Get in Touch

Course Outline

Technical Support Fundamentals

  • Comprehend the workings of the binary system
  • Assemble a computer from the ground up
  • Select and install an operating system on a computer
  • Understand the nature and function of the Internet, along with its influence on the modern world
  • Explore how applications are developed and their underlying mechanisms within a computer
  • Apply standard problem-solving strategies and soft skills relevant to Information Technology environments

The Bits and Bytes of Computer Networking

  • Describe computer networks using a five-layer model
  • Understand the standard protocols associated with TCP/IP communications
  • Master effective network troubleshooting tools and techniques
  • Learn about essential network services such as DNS and DHCP that keep networks operational
  • Grasp the concepts of cloud computing, infrastructure as a service, and cloud storage

Operating Systems and You: Becoming a Power User

  • Navigate Windows and Linux file systems using both graphical user interfaces and command line interpreters
  • Configure users, groups, and permissions for secure account access
  • Install, configure, and uninstall software on Windows and Linux operating systems
  • Set up disk partitions and file systems
  • Understand system processes and learn how to manage them effectively
  • Work with system logs and remote connection utilities
  • Apply operating system expertise to resolve common issues faced by IT Support Specialists

System Administration and IT Infrastructure Services

  • Apply best practices for selecting hardware, vendors, and services for your organization
  • Understand the operation and management of critical infrastructure services that sustain organizational activities
  • Leverage cloud capabilities to benefit your organization
  • Manage organizational computers and users via directory services, including Active Directory and OpenLDAP
  • Select and administer the tools utilized by your organization
  • Backup organizational data and understand how to restore IT infrastructure following a disaster
  • Use systems administration knowledge to plan and enhance IT process efficiency

IT Security: Defense against the digital dark arts

  • Understand how various encryption algorithms and techniques function, along with their benefits and limitations
  • Explore different authentication systems and types
  • Distinguish between authentication and authorization
  • Evaluate potential risks and propose methods to mitigate them
  • Implement best practices for network security
  • Assist others in understanding security concepts and protecting themselves

Requirements

  • No prior degree or work experience is required.
 35 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories