software:
- Productivity: Microsoft Office, Google Workspace, LibreOffice
- Creative: Adobe Photoshop, GIMP, Blender
- Communication: Zoom, Discord, Slack, Teams
- Development: VS Code, IntelliJ, Eclipse
- Browsers: Chrome, Firefox, Edge, Safari
Software Licenses:
- Free to use, modify, and distribute
- Source code is public
- Examples: Linux, LibreOffice, GIMP, Firefox
- Licenses: GPL, MIT, Apache
- Must purchase or subscribe
- Source code is private
- Examples: Windows, macOS, Adobe CC
- Can't modify or redistribute
- Free to use but source code hidden
- Examples: Google Chrome, Spotify (free tier)
- May have ads or limited features
🔢 Numbering Systems
Number Systems in Computing:
Uses only 0 and 1
How computers actually work internally
Example: 1010 = 10 in decimal
Uses 0-9 (what we use daily)
Natural for humans
Example: 42 = forty-two
Uses 0-9 and A-F
Shorthand for binary
Example: FF = 255 in decimal
Conversion Examples:
Binary to Decimal:
1010 = (1×8) + (0×4) + (1×2) + (0×1) = 10
Decimal to Binary:
13 = 8 + 4 + 1 = 1101
Hexadecimal to Decimal:
2F = (2×16) + (15×1) = 47
Decimal to Hexadecimal:
255 = (15×16) + (15×1) = FF
ASCII & Unicode:
- ASCII: American Standard Code for Information Interchange
- Assigns numbers to characters: A=65, B=66, a=97, 0=48
- 128 characters total (English only)
- Unicode: Extended character set for all languages
- Includes emojis, symbols, 150,000+ characters
- UTF-8 is most common Unicode encoding
☁️ Cloud vs Traditional Computing
Traditional Computing:
- Software installed locally on your computer
- Files stored on your hard drive
- Processing done by your CPU/RAM
- Examples: Microsoft Word installed, local photo storage
Cloud Computing:
- Software runs on remote servers (via internet)
- Files stored on remote servers
- Processing done by cloud provider's computers
- Examples: Google Docs, Dropbox, Netflix, Gmail
Pros & Cons:
- Access from anywhere
- Automatic backups
- Easy collaboration
- Scales easily
- Requires internet
- Privacy concerns
- Ongoing subscription costs
- Vendor lock-in
Virtual Machines (VMs):
- Software that simulates a complete computer
- Run multiple OS on one physical machine
- Used for testing, isolation, cloud servers
- Tools: VirtualBox, VMware, Hyper-V
CLI vs GUI:
Windows, icons, buttons, mouse-driven
Pros: Easy to learn, visual
Cons: Slower for repetitive tasks
Text commands, keyboard-driven
Pros: Fast, powerful, automatable
Cons: Steeper learning curve
🌐 Unit 3: Networking & Digital Communications
Learn how devices connect, communicate, and share data across networks and the internet.
🔌 Network Components & Types
Essential Network Components:
Connects different networks together (your home to internet)
Assigns IP addresses, manages traffic
Example: Your WiFi router at home
Connects devices within same network
Directs data to correct device using MAC addresses
More efficient than a hub
Ethernet (Cat5e, Cat6): Wired networking, up to 10 Gbps
Fiber Optic: Uses light, very fast, long distance
Coaxial: Cable internet, TV
Provides WiFi connectivity
Often built into routers
Standards: WiFi 5 (ac), WiFi 6 (ax), WiFi 7 (be)
Network Types:
Small area - home, office, school
Fast speeds, private
Large area - cities, countries
Internet is largest WAN
LAN using WiFi instead of cables
Example: Your home WiFi network
Internet Service Types:
- DSL: Through phone lines, 1-100 Mbps, widely available
- Cable: Through TV cables, 100-1000 Mbps, shared with neighbors
- Fiber: Through fiber optic cables, 500-10,000 Mbps, fastest but limited availability
- Satellite: From space, 12-100 Mbps, high latency, rural areas
- 5G Home Internet: Cellular, 50-300 Mbps, new option
🔢 IP/MAC Addresses, DNS, DHCP
IP Addresses:
- IPv4: 192.168.1.1 (4 numbers, 0-255)
- IPv6: 2001:0db8:85a3:0000:0000:8a2e:0370:7334 (longer, more addresses)
- Public IP: Your address on the internet (assigned by ISP)
- Private IP: Your address on local network (e.g., 192.168.x.x)
MAC Address:
- Physical hardware address (e.g., 00:1B:44:11:3A:B7)
- Unique to each network adapter
- Can't change (well, can be spoofed but that's advanced)
DNS (Domain Name System):
- Translates domain names to IP addresses
- Example: google.com → 142.250.185.46
- Like a phonebook for the internet
- DNS servers: Google (8.8.8.8), Cloudflare (1.1.1.1)
DHCP (Dynamic Host Configuration Protocol):
- Automatically assigns IP addresses to devices
- Router typically runs DHCP server
- When you connect to WiFi, DHCP gives you an IP
How connecting to WiFi works:
