This interactive course will help you to gain a solid understanding of cryptography. With the help of engaging activities and examples, you'll be familiarized with different security certificates and become confident in deploying PKI on Windows Servers.
Ignite your dynamic career and strengthen your deep insight knowledge by signing up for Information Governance Course. This Information Governance Course is the ideal approach for you to obtain a thorough understanding and knowledge of the subject. We are concerned about the progression of your career. Therefore, after conducting extensive studies and consulting with experienced personnel, we formulated this outstanding course to improve your pertinent skills. In this easy-to-digest Information Governance Course, you will get exclusive training, which will enable you to stand out in this competitive market. However, the Information Governance Course covers all of the recent materials in order to keep you up to date with the job market and make you a good fit for your career. This top-notch course curriculum comprises basic to advanced levels of modules that will increase your skillsets. After completing this Programme, you will attain the productivity to succeed in your organisation. So, if you are eager to see yourself in a gratifying career, then enrol in our course today! What will make you stand out? On completion of this online course, you will gain: CPD QS Accredited After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials. The online test with immediate results You can study and complete the course at your own pace. Study for the course using any internet-connected device, such as a computer, tablet, or mobile device. The substantial Information Governance Course is designed to help you demonstrate the preliminary to in-depth level of learning regarding this topic. Moreover, you will be provided with the most knowledgeable and informative modules for your lifetime by enrolling in this course just once. Furthermore, as you proceed through the modules of this course, you will discover the fundamentals of Information Governance Course and explore the key topics such as: Information Governance Course Module 01: Basics Of GDPR Module 02: Principles of GDPR Module 03: Legal Foundation for Processing Module 04: Rights of Individuals Module 05: Accountability and Governance Module 06: Data Protection Officer Module 07: Security Of Data Module 08: Personal Data Breaches Module 09: International Data Transfers After the Brexit Module 10: Exemptions - Part One Module 11: Exemptions - Part Two Module 12: National Security and Defence Therefore, reinforce your knowledge and furnish your skills by enrolling in our course. Take one step closer to achieving your goal. Show off your new skills with a certificate of completion Once you complete the Information Governance Course, you will be eligible to request a digital certificate for free. For Printed Transcript & Hardcopy Certificate- 4.99 GBP (Inside the UK Postal Fee) 8.99 GBP (International Delivery Fee) CPD 15 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This Information Governance Course Course the Right Option for You? This course is recommended for anyone who is interested in learning more about this topic. You'll learn the fundamental ideas and gain a comprehensive understanding of the topic by taking this Information Governance Course. Requirements Without any formal requirements, you can delightfully enrol in this course. Career path The aim of this exclusive Information Governance Course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.
