IT SUPPORT

Complete IT Support & Networking r

IT support & Networking

The Complete Beginner Guide from VEP Tech Academy

1

Introduction to IT Support

This chapter lays the foundation. It describes what IT support does, common roles, typical day-to-day tasks, the lifecycle of a ticket, and the mindset that makes a good support engineer.

What is IT Support — in simple terms

IT Support helps people use technology to do their jobs. When something stops working, the support team helps bring it back to a working state. That can mean fixing hardware, troubleshooting software, restoring access, or advising users about best practices.

Core responsibilities

Common responsibilities include:

  • Responding to user requests and incidents via phone, chat, or email.
  • Diagnosing and resolving technical issues (hardware, OS, applications, network).
  • Following standard operating procedures and updating documentation.
  • Escalating complex problems to higher-tier teams and tracking progress.
  • Maintaining inventory, creating user accounts, and performing routine maintenance tasks.

Support levels explained (L1, L2, L3)

Support is often structured into levels:

  • L1 — Frontline: Handles common, repeatable tasks such as password resets, simple troubleshooting, and initial ticket intake.
  • L2 — Intermediate: Performs deeper troubleshooting, configuration, and changes requiring some technical skill.
  • L3 — Expert: Engages in root cause analysis, advanced server/network tasks, architecture changes, and develops permanent fixes.

Mindset and soft skills

Technical knowledge is important, but soft skills win the day. A good support engineer:

  • Listens carefully — asking the right questions shortens resolution time.
  • Communicates simply — translate technical details into plain language for users.
  • Documents everything — ticket notes, steps tried, results and next steps.
  • Remains calm — especially when a user is frustrated or when systems are down.

Typical workflows

A common workflow for an incident:

  1. Receive ticket and acknowledge receipt.
  2. Collect details — username, system, symptoms, recent changes, screenshots.
  3. Attempt standard troubleshooting steps (known fixes, checklists).
  4. If unresolved, escalate with logs and clear notes.
  5. Verify resolution with the user and close the ticket with a summary.
Hands-on starter lab — simulate support intake
  1. Create a mock ticket in a simple spreadsheet: user, contact, system, issue, priority, steps taken.
  2. Collect diagnostic data: system info, screenshots, event log excerpts.
  3. Use a checklist to attempt common fixes, such as restarting the application, checking connectivity, or resetting user profile preferences.
  4. Record final resolution steps and time-to-resolution in the ticket.

Real-world example

Case: Email delivery failure

Symptoms: A user cannot send email. Errors indicate SMTP issues.

Steps taken: Verify network, confirm mail server accessibility (telnet or Test Email), check DNS MX records for the domain, review outbound mail queue, verify user mailbox quota and privileges.

Resolution: Found incorrect SMTP settings in user client — corrected server and authentication type; test sent and mailbox working.

Checklist — things to do before escalating

  • Confirm the exact error message and reproduce if possible.
  • Collect screenshots and event IDs.
  • Check recent changes (patches/installs) around the time issue began.
  • Make a basic backup or create a restore point before making risky changes.

Further reading & certifications

Good entry-level certs: CompTIA A+, CompTIA Network+, Microsoft Fundamentals. Learn by doing in labs and virtual machines.

2

Basic Computer Hardware

Understand internal PC components, how to safely inspect and replace parts, common hardware failure modes, and how hardware affects performance.

Key components and their roles

  • CPU (Central Processing Unit): Executes program instructions. Higher core count and clock speed generally mean better multitasking and performance for compute-heavy tasks.
  • RAM (Memory): Short-term workspace for running applications. Not persistent — losing power clears RAM.
  • Storage (HDD/SSD): Long-term storage for OS and files. SSDs are much faster than HDDs for boot and application load times.
  • Motherboard: Connects all components and provides sockets, connectors and firmware (BIOS/UEFI).
  • PSU (Power Supply): Supplies stable power to components; insufficient PSU can cause instability or reboots.
  • GPU (Graphics): Manages rendering of graphics; essential for video, 3D or GPU-accelerated workloads.

