This video course will prepare you to take and pass the CompTIA IT Fundamentals (ITF+) certification (FC0-U61) exam confidently by helping you get to grips with all the major domains covered in the certification and enabling you to develop the skills required to set up, configure, and secure desktop PC, mobile, and networking devices.
This course will get you started with Nmap and teach you all the techniques and tricks needed for scanning and probing computer networks, including host discovery and operating system detection by sending packets and analyzing the responses.
Embark on a transformative journey into the digital realm with 'IT Administration and Networking', a meticulously structured course designed to elevate your digital competencies. This educational adventure commences with an exploration of fundamental IT literacy, establishing a solid foundation for the inquisitive mind. The curriculum advances, navigating through the complexities of software management and hardware understanding. As you traverse the terrain of cybersecurity, you'll become adept at safeguarding digital ecosystems against burgeoning threats. Concluding with a foray into the interconnected world of networking, the programme synthesises each element into a cohesive skill set that is indispensable in today's technologically driven landscape. Learning Outcomes Acquire foundational knowledge in IT concepts and operations. Gain insights into software configuration and troubleshooting. Understand hardware components and their interplay in computing systems. Master the principles of digital security and data protection. Grasp the essentials of constructing and managing network infrastructures. Why choose this IT Administration and Networking course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the IT Administration and Networking Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this IT Administration and Networking course for? Aspiring IT technicians poised to commence their vocational journey. Office administrators aiming to incorporate IT proficiency into their skillset. Entrepreneurs seeking to manage their business technology needs effectively. Students considering a career in information technology or related fields. Hobbyists interested in the technical aspects of computer systems. Career path IT Support Technician - £18,000 - £30,000 Network Administrator - £22,000 - £40,000 System Administrator - £25,000 - £50,000 Cybersecurity Analyst - £30,000 - £65,000 Network Engineer - £28,000 - £53,000 IT Manager - £30,000 - £70,000 Prerequisites This IT Administration and Networking does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Administration and Networking was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Tchniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00
The comprehensive IPSEC VPN Tunnel with MikroTik has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the IPSEC VPN Tunnel with MikroTik today, and learn from the very best the industry has to offer! This best selling IPSEC VPN Tunnel with MikroTik has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth IPSEC VPN Tunnel with MikroTik is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The IPSEC VPN Tunnel with MikroTik is CPD-accredited, so you can be confident you're completing a quality training course which will boost your CV and enhance your career potential. The IPSEC VPN Tunnel with MikroTik is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the IPSEC VPN Tunnel with MikroTik, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the IPSEC VPN Tunnel with MikroTik will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the IPSEC VPN Tunnel with MikroTik to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Cybercriminals are increasingly relying on user error to perpetrate attacks. Employees are, therefore, the first line of defense when it comes to protecting your organization. One crucial step in making sure that everyone in your organization is prepared to keep your networks secure is for them to know what attacks look like. The five most common workplace computer attacks are explored in this video, along with how to spot and prevent them. Learning Objectives Identify the various forms of cyber crime and learn how to spot potential risks, enabling you to protect your computer and personal information effectively.;Recognize and respond to the five most common types of attempted cyber security attacks.;Explore the concept of denial of service (DoS) attacks and the dangers of typosquatting, equipping you with the ability to detect potential threats and contribute to overall cybersecurity resilience.
Preparing for the CISSP Certification Exam? Then this course is for you. In this course, you will learn more effective CISSP study techniques, exam hacks, formats, and strategies, as well as how to correctly respond to exam questions.
