Booking options
£14.99
£14.99
On-Demand course
48 hours
All levels
As an IT administrator, you will be responsible for maintaining the company's IT network, servers, security systems and other essential tasks. Enrolling in the IT Administrator Diploma will give you the opportunity to build a solid base from which to start, or further, your career in IT field. The knowledge acquired from the course will prepare you to begin a career in IT as it provides you with a comprehensive understanding of Information Technology.
In this IT Administrator Diploma, you will learn to recognise computer components, including how to install software and establish network connectivity accurately.
Keep in mind that it is hardly ever possible to undertake security issues without relevant knowledge and proper supervision. This course teaches you how to anticipate security risks as well as identify compatibility issues in a reachable way possible. Furthermore, you will also enhance your knowledge about preventative maintenance that will help you stand out from your competition when you are hunting for your desired job.
There's plenty in this course to take advantage of, and it will provide you with a stimulating and insightful description of the ways in which you will confidently perform the maintenance, configuration, and reliable operation of computer systems.
This course is available to all learners, of all academic backgrounds.
Learners should be aged 16 or over to undertake the qualification.
Good understanding of English language, numeracy and ICT are required to attend this course.
At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam.
After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Affordable, engaging & high-quality e-learning study materials;
Tutorial videos/materials from the industry leading experts;
Study in a user-friendly, advanced online learning platform;
Efficient exam systems for the assessment and instant result;
The UK & internationally recognized accredited qualification;
Access to course content on mobile, tablet or desktop from anywhere anytime;
The benefit of career advancement opportunities;
24/7 student support via email.
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
Software: | |||
What is an Operating System | FREE | 00:48:00 | |
Configuring the Operating System | 00:06:00 | ||
What is an Application | 00:10:00 | ||
Using Control Panel | 00:18:00 | ||
Software and Concepts | 00:10:00 | ||
Licensing | 00:06:00 | ||
Using Software | 00:07:00 | ||
Software Tools | 00:10:00 | ||
Software | 00:14:00 | ||
Hardware, Devices, and Peripherals | 00:06:00 | ||
Hardware: | |||
Hardware and Peripherals | 00:07:00 | ||
Storage | 00:12:00 | ||
Connectivity Devices | 00:05:00 | ||
Network Components | 00:09:00 | ||
Identify the Importance of Risk Management | FREE | 00:11:00 | |
Assess Risk | 00:13:00 | ||
Mitigate Risk | 00:22:00 | ||
Integrate Documentation into Risk Management | 00:14:00 | ||
Classify Threats and Threat Profiles | 00:07:00 | ||
Perform Ongoing Threat Research | 00:12:00 | ||
Resources that Aid in Research of Threats | 00:03:00 | ||
Implement Threat Modeling | 00:09:00 | ||
Assess the Impact of Reconnaissance Incidents | 00:10:00 | ||
Performing Reconnaissance on a Network | 00:07:00 | ||
Examining Reconnaissance Incidents | 00:08:00 | ||
Assess the Impact of Social Engineering | 00:10:00 | ||
Assessing the impact of Social Engineering | 00:07:00 | ||
Assessing the Impact of Phishing | 00:03:00 | ||
Types of Wireless Attacks | 00:30:00 | ||
Intrusion Monitoring | 00:08:00 | ||
Wireless Security Risks | 00:22:00 | ||
Authentication Attacks | 00:20:00 | ||
Rogue Devices | 00:04:00 | ||
Public Hotspots | 00:06:00 | ||
Wireless Security Monitoring | 00:21:00 | ||
Device Tracking | 00:17:00 | ||
WLAN Security Infrastructure | 00:37:00 | ||
Management Protocols | 00:23:00 | ||
