Booking options
£12
£12
On-Demand course
55 minutes
All levels
This comprehensive course on IT Administration and Networking will deepen your understanding on this topic.
After successful completion of this course you can acquire the required skills in this sector. This IT Administration and Networking comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market.
So enrol in this course today to fast track your career ladder.
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
There is no experience or previous qualifications required for enrolment on this IT Administration and Networking. It is available to all students, of all academic backgrounds.
Our IT Administration and Networking is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G.
There is no time limit for completing this course, it can be studied in your own time at your own pace.
Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to-
Open doors of opportunities
Increase your adaptability
Keep you relevant
Boost confidence
And much more!
5 sections • 128 lectures • 00:55:00 total length
•What is an Operating System: 00:48:00
•Configuring the Operating System: 00:06:00
•What is an Application: 00:10:00
•Using Control Panel: 00:18:00
•Software and Concepts: 00:11:00
•Licensing: 00:06:00
•Using Software: 00:07:00
•Software Tools: 00:10:00
•Software: 00:14:00
•Hardware, Devices, and Peripherals: 00:05:00
•Hardware and Peripherals: 00:07:00
•Storage: 00:12:00
•Connectivity Devices: 00:05:00
•Network Components: 00:09:00
•Identify the Importance of Risk Management: 00:11:00
•Assess Risk: 00:13:00
•Mitigate Risk: 00:24:00
•Integrate Documentation into Risk Management: 00:15:00
•Classify Threats and Threat Profiles: 00:08:00
•Perform Ongoing Threat Research: 00:13:00
•Resources that Aid in Research of Threats: 00:03:00
•Implement Threat Modeling: 00:10:00
•Assess the Impact of Reconnaissance Incidents: 00:11:00
•Performing Reconnaissance on a Network: 00:07:00
•Examining Reconnaissance Incidents: 00:08:00
•Assess the Impact of Social Engineering: 00:11:00
•Assessing the impact of Social Engineering: 00:08:00
•Assessing the Impact of Phishing: 00:03:00
•Types of Wireless Attacks: 00:30:00
•Intrusion Monitoring: 00:08:00
•Wireless Security Risks: 00:22:00
•Authentication Attacks: 00:21:00
•Rogue Devices: 00:04:00
•Public Hotspots: 00:07:00
•Wireless Security Monitoring: 00:21:00
•Device Tracking: 00:18:00
•WLAN Security Infrastructure: 00:38:00
•Management Protocols: 00:23:00
•Other RADIUS Solutions: 00:16:00
•Introduction: 00:30:00
•Child Safety Online: 01:00:00
•Secure Payment Sites: 01:00:00
•Online Banking: 00:30:00
•How To Keep Your Password Safe: 00:30:00
•Common Scams: 01:00:00
•How I Got Pharmed: 01:00:00
•Virus Protection: 01:00:00
•Self Maintenance: 00:30:00
•Personal Information Online: 01:00:00
•Is The Internet Safe?: 00:30:00
•Importance of Cyber Security: 00:30:00
•Spyware Can Destroy: 00:30:00
•How Does Spyware Spread?: 01:00:00
•How To Remove Spyware: 01:00:00
•Anti Spyware Program: 01:00:00
•The Anti Anti-Spyware Programs: 00:30:00
•Research And Learn More: 00:30:00
•Choosing The Best Anti Spyware Tool: 01:00:00
•Computer Security And Spyware: 01:00:00
•The Programs To Avoid: 00:15:00
•Is It Legal?: 00:30:00
•Checklist Of Protection: 00:15:00
•The Information Security Cycle: 00:37:00
•Information Security Controls: 00:36:00
•Authentication Methods: 00:09:00
•Cryptography Fundamentals: 00:56:00
•Security Policy Fundamentals: 00:11:00
•Social Engineering: 00:32:00
•Malware: 00:25:00
•Software-Based Threats: 00:22:00
•Based Threats: 00:39:00
•Wireless Threats and Vulnerabilities: 00:43:00
•Physical Threats and Vulnerabilities: 00:09:00
•Manage Data Security: 00:47:00
•Manage Application Security: 00:55:00
•Manage Device and Host Security: 01:08:00
•Manage Mobile Security: 00:10:00
•A Risk Analysis: 00:17:00
•Implement Vulnerability Assessment Tools and Techniques: 00:05:00
•Scan for Vulnerabilities: 00:27:00
•Mitigation and Deterrent Techniques: 00:19:00
•Respond to Security Incidents: 00:00:00
•Recover from a Security Incident: 00:10:00
•OSI Layers: 00:44:00
•LANs and WANs: 00:14:00
•Network Types: 00:07:00
•Transmissions: 00:36:00
•Cables: 00:41:00
•Fiber Optics: 00:17:00
•Converters and Connectors: 00:27:00
•Wireless Security: 00:15:00
•Authentication.prproj: 00:21:00
•Wireless Security Threats: 00:30:00
•TACACS: 00:10:00
•Keys: 00:26:00
•RADIUS: 00:07:00
•VPN Technologies: 00:16:00
•Tunneling Protocols.prproj: 00:05:00
•Acceptable Use: 01:00:00
•Common Problems: 00:32:00
•Troubleshooting: 00:28:00
•Network Technician Tools: 00:46:00
•Physical and Logical Issues: 00:19:00
•Open or Closed Ports: 00:09:00
•ARP Issues: 00:13:00
•Core Concepts in Healthcare IT: 00:06:00
•EMR EHR Issues: 00:05:00
•Regulations, Standards, and Stakeholders: 00:14:00
•HIPAA Controls and Compliance: 00:08:00
•Roles and Responsibilities: 00:10:00
•Manage Communication and Ethics Issues: 00:15:00
•Legal Best Practices, Requirements, and Documentation: 00:09:00
•Medical Document Imaging: 00:04:00
•Sanitation Management: 00:03:00
•Computing Essentials: 00:05:00
•Networking: 00:33:00
•Manage Servers and Software: 00:27:00
•Hardware Support: 00:14:00
•Set Up a Workstation: 00:08:00
•Troubleshoot Basic IT Issues: 00:15:00
•Troubleshoot Medical IT Issues: 00:20:00
•Implementation of an EMR EHR System: 00:34:00
•Change Control: 00:08:00
•Manage Physical and Logical Security: 00:36:00
•Implement Security Best Practices and Threat Mitigation Techniques: 00:13:00
•Manage Remote Access: 00:06:00
•Manage Wireless Security: 00:15:00
•Perform Backups and Disaster Recovery: 00:16:00
At Apex Learning, we share the goal of millions of people to mak...