Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Technical Support Fundamentals
- Understand how the binary system operates
- Assemble a computer from the ground up
- Select and install an operating system on a computer
- Grasp the nature of the Internet, its functionality, and its impact on the modern world
- Learn how applications are developed and how they function internally
- Apply common problem-solving methodologies and soft skills within an Information Technology context
The Bits and Bytes of Computer Networking
- Describe computer networks using a five-layer model
- Understand all standard protocols involved in TCP/IP communications
- Master powerful network troubleshooting tools and techniques
- Learn about network services like DNS and DHCP that keep computer networks running
- Understand cloud computing, everything as a service, and cloud storage
Operating Systems and You: Becoming a Power User
- Navigate Windows and Linux filesystems using both graphical user interfaces and command line interpreters
- Set up users, groups, and permissions for account access
- Install, configure, and remove software on Windows and Linux operating systems
- Configure disk partitions and filesystems
- Understand how system processes work and how to manage them
- Work with system logs and remote connection tools
- Utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role
System Administration and IT Infrastructure Services
- Apply best practices for selecting hardware, vendors, and services for your organization
- Understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers
- Learn how to maximize the benefits of the cloud for your organization
- Manage an organization’s computers and users using directory services, Active Directory, and OpenLDAP
- Select and manage the tools that your organization will use
- Backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster
- Utilize systems administration knowledge to plan and improve processes for IT environments
IT Security: Defense against the digital dark arts
- How various encryption algorithms and techniques work, as well as their benefits and limitations.
- Various authentication systems and types.
- The difference between authentication and authorization.
- How to evaluate potential risks and recommend ways to reduce risk.
- Best practices for securing a network.
- How to help others to grasp security concepts and protect themselves.
Requirements
- No degree or prior experience is required.
35 Hours
Testimonials (3)
The final day which is the Machine Learning Topic
John Erick Baltazar - Globe Telecom
Course - Google BigQuery
It was a really good training course, well prepared and explained by the trainer with great hands on experience on GCP.
Mircea
Course - Google Cloud Platform Basics and Management
Responses with solutions and practical use.