Course Outline

Technical Support Fundamentals

  • understand how the binary system works
  • assemble a computer from scratch
  • choose and install an operating system on a computer
  • understand what the Internet is, how it works, and the impact it has in the modern world
  • learn how applications are created and how they work under the hood of a computer
  • utilize common problem-solving methodologies and soft skills in an Information Technology setting

The Bits and Bytes of Computer Networking

  • describe computer networks in terms of a five-layer model
  • understand all of the standard protocols involved with TCP/IP communications
  • grasp powerful network troubleshooting tools and techniques
  • learn network services like DNS and DHCP that help make computer networks run
  • understand cloud computing, everything as a service, and cloud storage

Operating Systems and You: Becoming a Power User

  • navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter
  • set up users, groups, and permissions for account access
  • install, configure, and remove software on the Windows and Linux operating systems
  • configure disk partitions and filesystems
  • understand how system processes work and how to manage them
  • work with system logs and remote connection tools
  • utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role

System Administration and IT Infrastructure Services

  • utilize best practices for choosing hardware, vendors, and services for your organization
  • understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers
  • understand how to make the most of the cloud for your organization
  • manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP
  • choose and manage the tools that your organization will use
  • backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster
  • utilize systems administration knowledge to plan and improve processes for IT environments

IT Security: Defense against the digital dark arts

  • how various encryption algorithms and techniques work as well as their benefits and limitations.
  • various authentication systems and types.
  • the difference between authentication and authorization.
  • how to evaluate potential risks and recommend ways to reduce risk.
  • best practices for securing a network.
  • how to help others to grasp security concepts and protect themselves.

Requirements

  • No degree or experience required.
 35 Hours

Number of participants



Price per participant

Testimonials (1)

Related Courses

Related Categories