• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

IT Administrator Diploma

IT Administrator Diploma

By John Academy

4.3(43)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 48 hours

  • All levels

Description

As an IT administrator, you will be responsible for maintaining the company's IT network, servers, security systems and other essential tasks. Enrolling in the IT Administrator Diploma will give you the opportunity to build a solid base from which to start, or further, your career in IT field. The knowledge acquired from the course will prepare you to begin a career in IT as it provides you with a comprehensive understanding of Information Technology.

Description

In this IT Administrator Diploma, you will learn to recognise computer components, including how to install software and establish network connectivity accurately.

Keep in mind that it is hardly ever possible to undertake security issues without relevant knowledge and proper supervision. This course teaches you how to anticipate security risks as well as identify compatibility issues in a reachable way possible. Furthermore, you will also enhance your knowledge about preventative maintenance that will help you stand out from your competition when you are hunting for your desired job.

There's plenty in this course to take advantage of, and it will provide you with a stimulating and insightful description of the ways in which you will confidently perform the maintenance, configuration, and reliable operation of computer systems.

Entry Requirement:
  • This course is available to all learners, of all academic backgrounds.

  • Learners should be aged 16 or over to undertake the qualification.

  • Good understanding of English language, numeracy and ICT are required to attend this course.

Assessment:
  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.

  • Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam.

Certification:

After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Why choose us?
  • Affordable, engaging & high-quality e-learning study materials;

  • Tutorial videos/materials from the industry leading experts;

  • Study in a user-friendly, advanced online learning platform;

  • Efficient exam systems for the assessment and instant result;

  • The UK & internationally recognized accredited qualification;

  • Access to course content on mobile, tablet or desktop from anywhere anytime;

  • The benefit of career advancement opportunities;

  • 24/7 student support via email.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Software:

What is an Operating System

FREE

00:48:00

Configuring the Operating System

00:06:00

What is an Application

00:10:00

Using Control Panel

00:18:00

Software and Concepts

00:10:00

Licensing

00:06:00

Using Software

00:07:00

Software Tools

00:10:00

Software

00:14:00

Hardware, Devices, and Peripherals

00:06:00

Hardware:

Hardware and Peripherals

00:07:00

Storage

00:12:00

Connectivity Devices

00:05:00

Network Components

00:09:00

Identify the Importance of Risk Management

FREE

00:11:00

Assess Risk

00:13:00

Mitigate Risk

00:22:00

Integrate Documentation into Risk Management

00:14:00

Classify Threats and Threat Profiles

00:07:00

Perform Ongoing Threat Research

00:12:00

Resources that Aid in Research of Threats

00:03:00

Implement Threat Modeling

00:09:00

Assess the Impact of Reconnaissance Incidents

00:10:00

Performing Reconnaissance on a Network

00:07:00

Examining Reconnaissance Incidents

00:08:00

Assess the Impact of Social Engineering

00:10:00

Assessing the impact of Social Engineering

00:07:00

Assessing the Impact of Phishing

00:03:00

Types of Wireless Attacks

00:30:00

Intrusion Monitoring

00:08:00

Wireless Security Risks

00:22:00

Authentication Attacks

00:20:00

Rogue Devices

00:04:00

Public Hotspots

00:06:00

Wireless Security Monitoring

00:21:00

Device Tracking

00:17:00

WLAN Security Infrastructure

00:37:00

Management Protocols

00:23:00

Other RADIUS Solutions

00:15:00

Security:

Introduction

00:30:00

Child Safety Online

01:00:00

Secure Payment Sites

01:00:00

Online Banking

00:30:00

How To Keep Your Password Safe

00:30:00

Common Scams

01:00:00

How I Got Pharmed

01:00:00

Virus Protection

01:00:00

Self Maintenance

00:30:00

Personal Information Online

01:00:00

Is The Internet Safe?

00:30:00

Importance of Cyber Security

00:30:00

Spyware Can Destroy

00:30:00

How Does Spyware Spread?

01:00:00

How To Remove Spyware

01:00:00

Anti Spyware Program

01:00:00

The Anti Anti-Spyware Programs

00:30:00

Research And Learn More

00:30:00

Choosing The Best Anti Spyware Tool

01:00:00

Computer Security And Spyware

01:00:00

The Programs To Avoid

00:15:00

Is It Legal?

00:30:00

Checklist Of Protection

00:15:00

The Information Security Cycle

FREE

00:37:00

Information Security Controls

00:35:00

Authentication Methods

00:09:00

Cryptography Fundamentals

00:56:00

Security Policy Fundamentals

00:11:00

Social Engineering

00:31:00

Malware

00:25:00

Software-Based Threats

00:21:00

Based Threats

00:38:00

Wireless Threats and Vulnerabilities

00:43:00

Physical Threats and Vulnerabilities

00:09:00

Manage Data Security

00:47:00

Manage Application Security

00:56:00

Manage Device and Host Security

01:07:00

Manage Mobile Security

00:10:00

A Risk Analysis

00:17:00

Implement Vulnerability Assessment Tools and Techniques

00:04:00

Scan for Vulnerabilities

00:27:00

Mitigation and Deterrent Techniques

00:19:00

Respond to Security Incidents

00:23:00

Recover from a Security Incident

00:09:00

Networking:

OSI Layers

FREE

00:44:00

LANs and WANs

00:14:00

Network Types

00:07:00

Transmissions

00:36:00

Cables

00:41:00

Fiber Optics

00:16:00

Converters and Connectors

00:26:00

Wireless Security

00:15:00

Authentication.prproj

00:21:00

Wireless Security Threats

00:30:00

TACACS

00:10:00

Keys

00:26:00

RADIUS

00:06:00

VPN Technologies

00:16:00

Tunneling Protocols.prproj

00:05:00

Acceptable Use

00:59:00

Common Problems

00:32:00

Troubleshooting

00:27:00

Network Technician Tools

00:46:00

Physical and Logical Issues

00:19:00

Open or Closed Ports

00:09:00

ARP Issues

00:13:00

Basic IT Literacy:

Core Concepts in Healthcare IT

FREE

00:06:00

EMR EHR Issues

00:04:00

Regulations, Standards, and Stakeholders

00:13:00

HIPAA Controls and Compliance

00:07:00

Roles and Responsibilities

00:09:00

Manage Communication and Ethics Issues

00:15:00

Legal Best Practices, Requirements, and Documentation

00:09:00

Medical Document Imaging

00:04:00

Sanitation Management

00:02:00

Computing Essentials

00:05:00

Networking

00:32:00

Manage Servers and Software

00:27:00

Hardware Support

00:14:00

Set Up a Workstation

00:08:00

Troubleshoot Basic IT Issues

00:15:00

Troubleshoot Medical IT Issues

00:19:00

Implementation of an EMR EHR System

00:34:00

Change Control

00:07:00

Manage Physical and Logical Security

00:36:00

Implement Security Best Practices and Threat Mitigation Techniques

00:13:00

Manage Remote Access

00:06:00

Manage Wireless Security

00:14:00

Perform Backups and Disaster Recovery

00:18:00

Mock Exam

Mock Exam- IT Administrator Diploma

00:30:00

Final Exam

Final Exam- IT Administrator Diploma

00:30:00

Certificate and Transcript

Order Your Certificates and Transcripts

00:00:00

About The Provider

Tags

Reviews