How components affect performance

Performance depends on balanced components. A very fast CPU with low RAM or a slow HDD can bottleneck the system. For general office tasks, prioritize an SSD and sufficient RAM (8–16GB).

Common hardware problems & diagnosis

  • No power: Check power cable, power button, PSU switch, and test with a different outlet.
  • No display: Reseat RAM, check monitor input, test with another monitor or cable.
  • Random reboots: Overheating, faulty PSU, bad RAM — check temperatures and event logs.
  • Slow disk performance: Use performance monitors to check disk queue lengths; consider cloning to SSD.

Safety & ESD precautions

Always power down and unplug. Use an anti-static wrist strap or touch a grounded metal surface frequently to avoid electrostatic discharge. Keep screws and parts labeled when disassembling.

Hands-on lab — safe hardware inspection

  1. Power down, unplug and open the case in a clean work area.
  2. Visually inspect capacitors and connectors for damage and corrosion.
  3. Reseat RAM and GPU modules carefully and retest boot.
  4. Use compressed air to clean dust (hold fans to prevent spinning while cleaning).

Upgrading tips

  • Check motherboard compatibility (CPU socket, RAM type, BIOS support).
  • When upgrading storage, clone drive to new SSD or perform a fresh OS install.
  • Power requirements matter — ensure PSU wattage headroom for upgrades.

Case study

Case: Slow boot and choppy performance

Investigation: Disk usage peaked during boot; repeated high disk queue and long I/O latency seen in Resource Monitor.

Fix: Migrated user from an HDD to an SSD and reconfigured pagefile; boot time improved from minutes to seconds, responsiveness returned.

Checklist for hardware changes

  • Backup data and create system image if possible.
  • Document current configuration (BIOS settings, boot order).
  • Have driver installers available for new hardware.
  • Test changes in a controlled environment when possible.

Further study

Practice on spare machines or virtual labs. Learn to read part specifications and consult manufacturer compatibility lists.

3

Operating Systems (Windows & Linux)

Covers what an OS does, how to install and maintain Windows and Linux systems, file systems, users & permissions, and recovery techniques.

What an operating system does

Manages hardware resources, provides an environment for applications, handles file systems, user sessions, drivers and system security.

Windows: practical support tasks

  • Use Device Manager to view and update drivers.
  • Use Event Viewer to inspect application and system logs; note Event IDs for troubleshooting.
  • Windows Update is crucial; handle updates using deferral policies for critical systems.
  • Create restore points before major changes; use System Restore or recovery options when needed.

Linux: fundamentals for support

Linux is used widely in servers. Key skills: understand the file system layout (/etc, /var, /home), basic package managers (apt, yum, dnf), and systemd/service management (systemctl).

File systems and partitioning

Windows commonly uses NTFS; Linux uses ext4, XFS, btrfs. Understand partitioning for boot, root, swap, and data. On Windows, Disk Management and diskpart are helpful tools.

Installation & image-based deployment

For multiple machines, use a standardized image and deployment tools (SCCM/Intune for Windows, cloud-init or custom images for Linux). Keep images up to date with security patches and drivers.

Hands-on: install & repair
  1. Create a bootable USB using official ISOs and Rufus or balenaEtcher.
  2. Install OS in a virtual machine; practice partitioning, boot loader options and driver installs.
  3. After install, check Device Manager or lshw to confirm hardware is recognized.

Troubleshooting common OS issues

  • Slow boot: check startup apps, enable fast startup (if applicable), scan disk for errors and check for driver-related problems.
  • Blue Screen (BSOD): capture stop code and minidump, check for driver updates or faulty hardware.
  • Boot failures: use recovery environment, repair boot records, restore system from image.

Security tasks for OS

  • Harden accounts (least privilege), enable automatic security updates where feasible, and deploy antivirus/EDR tools.
  • Implement disk encryption (BitLocker/LUKS) for laptops containing sensitive data.

Case study

Case: System won’t boot after update

Symptoms: System stuck on boot logo after applying a major OS update.

Steps: Boot to recovery, attempt startup repair, restore to previous restore point, if fails collect boot logs and consider safe reinstallation.

Outcome: Restored from a recent system image and re-applied update with different sequence of driver updates to avoid conflict.

Further reading

Practice Linux commands regularly. Use virtual machines to safely learn OS administration and recovery tools.

4

Networking Basics (IP, Subnetting, Devices)

Networking is the backbone of IT. This chapter explains IP addressing, routing, switching, common protocols, network troubleshooting tools and small office networking design.

IP addressing explained

IPv4 addresses are four octets (e.g., 192.168.1.10). Subnet masks (e.g., 255.255.255.0) define network and host portions. Learn CIDR notation (e.g., /24) for subnets.

Subnetting — a simple approach

Subnetting breaks a network into smaller pieces. Start with common masks (/24) and practice dividing networks into /25, /26 by memorizing powers of two for host counts.

Routing vs switching

  • Switch: Operates at Layer 2, forwards frames using MAC addresses; builds a CAM table.
  • Router: Operates at Layer 3, forwards IP packets between networks; uses routing tables and can implement NAT.

Common protocols

  • DHCP: Automatically assigns IP addresses to clients.
  • DNS: Resolves names to IPs.
  • HTTP/HTTPS: Web traffic, with encryption over TLS for HTTPS.
  • SMTP/IMAP/POP3: Email protocols.

Basic network commands

  • ipconfig /all (Windows) or ip addr (Linux) to view addresses.
  • ping to test reachability and latency.
  • tracert / traceroute to see path to destination.
  • nslookup / dig to query DNS records.
Hands-on: diagnosing network problems
  1. Use ipconfig to locate your gateway and IP address.
  2. Ping your gateway to ensure local connectivity, then ping a public IP (e.g., 8.8.8.8) to test internet connectivity.
  3. Use nslookup to test DNS resolution; switch to a public resolver if needed (1.1.1.1 / 8.8.8.8).

Designing a small office network

Use a single VLAN for simple networks or multiple VLANs for separation (e.g., staff, guests, voice). Use DHCP reservations or static IPs for printers and servers. Keep documentation of IP plan, device names and MAC addresses.

Troubleshooting flow

  1. Identify scope: single device, subnet, or entire site?
  2. Check physical layer: cables, switch LEDs, link lights.
  3. Check addressing and gateway settings.
  4. Check DNS and routes; run packet captures if deeper analysis required.

Case study

Case: Intermittent network outages

Symptoms: Users report brief drops of connectivity across multiple devices.

Investigation: Checked switch logs, noticed flooding and high CPU on a misconfigured port. Identified a faulty NIC causing broadcast storms.

Fix: Isolate and replace faulty device; tighten switch port configurations and enable Spanning Tree and storm-control options.

Further study

Read CCNA study materials for deeper understanding of routing, switching and subnetting. Practice with network simulators (GNS3, Packet Tracer).

5

Remote Support Tools & Best Practices

Remote tools let technicians assist users without physical presence. This chapter covers common remote access tools, security considerations and practical techniques for efficient remote troubleshooting.

Overview of common tools

  • RDP (Remote Desktop): Built into Windows. Use only on secure networks or through VPN and limit allowed users.
  • AnyDesk / TeamViewer: Easy cross-platform remote control for support. License-levels differ for personal vs business use.
  • Web-based tools: Zoho Assist, Connectwise Control offer browser-based access and integration with helpdesk systems.

Security & consent

Always obtain explicit consent from the user. Log sessions, record steps taken and close any remote control session as soon as the task is complete. Avoid transferring or viewing sensitive data unless required and authorized.