1. Device: "Can I join this network?"
2. Router (DHCP): "Sure! Your IP is 192.168.1.105"
3. Device: "What's the gateway?"
4. Router: "I'm the gateway at 192.168.1.1"
5. Device: "What's the DNS server?"
6. Router: "Use 8.8.8.8 for DNS"
7. Device: "Thanks!" [connected]
📋 Network Protocols
Essential Protocols:
Foundation of internet communication
TCP: Ensures data arrives complete and in order
IP: Routes data between networks
Used for loading websites
HTTP: Unencrypted (not secure)
HTTPS: Encrypted with SSL/TLS (secure!) 🔒
Uploading/downloading files to/from servers
SFTP: Secure version with encryption
Used for website hosting, file sharing
SMTP: Sending email
POP3: Downloading email (removes from server)
IMAP: Syncing email across devices
Troubleshooting Connectivity:
Cable plugged in? WiFi turned on?
Turn off/on modem, router, computer
Run ipconfig (Windows) or ifconfig (Linux)
ping 8.8.8.8 (tests internet)
ping google.com (tests DNS)
Try changing to 8.8.8.8 or 1.1.1.1
🛡️ Online Safety & Digital Citizenship
Digital Footprint:
- Everything you do online leaves a trace
- Posts, comments, likes, searches - all tracked
- Future employers, colleges check social media!
- Think before you post - it's permanent
Protecting PII (Personally Identifiable Information):
- Never share: SSN, full birthdate, home address, passwords
- Be careful sharing: Phone number, school name, full name
- Privacy settings: Make social media accounts private
- Location data: Turn off geo-tagging on photos
Cyberbullying:
- Using tech to harass, threaten, embarrass others
- Don't engage - block, report, tell adult
- Save evidence (screenshots)
- It's NEVER okay - not funny, not harmless
Mobile Device Security:
- Screen lock: Use PIN, pattern, or biometric
- App permissions: Only give what's needed
- Public WiFi: Don't access banking/sensitive info
- Updates: Keep OS and apps updated
- Lost phone: Enable "Find My Device"
Netiquette (Internet Etiquette):
- Be respectful - remember real people behind screens
- Don't type in ALL CAPS (it's shouting!)
- Think before hitting send
- Give credit for others' work
- Respect privacy - don't share others' info
🔐 Unit 4: Security & Ethics
Protect systems, data, and privacy while understanding ethical responsibilities in IT.