Feeling Stuck in Your Career? TheWeb Application Penetration Testing - 30 CoursesBundle is Your Skill-Building Solution. This exceptional collection of 30 premium courses is designed to encourage growth and improve your career opportunities. Suited to meet different interests and goals, the Web Application Penetration Testing bundle provides an engaging learning experience, helping you learn skills across various disciplines. With the Web Application Penetration Testing - 30 CoursesBundle, you'll have a personalised journey that aligns with your career goals and interests. This comprehensive package helps you confidently tackle new challenges, whether entering a new field or enhancing your existing knowledge. The Web Application Penetration Testing bundle is your gateway to expanding your career options, increasing job demand, and enhancing your skill set. By enrolling in this bundle, you'll receive complimentary PDF certificates for all courses, adding value to your resume at no extra cost. Develop key skills and achieve important progress in your career and personal development. Start your journey today and experience the transformative impact of the Web Application Penetration Testing bundle on your job life and career growth! This Web Application Penetration Testing - 30 CoursesBundle Comprises the Following CPD Accredited Courses: Course 01: Web Application Penetration Testing Course Course 02: Penetration Testing with OWASP ZAP: Mastery course Course 03: CompTIA PenTest+ (Ethical Hacking) Course 04: Secure Programming of Web Applications - Developers and TPMs Course 05: IT Administration and Networking Course 06: CPTE - Certified Penetration Testing Engineer Course 07: Mile2 Certified Network Forensics Examiner (CNFE) Course 08: Computer Networks Security from Scratch to Advanced Course 09: CompTIA Security+ (SY0-601) Course 10: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: CompTIA Network+ Certification (N10-007) Course 12: Learn Ethical Hacking From A-Z: Beginner To Expert Course 13: The Complete Python 3 Course: Beginner to Advanced! Course 14: Deep Learning & Neural Networks Python - Keras Course 15: Machine Learning with Python Course Course 16: Azure Machine Learning Course 17: JavaScript Basics Course 18: Building Web Applications with Django and PostgreSQL Course 19: Cyber Security Awareness Training Course 20: Cyber Security Incident Handling and Incident Response Course 21: Career Development Plan Fundamentals Course 22: CV Writing and Job Searching Course 23: Learn to Level Up Your Leadership Course 24: Networking Skills for Personal Success Course 25: Ace Your Presentations: Public Speaking Masterclass Course 26: Learn to Make a Fresh Start in Your Life Course 27: Motivation - Motivating Yourself & Others Course 28: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 29: Decision-Making and Critical Thinking Course 30: Time Management Training - Online Course What will make you stand out? Upon completion of this online Application Penetration Testing - 30 Courses Bundle, you will gain the following: CPD QS Accredited Proficiency with this web Application Penetration Testing Bundle After successfully completing the Web Application Penetration Testing bundle, you will receive a FREE PDF Certificate from REED as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this Web Application Penetration Testing Bundle The online test with immediate results You can study and complete the Web Application Penetration Testing bundle at your own pace. Study for the Web Application Penetration Testing bundle using any internet-connected device, such as a computer, tablet, or mobile device. The Web Application Penetration Testing - 30 Coursesbundle is a premier learning resource, with each course module holding respected CPD accreditation, symbolising exceptional quality. The content is packed with knowledge and is regularly updated to ensure it remains relevant. This bundle offers not just education but a constantly improving learning experience designed to enrich both your personal and professional development. Advance the future of learning with the Web Application