• LOGIN
  • No products in the cart.

This program is designed to give you the foundational and confidence required for an entry-level IT support role. You will get a hands-on experience dynamic mix of labs and other exercises. This curriculum is focused to prepare you to be ready for a job in IT sectors. But this course also allows you to have an opportunity to work with Google, Bank of America and other top organizations as an IT support professional.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer need to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49. Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

Course Credit: Google

Course Curriculum

Module 01
IT Technical Support Fundamentals – Introduction 00:05:00
IT Technical Support Fundamentals – Introduction 00:05:00
Introduction to IT Support – What does an IT Support Specialist do 00:03:00
Introduction to IT Support – Course Introduction 00:02:00
History of Computing – From Abacus to Analytical Engine 00:06:00
History of Computing – The Path to Modern Computers 00:11:00
Digital Logic – Computer Language 00:03:00
Digital Logic – Character Encoding 00:03:00
Digital Logic – Binary 00:03:00
Digital Logic – How to Count in Binary 00:03:00
Module 02
Computer Architecture – Abstraction 00:02:00
Computer Architecture Overview 00:03:00
Computer Architecture – Kevin Advice 00:01:00
The Modern Computer – Module Introduction 00:03:00
The Modern Computer – Hardware 00:05:00
The Modern Computer – Programs and Hardware 00:09:00
Computer Components – CPU 00:05:00
Computer Components – RAM 00:04:00
Computer Components – Motherboards 00:04:00
Computer Components – Storage 00:05:00
Computer Components – Power Supplies 00:04:00
Computer Components – Peripherals 00:04:00
Starting It Up – BIOS 00:05:00
Starting It Up – Ben’s Advice 00:01:00
Computer Components – Putting it All Together 00:22:00
Operating System – Introduction 00:03:00
Components of an Operating System 00:06:00
Operating System – Files and File Systems 00:04:00
Operating System – Process Management 00:03:00
Operating System – Memory Management 00:02:00
Operating System – IO Management 00:02:00
Operating System – Interacting with the OS User Space 00:04:00
Operating System – Logs 00:02:00
Operating System – The Boot Process 00:03:00
Module 03
Installing an Operating System – Choosing an Operating System 00:04:00
Installing an Operating System – Virtual Machines 00:06:00
Installing Windows 00:05:00
Installing Linux 00:07:00
Installing Mac OS X 00:04:00
Installing an Operating System – Tri Ngo Obstacles & How to be successful in IT 00:02:00
Networking – Module Introduction 00:04:00
Basics of Networking 00:08:00
Networking Hardware 00:04:00
Networking – Language of the Internet 00:02:00
Networking – The Web 00:04:00
Networking – History of the Internet 00:04:00
Networking – Limitations of the Internet 00:04:00
Networking Impact 00:04:00
Networking – Internet of Things 00:02:00
Networking – Gian What he does in Android Security 00:01:00
Networking – Privacy and Security 00:04:00
Networking – Heather Adkins Keeping Hackers Out 00:02:00
Module 04
Software – Module Introduction 00:03:00
What is Software 00:03:00
Types of Software 00:04:00
Software – Revisiting Abstraction 00:01:00
Software – Recipe for Computing 00:04:00
Managing Software 00:03:00
Installing, Updating, and Removing Software on Windows 00:03:00
Installing, Updating, and Removing Software on Linux 00:02:00
Software Automation 00:02:00
Troubleshooting – Module Introduction 00:02:00
Troubleshooting – Ask Questions! 00:04:00
Troubleshooting – Isolating the Problem 00:04:00
Troubleshooting – Follow the Cookie Crumbs 00:03:00
Troubleshooting – Start with the Quickest Step First 00:02:00
Troubleshooting Pitfalls to Avoid 00:02:00
IT Technical Support Customer Service – Intro to Soft Skills 00:09:00
IT Technical Support Customer Service – Anatomy of an Interaction 00:08:00
IT Technical Support Customer Service – How to Deal with Difficult Situations 00:10:00
IT Technical Support Customer Service – Amir Soft Skills 00:01:00
Troubleshooting – Ticketing Systems and Documenting Your Work 00:03:00
Troubleshooting – Process Documentation 00:02:00
Troubleshooting – Documenting in Ticketing Systems 00:02:00
Troubleshooting – Module Wrap Up 00:02:00
IT Technical Support Fundamentals – Course Wrap Up 00:03:00
IT Technical Support Fundamentals – Sabrina No Degree 00:01:00
Module 05
Networking – Course Introduction 00:06:00
Networking – The TCPIP Five Layer Network Model 00:05:00
Networking – Alex Why Networking 00:01:00
Networking Devices – Cables 00:04:00
Networking Devices – Hubs and Switches 00:03:00
Networking Devices – Routers 00:02:00
Networking Devices – Servers and Clients 00:02:00
Networking Devices – Sergio Being A Network Engineer 00:02:00
Networking – Moving Bits Across the Wire 00:02:00
Networking – Twisted Pair Cabling and Duplexing 00:02:00
Networking – Network Ports and Patch Panels 00:03:00
Networking – Ethernet and MAC Addresses 00:07:00