🛡️ CIA Triad & Cybersecurity Basics
The CIA Triad:
Only authorized people access data
Methods: Encryption, passwords, access controls
Example: Medical records should be private
Data is accurate and hasn't been tampered with
Methods: Checksums, digital signatures, backups
Example: Bank balance should be exact
Authorized users can access data when needed
Methods: Redundancy, backups, disaster recovery
Example: Website should be up 24/7
Common Malware Types:
Attaches to files, spreads when file is opened
Can delete files, corrupt data
Self-replicates across networks without human action
Spreads rapidly, consumes bandwidth
Disguised as legitimate software
Creates backdoor for attackers
Encrypts files, demands payment to unlock
Major threat to businesses, hospitals
Secretly monitors activity, steals data
Captures passwords, browsing, keystrokes
Displays unwanted ads
Annoying but less dangerous
Cryptography & Encryption:
- Encryption: Converting data to unreadable format
- Decryption: Converting back to readable format
- Symmetric: Same key encrypts and decrypts (faster)
- Asymmetric: Public key encrypts, private key decrypts (more secure)
- Uses: HTTPS, email, messaging, file storage
🔑 Access Controls & Best Practices
Authentication vs Authorization:
- Authentication: Proving who you are (login)
- Authorization: What you're allowed to do (permissions)
- Example: Badge gets you in building (auth), key card gets you in server room (authz)
Authentication Methods:
Passwords, PINs, security questions
Phone, security token, smart card
Fingerprint, face ID, retina scan
Combines 2+ methods for extra security
Password Best Practices:
- Length: Minimum 12 characters, longer is better
- Complexity: Mix uppercase, lowercase, numbers, symbols
- Unique: Different password for each account
- Avoid: Dictionary words, personal info, patterns
- Passphrases: "CorrectHorseBatteryStaple" > "P@ssw0rd!"
- Password Manager: Use Bitwarden, 1Password, LastPass
- Change when: Known breach, shared accidentally, old (1-2 years)
Additional Security Practices:
- Firewalls: Block unauthorized network access
- Antivirus: Scan for and remove malware
- Updates: Install OS and software updates promptly
- Backups: 3-2-1 rule (3 copies, 2 different media, 1 offsite)
- VPN: Encrypt connection on public WiFi
- Physical Security: Lock screen, secure devices, shred documents
⚖️ Ethics, Privacy Laws & Compliance
Important Privacy Laws:
Health Insurance Portability and Accountability Act
Protects medical records and health information
Violations = huge fines, possible jail time
Family Educational Rights and Privacy Act
Protects student education records
Schools must get permission to share grades, records
General Data Protection Regulation (Europe)
Strict data protection and privacy law
Applies to any company serving EU citizens
California Consumer Privacy Act
Gives California residents control over personal data
Similar to GDPR but for California
Intellectual Property:
- Copyright: Protects creative works (books, music, art, code)
- Trademark: Protects brand names, logos
- Patent: Protects inventions
- Fair Use: Limited use for education, criticism, parody
- Plagiarism: Using others' work without credit - DON'T DO IT!
Responsible AI Use:
- Bias: AI can inherit biases from training data
- Transparency: Be clear when AI is used
- Accountability: Humans responsible for AI decisions
- Privacy: Don't feed sensitive data to AI
- Academic: Disclose AI assistance, don't claim AI work as your own
Compliance Standards:
- NIST: National Institute of Standards and Technology - cybersecurity framework
- ISO 27001: International standard for information security
- PCI DSS: Payment Card Industry Data Security Standard
- SOC 2: Security, availability, processing integrity controls
🖥️ Unit 5: Operating Systems & System Maintenance
Master OS installation, configuration, maintenance, and troubleshooting.
Modules: OS Comparison, Installation & Configuration, Maintenance Tools, Troubleshooting, Database Basics
💻 Unit 6: Introduction to Programming & Data
Learn programming fundamentals, data structures, and database management.
Modules: Algorithms & Logic, Data Types, Control Structures, Functions, Simple Scripting, Database Fundamentals
🚀 Unit 7: Project-Based & Integrative Skills
Apply everything you've learned to real-world IT projects and scenarios.
🏠 Design a Secure Home Network
Plan and diagram a home network with router, switch, wireless access points, and security measures. Document IP addressing scheme and implement guest network isolation.
💼 Create Your IT Career Portfolio
Build a professional portfolio website showcasing your skills, projects, certifications, and resume. Include case studies of problems you've solved.
🛠️ Build & Configure a Computer
Assemble a PC from components, install Linux, configure network settings, implement security hardening, and document the process.
🔐 Security Audit & Recommendations
Analyze security posture of a home or small business network. Identify vulnerabilities and create detailed recommendations with implementation plan.
📚 Additional Resources
🎓 Certifications
💻 Practice Labs
- VirtualBox - Free VM software
- GNS3 - Network simulation
- TryHackMe - Cybersecurity labs
📖 Learning Platforms
- Professor Messer - Free CompTIA videos
- Cybrary - Free IT courses
- Codecademy - Programming practice