Course Overview: About 87% of global consumers use at least one computer or device to access the internet daily. Mastering the essentials of computer and the internet is crucial in today’s digital age. The Learning Computer and Internet Level 2 course provides an in-depth exploration of computer systems, internet functionalities, and software applications, offering you the knowledge to navigate the digital world with ease. This course covers a wide range of computer-related topics, from fundamental operating systems and hardware to advanced concepts like cybersecurity and data protection. With engaging, interactive content, you’ll gain practical skills and insights that enhance your computer proficiency and digital competence. Embark on an enlightening journey through the digital landscape. Enrol in Learning Computer and Internet Level 2 today and elevate your computer skills to thrive in a connected world! Key Features of the Course: FREE Learning Computer and Internet Level 2 CPD-accredited certificate Get a free student ID card with Learning Computer and Internet Level 2 training (£10 applicable for international delivery) Lifetime access to the Learning Computer and Internet Level 2 course materials The Learning Computer and Internet Level 2 program comes with 24/7 tutor support Get instant access to this Learning Computer and Internet Level 2 course Learn Learning Computer and Internet Level 2 training from anywhere in the world The Learning Computer and Internet Level 2 training is affordable and simple to understand The Learning Computer and Internet Level 2 training is entirely online Who is This Course For? This course is designed for individuals seeking to build upon foundational knowledge of computer and the internet. Whether a student, professional, or enthusiast, this course will elevate your proficiency. Learning Outcome Grasp the intricacies of various operating systems and their configurations. Understand the diverse range of applications and their functionalities. Navigate through storage solutions, network components, and software tools. Comprehend the concept of licensing and its implications. Become adept in word processing, spreadsheets, and creating presentations. Learn the terminologies of networking, ensuring smooth connectivity. Safeguard yourself online and understand the fundamentals of digital security. Acquire skills to use browsers, e-mails, and collaborative platforms effectively. Why Enrol in This Course: Enrolling in "Learning Computer and Internet Level 2" is your gateway to a world of opportunities and possibilities. You will develop essential skills in high demand across various industries, making you a valuable asset in the job market. Our course is top-reviewed, recently updated to reflect the latest trends, and aligns with the evolving digital landscape, ensuring you stay ahead in the digital race. Requirements: Enrolling in this Learning Computer and Internet Level 2 course requires a basic understanding of computer usage. No prior technical knowledge is needed, making it accessible to beginners and those looking to refresh their skills. Career Path: Upon completing this Learning Computer and Internet Level 2 course, you'll be well-equipped to pursue various professions in the digital domain. Here are seven course-related professions in the UK, along with their average salaries: IT Support Specialist: £25,000 - £40,000 per year Data Entry Clerk: £18,000 - £25,000 per year Digital Marketing Assistant: £20,000 - £30,000 per year Office Administrator: £18,000 - £25,000 per year Cybersecurity Analyst: £30,000 - £50,000 per year Web Developer: £25,000 - £45,000 per year Database Administrator: £30,000 - £50,000 per year Certification: Upon completing the Learning Computer and Internet Level 2 course, learners will be awarded a CPD certificate, validating their enhanced knowledge of computer