Get in Touch

Course Outline

Technical Support Fundamentals

  • Understand how the binary system operates
  • Assemble a computer from the ground up
  • Select and install an operating system on a computer
  • Grasp the nature of the Internet, its functionality, and its impact on the modern world
  • Learn how applications are developed and how they function internally
  • Apply common problem-solving methodologies and soft skills within an Information Technology context

The Bits and Bytes of Computer Networking

  • Describe computer networks using a five-layer model
  • Understand all standard protocols involved in TCP/IP communications
  • Master powerful network troubleshooting tools and techniques
  • Learn about network services like DNS and DHCP that keep computer networks running
  • Understand cloud computing, everything as a service, and cloud storage

Operating Systems and You: Becoming a Power User

  • Navigate Windows and Linux filesystems using both graphical user interfaces and command line interpreters
  • Set up users, groups, and permissions for account access
  • Install, configure, and remove software on Windows and Linux operating systems
  • Configure disk partitions and filesystems
  • Understand how system processes work and how to manage them
  • Work with system logs and remote connection tools
  • Utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role

System Administration and IT Infrastructure Services

  • Apply best practices for selecting hardware, vendors, and services for your organization
  • Understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers
  • Learn how to maximize the benefits of the cloud for your organization
  • Manage an organization’s computers and users using directory services, Active Directory, and OpenLDAP
  • Select and manage the tools that your organization will use
  • Backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster
  • Utilize systems administration knowledge to plan and improve processes for IT environments

IT Security: Defense against the digital dark arts

  • How various encryption algorithms and techniques work, as well as their benefits and limitations.
  • Various authentication systems and types.
  • The difference between authentication and authorization.
  • How to evaluate potential risks and recommend ways to reduce risk.
  • Best practices for securing a network.
  • How to help others to grasp security concepts and protect themselves.

Requirements

  • No degree or prior experience is required.
 35 Hours

Testimonials (3)

Related Categories