Performance and practical tips

  • For low bandwidth, use file transfer rather than full session screen share.
  • Close unnecessary programs to reduce CPU load during remote sessions.
  • Disable visual effects and set remote session to lower color depth for improved responsiveness.
Hands-on: typical remote support flow
  1. Ask the user to describe the problem and request permission to connect.
  2. Confirm session ID / password, then connect and validate the user’s view to ensure correct system.
  3. Perform diagnostics, apply fixes, and explain the steps to the user as you go.
  4. End session, provide summary notes in the ticket, and follow-up if required.

Audit & logging

Keep logs of remote sessions for compliance: who connected, when, duration and steps performed. Many remote tools provide session recording features — use them judiciously and inform users.

Case study

Case: Remote printer driver installation

Task: Install and configure a vendor driver across several remote client machines.

Approach: Use a remote executor tool to push drivers silently, verify service status and restart print spooler. Document changes and version numbers for rollback.

Checklist

  • Confirm user identity and authorization.
  • Use secure channels and VPN for corporate systems.
  • Record the session or log actions for audit trails.
  • Close any transferred files and remote tools after use.
6

Command Line Basics (Windows CMD)

The command line is a powerful tool for diagnosing and automating support tasks. Learn essential commands and safe scripting practices.

Why use the command line

It is faster for many tasks, works over remote shells, and can be scripted to automate repetitive tasks. Also useful when GUI is broken or not available.

Key commands

  • ipconfig /all — network configuration and DNS servers.
  • ping, tracert — connectivity tests.
  • tasklist, taskkill — process management.
  • sfc /scannow, chkdsk — system integrity and disk checks.
  • netstat -ano — active connections and port usage.
Hands-on: useful command line tasks
  1. Open CMD as administrator and run systeminfo to collect system details.
  2. Run sfc /scannow to detect corrupted system files and note the output.
  3. Use netstat -abno to find listening ports and associated executables for debugging networked application issues.

Batch scripting basics

Create simple .bat scripts to group commands. Always test scripts in a non-production environment and include logging lines like redirecting output to files.

Troubleshooting examples

Problem: Application won’t start, no GUI error

Steps: Run application from CMD to capture console output, check event viewer for application errors, use tasklist to confirm process is not running in zombie state, check application config files for corruption.

Safety tips

  • Never run unknown scripts as administrator.
  • Log script actions and provide undo/rollback steps when possible.
  • Script idempotently where feasible (safe re-runs).
7

PowerShell for IT Support

PowerShell is a modern, feature-rich shell for administrative tasks on Windows. This chapter covers cmdlets, piping, objects, and practical scripts used in daily support.

PowerShell fundamentals

Unlike old shells that pass text, PowerShell passes objects between commands, making it powerful for querying and managing system state.

Common useful cmdlets

  • Get-Process, Stop-Process
  • Get-Service, Start-Service, Stop-Service
  • Get-EventLog / Get-WinEvent for logs
  • Get-ADUser (when Active Directory module present)
Hands-on: small PowerShell script
  1. Run Get-Service | Where-Object { $_.Status -eq 'Running' } and examine the output object properties.
  2. Create a script that collects OS version, last boot time and disk free space and outputs CSV for inventory.
  3. Test scripts with sample data and include error handling using Try/Catch.

Automation & scheduled tasks

Use Task Scheduler or Scheduled Jobs in PowerShell to perform recurring inventory tasks or automated maintenance. Ensure scripts have proper credentials and secure storage for secrets (avoid hard-coded passwords).

Best practices

  • Use Verb-Noun naming, comment your scripts and handle errors gracefully.
  • Test on non-critical systems and use logging for auditing.
8

Cloud Computing — Concepts & Tasks

The cloud provides on-demand compute, storage and services. Learn core cloud models, common tasks for IT support, cost controls and basic security in cloud environments.

Cloud service models

  • IaaS: You manage VMs, storage and network; provider manages physical hosts.
  • PaaS: Provider manages runtime; you deploy applications.
  • SaaS: Provider offers software over web — minimal infrastructure management required.