and the Internet. Course Curriculum 6 sections • 81 lectures • 22:23:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Backup and Restore: 00:03:00 •Application Features: 01:21:00 •Working with Word Processing: 00:44:00 •Working with Spreadsheets: 00:49:00 •Making a Presentation: 01:08:00 •Databases: 00:34:00 •Collaboration: 00:03:00 •Course Introduction: 00:02:00 •Web Browsers: 00:46:00 •Networking Terminology: 00:35:00 •E-mail: 00:38:00 •Communicating in the Modern World: 00:14:00 •Protecting Yourself: 00:15:00 •Web Searching: 00:31:00 •Protecting Yourself: 00:31:00 •Identify Components of a Personal Computer IPU: 00:08:00 •Sign In to Windows 8: 00:07:00 •Signing In to Windows 8 and Managing Tiles: 00:08:00 •Navigate the Start Screen: 00:18:00 •Using the Account ID Menu: 00:02:00 •Access and Identify the Charms: 00:03:00 •Viewing the Charms: 00:02:00 •Modern Apps and Common Navigation Features: 00:03:00 •Navigating a Modern App: 00:07:00 •Multitasking with Apps: 00:05:00 •Working with Multiple Apps: 00:05:00 •Navigate the Desktop IPU: 00:07:00 •Navigating The desktop: 00:07:00 •Manage Files and Folders with File Explorer IPU: 00:09:00 •Managing Files and Folders: 00:15:00 •Elements of a Desktop Window: 00:12:00 •Working with the Elements of a Desktop Window: 00:10:00 •Creating and Modifying Files with Wordpad: 00:14:00 •Printing a Document: 00:05:00 •Navigate Internet Explorer 10: 00:08:00 •Navigating Internet Explorer 10: 00:09:00 •Browse the Web: 00:12:00 •Using Internet Explorer and Share: 00:08:00 •Customize the Start Screen: 00:07:00 •Creating Groups on the Start Screen: 00:03:00 •Changing PC Setting: 00:07:00 •Customize the Desktop IPU: 00:09:00 •Personalizing the Desktop: 00:11:00 •Set Privacy Levels and Passwords: 00:05:00 •Changing Your Password: 00:05:00 •Use Windows Defender IPU: 00:05:00 •Changing Windows Defender Settings: 00:06:00 •Store and Share Files with SkyDrive: 00:03:00 •What Makes Windows 10 Different?: 00:14:00 •Primary Feature Overview: 00:14:00 •Navigating and Using Windows 10: 00:36:00 •Course Overview: 00:13:00 •Types of Security Threats: 00:29:00 •Social Engineering: 00:30:00 •Identity Theft: 00:29:00 •Data Classification: 00:28:00 •Types of Classifications: 00:18:00 •Protecting Your Digital Information: 00:45:00 •Password Management: 00:13:00 •Malware: 00:17:00 •Software Detection: 00:28:00 •Security from End-to-End: 00:26:00 •Secure E-mail Use: 00:21:00 •Secure Web Browsing: 00:29:00 •Piracy: 00:16:00 •Security Policies: 00:18:00 •Moving Forward: 00:12:00
Cyber Security Online Training Course
Overview This comprehensive course on CompTIA Network (N10-007) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Network (N10-007) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Network (N10-007). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Network (N10-007) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 172 lectures • 22:43:00 total length •Introduction: 00:03:00 •What is a Model?: 00:02:00 •OSI vs. TCP/IP Model: 00:07:00 •Walking Through OSI and TCP/IP: 00:12:00 •Meet the Frame: 00:06:00 •The MAC Address: 00:07:00 •Broadcast vs. Unicast: 00:04:00 •Introduction to IP Addressing: 00:08:00 •Packets and Ports: 00:05:00 •Network Topologies: 00:10:00 •Coaxial Cabling: 00:05:00 •Twisted Pair Cabling: 00:06:00 •Cat Ratings: 00:06:00 •Fiber Optic Cabling: 00:09:00 •Fire Ratings: 00:05:00 •Legacy Network Connections: 00:07:00 •What is Ethernet?: 00:07:00 •Ethernet Frames: 00:07:00 •Early Ethernet: 00:08:00 •The Daddy of Ethernet, 10BaseT: 00:03:00 •Terminating Twisted Pair: 00:14:00 •Hubs vs. Switches: 00:13:00 •100BaseT: 00:05:00 •Connecting Switches: 00:05:00 •Gigabit Ethernet and 10-Gigabit Ethernet: 00:05:00 •Transceivers: 00:07:00 •Connecting Ethernet