Penetration Testing bundle, a comprehensive, complete collection of 30 courses. Each course in the Web Application Penetration Testing bundle has been handpicked by our experts to provide a broad range of learning opportunities. Together, these modules form an important and well-rounded learning experience. Our mission is to deliver high-quality, accessible education for everyone. Whether you are starting your career, switching industries, or enhancing your professional skills, the Web Application Penetration Testing bundle offers the flexibility and convenience to learn at your own pace. Make the Counselling, Psychology & Art Therapy package your trusted partner in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Web Application Penetration Testing - 30 Courses bundle is perfect for: Expand your knowledge and skillset for a fulfilling career with the Web Application Penetration Testing bundle. Become a more valuable professional by earning CPD certification and mastering in-demand skills with the Web Application Penetration Testing bundle. Discover your passion or explore new career options with the diverse learning opportunities in the Web Application Penetration Testing bundle. Learn on your schedule, in the comfort of your home - the Web Application Penetration Testing bundle offers ultimate flexibility for busy individuals. Requirements You are warmly invited to register for this bundle. Please be aware that no formal entry requirements or qualifications are necessary. This curriculum has been crafted to be open to everyone, regardless of previous experience or educational attainment. Career path Gain a wide range of skills across various fields, improve your problem-solving capabilities, and keep current with industry trends. Perfect for those aiming for career advancement, exploring a new professional direction, or pursuing personal growth. Begin your journey with the Web Application Penetration Testing - 30 Courses bundle. Certificates CPD Certificates Digital certificate - Included
Register on the Level 5 Diploma in IT - Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Level 5 Diploma in IT - Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Level 5 Diploma in IT - Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Level 5 Diploma in IT - Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00
Register on the CompTIA A+ (220-1002) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA A+ (220-1002) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA A+ (220-1002) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA A+ (220-1002), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: All About the CompTIA A+ 2019 Core 2 Exam CompTIA A+ 2019 Core 2 (220-1002) Course Introduction 00:02:00 What is the CompTIA A+ 00:02:00 Why Get A+ Certified? 00:03:00 What is on the CompTIA A+ Core 2 (220-1002) Exam? 00:04:00 How to Pass the CompTIA A+ Exam 00:04:00 How to use this Video Course 00:03:00 Section 02: Safety and Professionalism Professional Communication Part 1 00:06:00 Professional Communication Part 2 00:07:00 Physical Safety 00:07:00 Section 03: The Visible Computer What is an Operating System? 00:09:00 Users and Super Users 00:05:00 Why Windows? 00:08:00 Windows Editions and Versions 00:12:00 Touring the macOS 00:06:00 Touring Linux 00:08:00 Section 04: CPUs 32-Bit vs. 64-Bit Processing 00:12:00 Section 05: RAM Virtual Memory 00:06:00 Section 06: Power Supply Power Protection 00:10:00 Section 07: Implementing Mass Storage Understanding Partitioning 00:04:00 MBR Partitioning 00:12:00 GPT Partitioning 00:09:00 Understanding File Systems 00:12:00 Popular File Systems 00:07:00 Formatting in Action 00:11:00 Dynamic Disks 00:09:00 Software RAID in Storage Spaces 00:10:00 Encrypting Mass Storage 00:09:00 Section 08: Building a PC Boot from Everything 00:12:00 Installing Windows 00:12:00 Post-Installation Tasks 00:12:00 Windows Installation options 00:07:00 Section 09: Windows under the Hood What is the Registry? 