Typical support tasks in cloud environments

  • Provision and snapshot VMs, troubleshoot connectivity to VMs.
  • Manage storage buckets/containers and permissions.
  • Rotate credentials and manage IAM roles and policies.
  • Monitor costs and set alerts / budgets to avoid overages.
Hands-on: cloud VM basics
  1. Create a small VM in a free-tier account and configure SSH key or RDP access.
  2. Take a snapshot of the VM and test restoring from snapshot in a test environment.
  3. Configure firewall rules or security groups to allow only required ports.

Cost control & governance

Tag resources, set budgets and alerts, delete unused VMs and orphaned storage. Use role-based access control (RBAC) and least privilege in IAM.

Security basics in cloud

  • Enable MFA for cloud accounts.
  • Use encrypted storage for sensitive data.
  • Audit logs and alert on suspicious activity.

Case study

Case: Unexpected cloud bill spike

Investigation: Found automated jobs had been recreated without tagging and a VM auto-scaling policy misfired.

Fix: Disabled the offending jobs, implemented budget alerts, and added resource tagging and cost allocation reports.

9

Cybersecurity Basics for IT Support

Security is essential for support engineers. This chapter covers threat types, defence fundamentals, incident response steps and practical security hygiene for organizations and users.

Common threat types

  • Phishing: Fraudulent emails or messages trick users into revealing credentials or installing malware.
  • Malware: Software designed to damage, steal or control systems.
  • Ransomware: Encrypts files and demands payment for decryption keys.
  • Insider threats: Malicious or negligent actions by employees.

Essential defensive measures

  • Use endpoint protection (antivirus/EDR) with regular updates.
  • Enforce strong password policies and use MFA everywhere possible.
  • Keep systems patched; prioritize critical security patches.
  • Perform regular backups and test restores.
Hands-on: basic security checklist for new hires
  1. Provision devices with security baseline, disk encryption and corporate AV.
  2. Enable MFA for cloud and critical applications.
  3. Run a phishing awareness simulation and analyze results to plan training.

Incident response (high level)

  1. Identify and contain the incident (isolate affected hosts).
  2. Collect forensic data (logs, memory image if needed).
  3. Eradicate the threat and restore from clean backups.
  4. Perform root cause analysis and implement preventive controls.

Case study

Case: Ransomware infection in a workstation

Action: Isolate the affected machine, disconnect from network, restore files from verified backup, reset credentials for impacted accounts, scan for persistence mechanisms, and review backup integrity.

Lessons: Test backups regularly and maintain an offline or immutable backup tier.

Security hygiene checklist

  • Enforce MFA and least privilege.
  • Keep software updated and remove unused apps.
  • Use EDR to detect suspicious behavior.
  • Train users and test phishing awareness quarterly.
10

Active Directory & Azure AD

Identity management is central to enterprise IT. Learn AD basics (domains, OUs, GPOs) and Azure AD essentials (SSO, conditional access) for modern identity solutions.

Active Directory core concepts

  • Domain: A boundary for identity objects.
  • Organizational Units (OUs): Containers to organize objects and apply policies.
  • Groups: Security and distribution groups to manage permissions.
  • Group Policy Objects (GPOs): Apply configuration settings centrally to users/computers.

Common AD tasks for support

  • Password resets, account unlocks and profile issues.
  • Group membership management for access control.
  • Apply and troubleshoot GPO application using gpresult and RSOP.

Azure AD and hybrid identity

Azure AD provides cloud identity services: SSO to cloud apps, conditional access policies, and device registration. Hybrid setups often use Azure AD Connect to sync on-prem AD to Azure AD.

Hands-on tasks
  1. Reset a user password and document steps and security checks (verify identity before reset).
  2. Create a security group and assign members for application access.
  3. Review Azure AD sign-in logs for failed attempts and conditional access triggers.

Troubleshooting GPO application

  1. Run gpresult /h gp.html on the target machine to see which policies were applied.
  2. Check replication across domain controllers and verify DNS SRV records for AD services.