Other RADIUS Solutions | 00:15:00 | ||
Security: | |||
Introduction | 00:30:00 | ||
Child Safety Online | 01:00:00 | ||
Secure Payment Sites | 01:00:00 | ||
Online Banking | 00:30:00 | ||
How To Keep Your Password Safe | 00:30:00 | ||
Common Scams | 01:00:00 | ||
How I Got Pharmed | 01:00:00 | ||
Virus Protection | 01:00:00 | ||
Self Maintenance | 00:30:00 | ||
Personal Information Online | 01:00:00 | ||
Is The Internet Safe? | 00:30:00 | ||
Importance of Cyber Security | 00:30:00 | ||
Spyware Can Destroy | 00:30:00 | ||
How Does Spyware Spread? | 01:00:00 | ||
How To Remove Spyware | 01:00:00 | ||
Anti Spyware Program | 01:00:00 | ||
The Anti Anti-Spyware Programs | 00:30:00 | ||
Research And Learn More | 00:30:00 | ||
Choosing The Best Anti Spyware Tool | 01:00:00 | ||
Computer Security And Spyware | 01:00:00 | ||
The Programs To Avoid | 00:15:00 | ||
Is It Legal? | 00:30:00 | ||
Checklist Of Protection | 00:15:00 | ||
The Information Security Cycle | FREE | 00:37:00 | |
Information Security Controls | 00:35:00 | ||
Authentication Methods | 00:09:00 | ||
Cryptography Fundamentals | 00:56:00 | ||
Security Policy Fundamentals | 00:11:00 | ||
Social Engineering | 00:31:00 | ||
Malware | 00:25:00 | ||
Software-Based Threats | 00:21:00 | ||
Based Threats | 00:38:00 | ||
Wireless Threats and Vulnerabilities | 00:43:00 | ||
Physical Threats and Vulnerabilities | 00:09:00 | ||
Manage Data Security | 00:47:00 | ||
Manage Application Security | 00:56:00 | ||
Manage Device and Host Security | 01:07:00 | ||
Manage Mobile Security | 00:10:00 | ||
A Risk Analysis | 00:17:00 | ||
Implement Vulnerability Assessment Tools and Techniques | 00:04:00 | ||
Scan for Vulnerabilities | 00:27:00 | ||
Mitigation and Deterrent Techniques | 00:19:00 | ||
Respond to Security Incidents | 00:23:00 | ||
Recover from a Security Incident | 00:09:00 | ||
Networking: | |||
OSI Layers | FREE | 00:44:00 | |
LANs and WANs | 00:14:00 | ||
Network Types | 00:07:00 | ||
Transmissions | 00:36:00 | ||
Cables | 00:41:00 | ||
Fiber Optics | 00:16:00 | ||
Converters and Connectors | 00:26:00 | ||
Wireless Security | 00:15:00 | ||
Authentication.prproj | 00:21:00 | ||
Wireless Security Threats | 00:30:00 | ||
TACACS | 00:10:00 | ||
Keys | 00:26:00 | ||
RADIUS | 00:06:00 | ||
VPN Technologies | 00:16:00 | ||
Tunneling Protocols.prproj | 00:05:00 | ||
Acceptable Use | 00:59:00 | ||
Common Problems | 00:32:00 | ||
Troubleshooting | 00:27:00 | ||
Network Technician Tools | 00:46:00 | ||
Physical and Logical Issues | 00:19:00 | ||
Open or Closed Ports | 00:09:00 | ||
ARP Issues | 00:13:00 | ||
Basic IT Literacy: | |||
Core Concepts in Healthcare IT | FREE | 00:06:00 | |
EMR EHR Issues | 00:04:00 | ||
Regulations, Standards, and Stakeholders | 00:13:00 | ||
HIPAA Controls and Compliance | 00:07:00 | ||
Roles and Responsibilities | 00:09:00 | ||
Manage Communication and Ethics Issues | 00:15:00 | ||
Legal Best Practices, Requirements, and Documentation | 00:09:00 | ||
Medical Document Imaging | 00:04:00 | ||
Sanitation Management | 00:02:00 | ||
Computing Essentials | 00:05:00 | ||
Networking | 00:32:00 | ||
Manage Servers and Software | 00:27:00 | ||
Hardware Support | 00:14:00 | ||
Set Up a Workstation | 00:08:00 | ||
Troubleshoot Basic IT Issues | 00:15:00 | ||
Troubleshoot Medical IT Issues | 00:19:00 | ||
Implementation of an EMR EHR System | 00:34:00 | ||
Change Control | 00:07:00 | ||
Manage Physical and Logical Security | 00:36:00 | ||
Implement Security Best Practices and Threat Mitigation Techniques | 00:13:00 | ||
Manage Remote Access | 00:06:00 | ||
Manage Wireless Security | 00:14:00 | ||
Perform Backups and Disaster Recovery | 00:18:00 | ||
Mock Exam | |||
Mock Exam- IT Administrator Diploma | 00:30:00 | ||
Final Exam | |||
Final Exam- IT Administrator Diploma | 00:30:00 | ||
Certificate and Transcript | |||
Order Your Certificates and Transcripts | 00:00:00 |