Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Technical Support Fundamentals
- understand how the binary system works
- assemble a computer from scratch
- choose and install an operating system on a computer
- understand what the Internet is, how it works, and the impact it has in the modern world
- learn how applications are created and how they work under the hood of a computer
- utilize common problem-solving methodologies and soft skills in an Information Technology setting
The Bits and Bytes of Computer Networking
- describe computer networks in terms of a five-layer model
- understand all of the standard protocols involved with TCP/IP communications
- grasp powerful network troubleshooting tools and techniques
- learn network services like DNS and DHCP that help make computer networks run
- understand cloud computing, everything as a service, and cloud storage
Operating Systems and You: Becoming a Power User
- navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter
- set up users, groups, and permissions for account access
- install, configure, and remove software on the Windows and Linux operating systems
- configure disk partitions and filesystems
- understand how system processes work and how to manage them
- work with system logs and remote connection tools
- utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role
System Administration and IT Infrastructure Services
- utilize best practices for choosing hardware, vendors, and services for your organization
- understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers
- understand how to make the most of the cloud for your organization
- manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP
- choose and manage the tools that your organization will use
- backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster
- utilize systems administration knowledge to plan and improve processes for IT environments
IT Security: Defense against the digital dark arts
- how various encryption algorithms and techniques work as well as their benefits and limitations.
- various authentication systems and types.
- the difference between authentication and authorization.
- how to evaluate potential risks and recommend ways to reduce risk.
- best practices for securing a network.
- how to help others to grasp security concepts and protect themselves.
Requirements
- No degree or experience required.
35 Hours
Testimonials (1)
Responses with solutions and practical use.