Case study

Case: New policy not applying to users

Steps: Verified GPO scope and security filtering, checked OU placement, ran gpupdate and gpresult, confirmed replication latencies between DCs. Fixed by updating scope and forcing replication.

11

DNS — The Backbone of the Internet

DNS maps hostnames to IP addresses. This chapter explains DNS architecture, record types, caching, propagation, and practical troubleshooting techniques.

DNS architecture

Resolver -> Root -> TLD -> Authoritative server. Caching at various levels speeds resolution but means changes take time to propagate (TTL).

Common record types & uses

  • A: IPv4 address mapping.
  • AAAA: IPv6 address mapping.
  • CNAME: Alias to another name (not to be used for naked domains typically).
  • MX: Mail exchange servers.
  • TXT: Arbitrary text, often used for SPF, DKIM, DMARC and verification tokens.

TTL and propagation

TTL determines how long records are cached. Lower TTLs shorten propagation but increase query volume. Plan changes with TTL adjustments for controlled switchover.

Hands-on: DNS checks
  1. Use nslookup to query A, MX and TXT records and compare results from multiple public resolvers.
  2. Flush DNS cache (ipconfig /flushdns) after changing records to test updates locally.
  3. Use online propagation checkers to confirm public resolvers have picked up changes.

Troubleshooting DNS issues

  1. Confirm authoritative records at registrar and DNS provider control panel.
  2. Check glue records and NS delegation for parent zone issues.
  3. Test with dig +trace (Linux) to follow the lookup path.

Case study

Case: Website unreachable after migration

Cause: DNS records pointed to old server and TTL was high. Fix: Updated records, lowered TTL, and coordinated switch with the client during low traffic hours; verified via multiple public resolvers.

12

Advanced DNS Concepts

Covers DNSSEC, DoH/DoT, Anycast, and DNS-based load balancing strategies to improve security and performance at scale.

DNSSEC

DNSSEC signs DNS data to ensure integrity. It prevents tampering but requires careful key management and signing procedures.

DoH and DoT for privacy

DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) encrypt DNS queries to protect privacy. They move encryption between client and resolver (not necessarily end-to-end).

Anycast & global performance

Anycast serves identical IPs from multiple locations — traffic is routed to the nearest node. Use Anycast for resilient and low-latency DNS services.

DNS load balancing strategies

  • Round-robin A records for simple distribution.
  • GeoDNS to route users to nearest data center.
  • Health checks and failover DNS to remove unhealthy endpoints from rotation.
Hands-on: check DNSSEC and DoH
  1. Use online tools to verify DNSSEC signing for a domain.
  2. Configure a browser to use DoH and compare DNS responses with and without DoH to understand differences.

Security considerations

DNS is a critical infrastructure; protect your authoritative name servers, monitor for anomalies, and consider authoritative DNS redundancy.

13

Software Installation Basics

Covers installation planning, installer types, silent deployments, prerequisites, and troubleshooting failed installs.

Plan before installing

Check system requirements, compatibility, prerequisites, licensing and backup. For enterprise, pilot on a small set of devices before mass deployment.

Installer types

  • .msi and .exe installers on Windows; command-line flags often support silent installs (msiexec /i).
  • Package managers on Linux (apt, yum, dnf) and macOS (.dmg, brew).
  • Web installers that fetch components online — ensure network access is allowed.
Hands-on: painless installations
  1. Test installer on a VM, capture logs during install and note any preflight checks.
  2. Use silent install flags and a script to automate installation across multiple machines.
  3. Validate application starts, check service logs and verify that scheduled tasks or drivers are present if installed.

Installer troubleshooting tips

  • Collect installer logs (often via /log switch or temp folders).
  • Check prerequisites (Visual C++ runtimes, .NET framework versions).
  • Install as admin when required and ensure UAC prompts are handled in automated flows.

Case study

Case: Mass install fails on some machines

Found missing prerequisites and different OS versions. Solution: Add precheck script to verify prerequisites and schedule updates prior to deployment.