00:11:00 Processes 00:07:00 Services 00:04:00 Your Windows Toolset 00:08:00 Windows 7 Task Manager 00:09:00 Windows 10 Task Manager 00:06:00 Information and Configuration Tools 00:11:00 Performance Monitor 00:12:00 Event Viewer 00:07:00 Tools for Programmers 00:08:00 Section 10: Users, Groups, and Permissions Introduction to Users and Groups 00:06:00 Managing Users and Groups 00:12:00 NTFS Permissions 00:08:00 Linux and macOS Permissions 00:05:00 File Explorer 00:14:00 Sharing Resources 00:11:00 Security Policies 00:08:00 Section 11: Maintaining and Optimizing Operating Systems Patch Management 00:11:00 Working with Disks 00:06:00 Working with Applications 00:07:00 System Restore 00:05:00 Backing up Your Files 00:07:00 Task Scheduler 00:07:00 Section 12: Working with the Command-Line Interface Understanding the CLI 00:11:00 Navigating the CLI 00:14:00 Working with Folders 00:07:00 Working with Files 00:11:00 Working with Drives 00:13:00 Super Copy Commands 00:09:00 Advanced Windows Command Line 00:08:00 Advanced Linux Commands 00:13:00 Command-Line Permissions 00:08:00 Introduction to Scripting 00:10:00 Interpreted Languages 00:12:00 Section 13: Troubleshooting Operating Systems Windows Recovery Environment 00:05:00 Advanced Windows Startup Options 00:07:00 Troubleshooting Boot Problems 00:10:00 Troubleshooting at the GUI 00:11:00 Troubleshooting Applications 00:07:00 Kernel Panic 00:05:00 Section 14: Display Technologies Resolutions and Aspect Ratios 00:06:00 Multiple Monitors 00:05:00 Section 15: Essentials of Networking Network Card Troubleshooting 00:09:00 Section 16: Local Area Networking Working with Connections 00:09:00 Working with Workgroups 00:08:00 Working with Active Directory 00:14:00 Windows Sharing with Mac and LInux 00:07:00 Net Command 00:04:00 Firewall Configuration 00:11:00 Windows Firewall 00:08:00 Port Forwarding 00:07:00 Section 17: Wireless Networking Wireless Encryption 00:11:00 Enterprise Wireless 00:16:00 Section 18: The Internet Telnet and SSH 00:07:00 Remote Desktop Connections 00:06:00 The World Wide Web 00:09:00 Troubleshooting Internet Connections 00:07:00 Section 19: Portable Computing Power Management 00:11:00 Section 20: Care and Feeding of Mobile Devices Mobile Device Security 00:08:00 Mobile Security Troubleshooting 00:06:00 Mobile Device Troubleshooting 00:10:00 Section 21: Securing Computers Threats 00:10:00 Physical Security 00:08:00 Passwords and Authentication 00:14:00 Malware 00:14:00 Anti-Malware 00:11:00 Social Engineering 00:06:00 Licensing 00:10:00 Incident Response 00:05:00 Environmental Controls 00:06:00 Section 22: Operational Procedures Documents You Need to Know 00:09:00 Data You Need to Know 00:04:00 Change Management 00:06:00 The Zen of Backup 00:11:00 Recycling and Data Destruction 00:07:00
CompTIA A+ 900 Certification is one of our best selling and most popular course. The CompTIA A+ 900 Certification is organised into 55 modules and includes everything you need to become successful in this profession. To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 26 hours! If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Course Content Configuring BIOS Firmware 00:07:00 BIOS Configuration Options 00:25:00 Motherboards Motherboard Sizes Form Factors 00:14:00 The Motherboard 00:12:00 AMD CPU Socket Types 00:11:00 Expansion Slots Expansion Cards 00:13:00 Bus Speeds 00:28:00 RAM Types and Features Memory 00:06:00 Types of RAM 00:07:00 Install and Configure PC Expansion Cards Ports 00:11:00 SCSI Connections 00:14:00 Audio Video Connections 00:26:00 Install and Configure Storage Devices Storage Devices 00:17:00 Hard Drives 00:17:00 Media Capacity 00:21:00 CPU's and Cooling Methods CPU Types and Characteristics 00:14:00 PC Connection Interfaces Physical Connections USB 00:11:00 Physical Connections VGA 00:11:00 Wireless Connections Bluetooth 00:06:00 Power Supplies Power Supply Specifications 00:16:00 Custom Computer Specifications What is a Standard Client 00:13:00 Audio Video Editing Workstations 00:08:00 Installing Displays Display Device Types 00:20:00 Backlighting 00:12:00 PC Connectors DVI to HDMI 00:13:00 Installing Peripheral Standard Input Device Types 00:16:00 Expansion Card Types 00:11:00 Multimedia Devices 00:11:00 Installing Multifunction Devices and SOHO Networks SOHO Networks 00:17:00 WPS 00:16:00 Encryption 00:14:00 Printer Technologies Printers 00:02:00 Printer Technologies Topic B Inkjet Printers 00:13:00 Printer Maintenance Technical Printer Components 00:09:00 Local and Network-Based Printers 00:22:00 Networking Network Interface Card Characteristics 00:20:00 Fiber Optic Cables 00:14:00 Properties and Characteristics of TCP/IP TCP IP 00:14:00 IP Address Classes 00:14:00 Addressing Schemes 00:17:00 TCP vs. UDP Ports 00:09:00 LDAP 00:04:00 Wi-Fi Networking Standards and Encryption Types Standards 00:03:00 Install and Configure SOHO Wireless/Wired Router Setting up your Router 00:10:00 Define Appropriate NAT Policies 00:16:00 Architecture and Internet Connection Types LANs 00:08:00 Network Topologies 00:11:00 ISPs 00:06:00 Networking Tools Cable Testers 00:13:00 Laptop Hardware Components Laptops 00:09:00 Laptop Expansion Options 00:10:00 Auto-Switching and Fixed Input Power Supplies 00:09:00 Mobile Devices What is Mobile Technology 00:09:00 Mobile Device Features 00:09:00 Bluetooth Configuration Method 00:08:00 Mobile Device Ports and Accessories Mobile Device Connection Types 00:10:00 Troubleshooting Mobile Devices 00:11:00 Troubleshooting Theory Troubleshooting Theory 00:16:00 Boot to Incorrect Device 00:16:00 PC Indicator Lights 00:10:00 Repair vs. Replace 00:10:00 Troubleshooting RAID Arrays and Hard Drives Drive and Array Troubleshooting Tools 00:06:00 Common RAID Array Issues 00:17:00 Troubleshooting Video Common Video and Display Issues 00:01:00 Troubleshooting Network Issues Common Network Issues 00:12:00 Troubleshooting Printers Common Printer Troubleshooting Tools 00:14:00 Windows Operating Systems Microsoft Windows 00:12:00 Microsoft Windows Features 00:17:00 Other Operating Systems 00:15:00 Installation Types 00:14:00 Customizing System Options 00:19:00 Command Line Tools The Command Prompt 00:12:00 Microsoft Operating System Features and Tools Administrative Tools 00:41:00 Task Manager 00:28:00 Memory Diagnostic Tool 00:46:00 Control Panel Utilities The Control Panel 00:11:00 Internet Options 00:10:00 Types of User Accounts 00:11:00 Computer My Computer 00:13:00 Permissions 00:31:00 System 00:10:00 Windows Networking on Client Desktops Workgroups 00:20:00 Network Connection Types 00:18:00 Preventative Maintenance Data Backup and Restoration 00:11:00 Scheduling Tasks 00:26:00 Features and Functionality of the Mac OS and Linux Operating Systems Patch Management in Mac OS X and Linux 00:09:00 Screen Sharing 00:06:00 Mac OS Multitouch Gestures - Touchscreen 00:09:00 Client Side Virtualization What is Virtualization 00:08:00 Virtual Desktop Infrastructure 00:12:00 Cloud-based Concepts SaaS (Software as Service) 00:09:00 Network Host Properties Server Roles 00:12:00 Mobile Operating Systems Open Source Software 00:03:00 Mobile Device Network and E-mail Mobile Device Hotspot 00:10:00 Security Malware 00:09:00 Social Engineering 00:13:00 Prevention Methods Physical Security 00:14:00 Hard Drive Sanitation 00:14:00 User Education 00:26:00 Windows Security Settings Users and Groups 00:11:00 Security Best Practices Password Best Practices 00:04:00 Securing Mobile Devices Locks 00:07:00 Troubleshooting Common PC Tools Operating System Troubleshooting Tools 00:12:00 Application Errors 00:16:00 Common Network Issues 00:12:00 Common Security Issues 00:10:00 Common PC Security Issues Browser Issues 00:06:00 Common Mobile Operating Systems Troubleshooting Dim Display 00:09:00 No Sound from Speakers 00:07:00 Common Safety Practices Static Electricity 00:14:00 Electrical Hazards 00:12:00 General Power Issues 00:10:00 Hazardous Material Disposal Procedures 00:07:00 Maintenance Tools and Techniques Professional Conduct 00:11:00 Types of Hardware Toolkits 00:11:00 Hard Drive Self-Tests 00:05:00 Computer Component Maintenance Techniques 00:10:00 Privacy and Licensing Concepts Incident Response 00:08:00 Proper Communication and Professionalism 00:07:00 Set Expectations 00:06:00 Mock Exam Mock Exam- CompTIA A+ 900 Certification 00:20:00 Final Exam Final Exam- CompTIA A+ 900 Certification 00:20:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.