Scenarios: 00:14:00 •Introduction to Structured Cabling: 00:04:00 •Terminating Structured Cabling: 00:08:00 •Equipment Room: 00:07:00 •Alternative Distribution Panels: 00:04:00 •Testing Cable: 00:09:00 •Troubleshooting Structured Cabling, Part 1: 00:05:00 •Troubleshooting Structured Cabling, Part 2: 00:05:00 •Using a Toner and Probe: 00:03:00 •Wired Connection Scenarios: 00:11:00 •Introduction to IP Addressing and Binary: 00:13:00 •Introduction to ARP: 00:04:00 •Classful Addressing: 00:10:00 •Subnet Masks: 00:12:00 •Subnetting with CIDR: 00:10:00 •More CIDR Subnetting Practice: 00:10:00 •Dynamic and Static IP Addressing: 00:18:00 •Rogue DHCP Servers: 00:07:00 •Special IP Addresses: 00:07:00 •IP Addressing Scenarios: 00:15:00 •Introducing Routers: 00:15:00 •Understanding Ports: 00:05:00 •Network Address Translation: 00:06:00 •Implementing NAT: 00:03:00 •Forwarding Ports: 00:18:00 •Tour of a SOHO Router: 00:12:00 •SOHO vs. Enterprise: 00:09:00 •Static Routes: 00:13:00 •Dynamic Routing: 00:11:00 •RIP: 00:04:00 •OSPF: 00:04:00 •BGP: 00:06:00 •TCP and UDP: 00:07:00 •ICMP and IGMP: 00:06:00 •Handy Tools: 00:07:00 •Introduction to Wireshark: 00:11:00 •Introduction to netstat: 00:09:00 •Web Servers: 00:12:00 •FTP: 00:12:00 •E-mail Servers and Clients: 00:09:00 •Securing E-mail: 00:06:00 •Telnet and SSH: 00:09:00 •Network Time Protocol: 00:02:00 •Network Service Scenarios: 00:10:00 •Understanding DNS: 00:12:00 •Applying DNS: 00:19:00 •The Hosts File: 00:04:00 •Net Command: 00:08:00 •Windows Name Resolution: 00:11:00 •Dynamic DNS: 00:05:00 •DNS Troubleshooting: 00:13:00 •Making TCP/IP Secure: 00:04:00 •Symmetric Encryption: 00:06:00 •Asymmetric Encryption: 00:03:00 •Cryptographic Hashes: 00:05:00 •Identification: 00:00:00 •Access Control: 00:04:00 •AAA: 00:05:00 •Kerberos/EAP: 00:00:00 •Single Sign-On: 00:10:00 •Certificates and Trust: 00:14:00 •Certificate Error Scenarios: 00:08:00 •Understanding IP Tunneling: 00:06:00 •Virtual Private Networks: 00:13:00 •Introduction to VLANs: 00:12:00 •InterVLAN Routing: 00:03:00 •Interfacing with Managed Switches: 00:11:00 •Switch Port Protection: 00:07:00 •Port Bonding: 00:07:00 •Port Mirroring: 00:04:00 •Quality of Service: 00:05:00 •IDS vs. IPS: 00:04:00 •Proxy Servers: 00:13:00 •Load Balancing: 00:09:00 •Device Placement Scenarios: 00:13:00 •Introduction to IPv6: 00:13:00 •IPv6 Addressing: 00:15:00 •IPv6 in Action: 00:13:00 •IPv4 and IPv6 Tunneling: 00:05:00 •Telephony Technologies: 00:09:00 •Optical Carriers: 00:03:00 •Packet Switching: 00:05:00 •Connecting with Dial-up: 00:05:00 •Digital Subscriber Line (DSL): 00:05:00 •Connecting with Cable Modems: 00:04:00 •Connecting with Satellites: 00:03:00 •ISDN and BPL: 00:04:00 •Remote Desktop Connectivity: 00:05:00 •Advanced Remote Control Systems: 00:09:00 •Introduction to 802.11: 00:12:00 •802.11 Standards: 00:12:00 •Power over Ethernet (PoE): 00:04:00 •Antennas: 00:09:00 •Wireless Security Standards: 00:16:00 •Implementing Wireless Security: 00:07:00 •Threats to Your Wireless Network: 00:07:00 •Retro Threats: 00:05:00 •Wi-Fi Protected Setup (WPS): 00:05:00 •Enterprise Wireless: 00:06:00 •Installing a Wireless Network: 00:15:00 •Wireless Scenarios: 00:07:00 •More Wireless Scenarios: 00:09:00 •Virtualization Basics: 00:07:00 •Cloud Ownership: 00:03:00 •Cloud Implementation: 00:12:00 •Your First Virtual Machine: 00:09:00 •NAS and SAN: 00:16:00 •Platform as a Service (PaaS): 00:09:00 •Software as a Service (SaaS): 00:03:00 •Infrastructure as a Service (IaaS): 00:10:00 •Cellular Technologies: 00:05:00 •Mobile Connectivity: 00:07:00 •Deploying Mobile Devices: 00:05:00 •Mobile Access Control: 00:06:00 •Network Types: 00:04:00 •Network Design: 00:10:00 •Power Management: 00:06:00 •Unified Communications: 00:11:00 •Network