14

Software Licensing, Security & Troubleshooting

Understand license types, compliance, managing activation problems, and ensuring licensing security for organizations.

License types & management

  • Per-device, per-user, subscription-based, volume licensing and open-source licensing models. Keep records, renewal dates and ownership evidence.

Security for license keys

Store keys in encrypted vaults with access controls. Avoid sending keys via email or storing them in plain text in scripts.

Hands-on: license inventory
  1. Create a secure inventory spreadsheet or use a license management tool listing product, key, owner and expiry.
  2. Verify that all installed software on a sample machine has matching license entries.

Troubleshooting activation problems

  • Check network connectivity to activation servers and proxy settings.
  • Ensure system time is correct (certificate/activation often depends on accurate time).
  • Collect logs as required by vendor support and escalate with proof of purchase if needed.

Case study

Case: Activation server unreachable

Temporary fix: use offline activation or temporary license where supported. Long term: fix proxy/route to activation servers and coordinate with vendor support.

15

Driver Management & Software Updates

Patch management is vital. Learn how to manage driver updates, patch cycles, rollback strategies and minimize risk during deployments.

Patch management lifecycle

  1. Inventory devices and software versions.
  2. Test patches in a lab or pilot group.
  3. Deploy in phases and monitor for issues.
  4. Roll back if severe problems occur and report to vendor.

Driver updates

Drivers are vendor-specific; test driver updates especially for NICs, GPUs and storage controllers. Keep driver packages and signatures verified.

Hands-on: driver test flow
  1. Create a snapshot of a test VM or system image before applying driver updates.
  2. Install driver, run stress or functional tests relevant to the device.
  3. Document results and approve for broader deployment.

Troubleshooting driver issues

  • Use Device Manager to roll back to previous driver if new drivers cause regressions.
  • Collect system logs and BSOD minidumps if driver causes system crashes.
16

Asset Management & Inventory

Good asset management reduces loss, simplifies support and helps with audits. Learn to tag, track and manage device lifecycles.

Asset inventory best practices

  • Record serial numbers, MAC addresses, owner, location and warranty dates.
  • Use barcode or RFID tags to streamline physical audits.
  • Maintain CMDB relationships to know which app runs on which server/device.
Hands-on: create an asset record
  1. Create an asset record with device details and owner information.
  2. Tag a device and test scanning and lookup.
  3. Run a mock audit reconciling physical devices to inventory data.

Lifecycle management

Define procurement, deployment, maintenance, reassignment and decommissioning steps. Ensure secure wipe of devices before disposal and record certificate of destruction where required.

17

Ticketing Tools & Helpdesk Best Practices

A good ticketing system organizes work, measures SLAs, and provides a knowledge base. Learn templates, priorities, escalation and metrics to improve service.

Choosing and configuring a ticketing system

Consider scale, integrations (AD, email, chat), automation (ticket routing, templates), reporting capabilities and SLA features.

Ticket templates & fields

Create templates for common incident types (password reset, printer issues) including required fields to standardize information intake for faster resolution.

Hands-on: build a password reset template
  1. Include fields: User, Contact, System, Issue, Steps taken, Resolution, Time to resolve, Notes.
  2. Configure SLA for first response and resolution times.

Key metrics

  • First response time — how quickly support responds initially.
  • Resolution time — how long to fully resolve tickets.
  • CSAT — customer satisfaction score.
  • Backlog — number of open tickets and aging distribution.

Case study

Case: High ticket backlog

Approach: Triage backlog by priority, automate password reset tasks with self-service solutions, assign dedicated triage resources and monitor KPIs.

18

SLA Management & Escalation

SLAs define expectations. This chapter covers how to write measurable SLAs, escalation matrices, monitoring and review processes.

Designing SLAs

  • Be specific: define services covered, response and resolution times by priority, measurement methods and reporting cadence.
  • Include exclusions and maintenance windows to set expectations properly.

Escalation matrix

Define who to contact at each breach level and the communication channels (phone, SMS, email). Test escalation contacts periodically to ensure availability.

Hands-on: draft a simple SLA
  1. Define incident priority levels and assign response and resolution targets (e.g., P1 response 15 minutes, resolution 4 hours).
  2. Create an escalation list for P1 incidents and test a simulated outage to exercise the process.

Monitoring & reporting

Use dashboards to monitor SLA breaches and trends. Perform post-incident reviews after breaches to identify root causes and corrective action.

19

Software Troubleshooting & Best Practices

Structured troubleshooting reduces time to resolution. Learn how to collect logs, reproduce issues, perform root cause analysis, test fixes and prevent recurrence.

Structured troubleshooting process

  1. Identify and gather: collect symptoms, logs, users affected, and sequence of events.
  2. Isolate: narrow to a component (network, app, OS, hardware).
  3. Hypothesize and test: try fixes in test environment first when possible.
  4. Implement fix and verify with users.
  5. Document and feed back into knowledge base.
Hands-on: gather logs
  1. Collect application logs, Windows Event Viewer logs, and any service-specific logs.
  2. Search logs using known error strings and timestamps to correlate events.
  3. Create a short RCA (root cause analysis) document describing cause and fix.

Common patterns

  • Memory leaks — leading to increasing memory usage and eventual crashes; identify using performance counters and profiling tools.
  • Deadlocks — processes waiting on locks; capture thread dumps or use debugging tools.
  • Configuration drift — differences between environments causing issues; mitigate with configuration management and immutable infrastructure.

Case study

Case: Intermittent app crashes in production

Action: Reproduce in staging with similar load, enable detailed logging, detect a race condition during peak usage and deploy fix; set up monitoring to detect regressions early.

20

Interview Preparation & Career Roadmap

Prepare resume, craft answers for scenario-based questions, plan certifications and map a learning path from entry-level to senior roles.

Resume & portfolio

Highlight hands-on experience: labs, incidents resolved, automation scripts, and certifications. Include a one-page summary of a major incident you led or an automation you implemented.

Common interview scenarios

  • Explain how you troubleshoot a slow computer step-by-step.
  • Describe a time you handled an angry user and how you resolved the situation.
  • Give an example of when you automated a repetitive task and the impact.

Learning roadmap

Start with CompTIA A+ or Microsoft Fundamentals, then do Network+ and CCNA for networking. For cloud, take Azure Fundamentals and AWS Cloud Practitioner. Build projects and maintain a lab for practice.

Growth tips

  • Keep a learning log and set monthly goals.
  • Contribute to internal knowledge base articles — teaching helps learning.
  • Practice soft skills: communication, time management and customer empathy.
G

Glossary

IP Address
A unique number that identifies devices on a network.
DNS
Domain Name System — maps website names to IP addresses.
VM
Virtual Machine — a computer running inside another computer.
GPO
Group Policy Object — applies settings to many Windows machines centrally.
SLA
Service Level Agreement — defines response & resolution targets.
A

Appendix: Sample Templates & Commands

Ticket template (example)

Template: Password Reset – User: – Contact: – System: – Issue: – Steps Taken: – Resolution: – Time to Resolve: – Notes:

Useful commands cheat-sheet

Windows: ipconfig /all sfc /scannow chkdsk /f tasklist netstat -ano Linux: ip addr ss -tulpn journalctl -xe df -h top / htop
K

Answer Key & Quick Reference

This section summarizes key answers and quick references for commonly asked practical questions.

  1. Ch1: L1 handles basic user support and triage; document everything.
  2. Ch2: SSDs improve boot times; check PSU and cables for power issues.
  3. Ch3: Use restore points and recovery when boot issues occur; use VM labs for practice.
  4. Ch4: Subnetting matters for network segmentation; learn CIDR notation.
  5. Ch5: Always get user permission before remote control; log sessions.
© VEP Tech Academy — Complete IT Support & Networking — Expanded Edition