Documentation: 00:07:00 •Contingency Planning: 00:10:00 •Predicting Hardware Failure: 00:05:00 •Backups: 00:08:00 •What is Risk Management?: 00:06:00 •Security Policies: 00:08:00 •Change Management: 00:07:00 •User Training: 00:03:00 •Standard Business Documentation: 00:05:00 •Mitigating Network Threats: 00:05:00 •High Availability: 00:05:00 •Denial of Service: 00:09:00 •Malware: 00:10:00 •Social Engineering: 00:04:00 •Access Control: 00:08:00 •Man-in-the-Middle: 00:22:00 •Introduction to Firewalls: 00:05:00 •Firewalls: 00:10:00 •DMZ: 00:06:00 •Hardening Devices: 00:14:00 •Physical Security Controls: 00:09:00 •Testing Network Security: 00:08:00 •Network Protection Scenarios: 00:14:00 •SNMP: 00:15:00 •Documenting Logs: 00:09:00 •System Monitoring: 00:08:00 •SIEM (Security Information and Event Management): 00:07:00 •Network Troubleshooting Theory: 00:05:00
Supporting Microsoft SQL server course description A concise hands on course enabling delegates to manage and administer a Microsoft SQL server database. What will you learn Install SQL server. Backup SQL server databases. Recover SQL server databases. Secure SQL server databases. Perform routine maintenance. Automate tasks. Supporting Microsoft SQL server course details Who will benefit: Anyone working with Microsoft SQL server Prerequisites: Supporting Windows server. Duration 3 days Supporting Microsoft SQL server course contents SQL server introduction Platform, Tools, services. Installation. Creating databases. Backups Back up types, transaction logging, restoring from a backup: Full database, individual files. Security Users, server roles, database roles. Permissions. Monitoring Routine database maintenance. Performance data. Jobs and alerts The SQL server agent, database mail, alerts, jobs.
This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.
Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke security environment. Describe the function of the Cloud Management Extension. Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in AWS. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in AWS. Describe the workflow for configuring scaling solutions in AWS. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in AWS. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in AWS. Explain the steps required for troubleshooting Scaling Solution issues in AWS. Describe the steps required for troubleshooting clusters in AWS. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Create an SSH Key Pair. Create a VPC. Deploy an SMS. Connect to SmartConsole. Review the IAM Role. Configure the Cloud Management Extension. Configure the Access Control Policy. Create the AWS Data Center Object. Create Access Control Policy with a Data Center Object. Create the AWS VPC Spokes. Deploy the Web Servers into the Spoke VPCs. Create the AWS Auto Scale Deployment. Create the External and Internal Load Balancers. Create the VPC for the Auto Scale Deployment. Create the VPC Peers. Deploy the CloudGuard Cluster Template. Create the AWS VPN Gateway. Configure the Tunnel Interfaces. Configure the Static Routes. Configure the Network Objects. Configure the VPN Community. Configure the Security Policy. Test the Traffic. Troubleshoot the CloudGuard Controller. Debug the CloudGuard Controller. Debug the Cloud Management Extension Additional course details: Nexus Humans CNSE-AWS Check Point Network Security Expert for AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-AWS Check Point Network Security Expert for AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort
Overview This comprehensive course on CompTIA A+ (220-1002) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA A+ (220-1002) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA A+ (220-1002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA A+ (220-1002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Course Curriculum 22 sections • 106 lectures • 14:51:00 total length •CompTIA A+ 2019 Core 2 (220-1002) Course Introduction: 00:02:00 •What is the CompTIA A+: 00:02:00 •Why Get A+ Certified?: 00:03:00 •What is on the CompTIA A+ Core 2 (220-1002) Exam?: 00:04:00 •How to Pass the CompTIA A+ Exam: 00:04:00 •How to use this Video Course: 00:03:00 •Professional Communication Part 1: 00:06:00 •Professional Communication Part 2: 00:07:00 •Physical Safety: 00:07:00 •What is an Operating System?: 00:09:00 •Users and Super Users: 00:05:00 •Why Windows?: 00:08:00 •Windows Editions and Versions: 00:12:00 •Touring the macOS: 00:06:00 •Touring Linux: 00:08:00 •32-Bit vs. 64-Bit Processing: 00:12:00 •Virtual Memory: 00:06:00 •Power Protection: 00:10:00 •Understanding Partitioning: 00:04:00 •MBR Partitioning: 00:12:00 •GPT Partitioning: 00:09:00 •Understanding File Systems: 00:12:00 •Popular File Systems: 00:07:00 •Formatting in Action: 00:11:00 •Dynamic Disks: 00:09:00 •Software RAID in Storage Spaces: 00:10:00 •Encrypting Mass Storage: 00:09:00 •Boot from Everything: 00:12:00 •Installing Windows: 00:12:00 •Post-Installation Tasks: 00:12:00 •Windows Installation options: 00:07:00 •What is the Registry?: 00:11:00 •Processes: 00:07:00 •Services: 00:04:00 •Your Windows Toolset: 00:08:00 •Windows 7 Task Manager: 00:09:00 •Windows 10 Task Manager: 00:06:00 •Information and Configuration Tools: 00:11:00 •Performance Monitor: 00:12:00 •Event Viewer: 00:07:00 •Tools for Programmers: 00:08:00 •Introduction to Users and Groups: 00:06:00 •Managing Users and Groups: 00:12:00 •NTFS Permissions: 00:08:00 •Linux and macOS Permissions: 00:05:00 •File Explorer: 00:14:00 •Sharing Resources: 00:11:00 •Security Policies: 00:08:00 •Patch Management: 00:11:00 •Working with Disks: 00:06:00 •Working with Applications: 00:07:00 •System Restore: 00:05:00 •Backing up Your Files: 00:07:00 •Task Scheduler: 00:07:00 •Understanding the CLI: 00:11:00 •Navigating the CLI: 00:14:00 •Working with Folders: 00:07:00 •Working with Files: 00:11:00 •Working with Drives: 00:13:00 •Super Copy Commands: 00:09:00 •Advanced Windows Command Line: 00:08:00 •Advanced Linux Commands: 00:13:00 •Command-Line Permissions: 00:08:00 •Introduction to Scripting: 00:10:00 •Interpreted Languages: 00:12:00 •Windows Recovery Environment: 00:05:00 •Advanced Windows Startup Options: 00:07:00 •Troubleshooting Boot Problems: 00:10:00 •Troubleshooting at the GUI: 00:11:00 •Troubleshooting Applications: 00:07:00 •Kernel Panic: 00:05:00 •Resolutions and Aspect Ratios: 00:06:00 •Multiple Monitors: 00:05:00 •Network Card Troubleshooting: 00:09:00 •Working with Connections: 00:09:00 •Working with Workgroups: 00:08:00 •Working with Active Directory: 00:14:00 •Windows Sharing with Mac and LInux: 00:07:00 •Net Command: 00:04:00 •Firewall Configuration: 00:11:00 •Windows Firewall: 00:08:00 •Port Forwarding: 00:07:00 •Wireless Encryption: 00:11:00 •Enterprise Wireless: 00:16:00 •Telnet and SSH: 00:07:00 •Remote Desktop Connections: 00:06:00 •The World Wide Web: 00:09:00 •Troubleshooting Internet Connections: 00:07:00 •Power Management: 00:11:00 •Mobile Device Security: 00:08:00 •Mobile Security Troubleshooting: 00:06:00 •Mobile Device Troubleshooting: 00:10:00 •Threats: 00:10:00 •Physical Security: 00:08:00 •Passwords and Authentication: 00:14:00 •Malware: 00:14:00 •Anti-Malware: 00:11:00 •Social Engineering: 00:06:00 •Licensing: 00:10:00 •Incident Response: 00:05:00 •Environmental Controls: 00:06:00 •Documents You Need to Know: 00:09:00 •Data You Need to Know: 00:04:00 •Change Management: 00:06:00 •The Zen of Backup: 00:11:00 •Recycling and Data Destruction: 00:07:00