Networking – Unicast, Multicast, and Broadcast 00:02:00
Networking – Dissecting an Ethernet Frame 00:06:00
Networking – Victor Escobedo Practical Experience in IT 00:01:00
Introduction to The Network Layer 00:01:00
The Network Layer 00:02:00
Network Layer – IP Addresses 00:03:00
Network Layer – IP Datagrams and Encapsulation 00:07:00
Network Layer – IP Address Classes 00:04:00
Network Layer – Address Resolution Protocol 00:02:00
Network Layer – Sergio Path 00:02:00
Subnetting 00:02:00
Subnet Masks 00:08:00
Subnetting – Basic Binary Math 00:07:00
Subnetting – CIDR 00:05:00
Basic Routing Concepts 00:09:00
Routing Tables 00:04:00
Routing – Interior Gateway Protocols 00:06:00
Routing – Exterior Gateway Protocols 00:03:00
Routing – Non Routable Address Space 00:03:00
Routing – Alex Good Story 00:02:00
Module 06
1 Introduction to the Transport and Application Layers 00:02:00
Networking – The Transport Layer 00:04:00
Networking – Dissection of a TCP Segment 00:06:00
Networking – TCP Control Flags and the Three way Handshake 00:06:00
Networking – TCP Socket States 00:03:00
Networking – Connection oriented and Connectionless Protocols 00:05:00
Networking – Firewalls 00:02:00
Networking – The Application Layer 00:03:00
Networking – The Application Layer and the OSI Model 00:02:00
Networking – All the Layers Working in Unison 00:12:00
Introduction to Network Services 00:02:00
Networking – Why do we need DNS 00:04:00
Networking – The Many Steps of Name Resolution 00:09:00
Networking – DNS and UDP 00:06:00
Networking – Sergio IT Great Field 00:02:00
Networking – Resource Record Types 00:08:00
Networking – Anatomy of a Domain Name 00:04:00
Networking – DNS Zones 00:05:00
Networking – Overview of Dynamic Host Configuration Protocol (DHCP) 00:05:00
Networking – DHCP in Action 00:05:00
Networking – Basics of Network Address Translation (NAT) 00:04:00
Networking – NAT and the Transport Layer 00:04:00
Networking – NAT, Non Routable Address Space and the Limits of IPv4 00:04:00
Networking – Virtual Private Networks 00:04:00
Networking – Proxy Services 00:05:00
Networking – Introduction to Connecting to the Internet 00:02:00
Networking – Dial up, Modems and Point to Point Protocols 00:04:00
Networking – Cable Broadband 00:04:00
Networking – T Carrier Technologies 00:02:00
Networking – Digital Subscriber Lines 00:04:00
Networking – Cable Broadband 00:04:00
Networking – Fiber Connections 00:03:00
Networking – Wide Area Network Technologies (WAN) 00:03:00
Networking – Point to Point VPNs 00:02:00
Module 07
Introduction to Wireless Networking Technologies 00:06:00
Wireless Network Configurations 00:03:00
Wireless Networking – Wireless Channels 00:05:00
Wireless Networking – Wireless Security 00:03:00
Wireless Networking – Cellular Networking 00:02:00
Introduction to Troubleshooting and the Future of Networking 00:02:00
Networking – Ping Internet Control Message Protocol 00:05:00
Networking – Traceroute 00:03:00
Networking – Testing Port Connectivity 00:03:00
Networking – Name Resolution Tools 00:03:00
Networking – Public DNS Servers 00:04:00
Networking – DNS Registration and Expiration 00:03:00
Networking – Hosts Files 00:04:00
Networking – What is The Cloud 00:07:00
Networking – IPv6 Addressing and Subnetting 00:07:00
Networking – IPv6 Headers 00:03:00
Networking – IPv6 and IPv4 Harmony 00:04:00
The Bits and Bytes of Computer Networking – Course Wrap Up 00:02:00
Module 08
Operating Systems and You: Becoming a Power User – Introduction 00:06:00
Operating Systems – Lesson Overview & Practice Tips 00:03:00
Operating Systems – List Directories in a GUI 00:06:00
Windows List Directories in CLI 00:04:00
Linux List Directories 00:06:00
Windows Changing Directories in the GUI 00:01:00
Linux Changing Directories in Bash 00:02:00
Windows Make Directories in the GUI & CLI 00:03:00
Linux Make Directories in Bash 00:01:00
Windows Command History 00:03:00
Linux Command History 00:01:00
Windows Copying Files & Directories 00:05:00
Linux Copying Files and Directories 00:02:00
Windows Moving and Renaming Files, Directories 00:02:00
Linux Moving and Renaming Files, Directories 00:01:00
Windows Removing Files & Directories 00:04:00
Linux Removing Files & Directories 00:01:00
Operating Systems – Cindy Why OS is Important 00:02:00
Windows Display File Contents 00:04:00
Linux Display File Contents 00:03:00
Windows Modifying Text Files 00:02:00
Linux Modifying Text Files 00:02:00
Module 09
Windows Powershell 00:03:00
Windows Searching within Files 00:07:00
Windows Searching within Directories 00:01:00
Linux Searching within Files 00:01:00
Windows Input, Output, and the Pipeline 00:07:00
Linux Input, Output and Pipe 00:04:00
Windows and Linux Advanced Navigation 00:02:00
Operating Systems – Ben First Tech Job 00:01:00
Operating Systems – Users, Administrators, and Groups, Oh My! 00:03:00
Windows View User and Group Information 00:06:00
Windows View User and Group Information using CLI 00:03:00
Linux Users, Superuser and Beyond 00:05:00
Windows Passwords 00:05:00
Linux Passwords 00:01:00
Windows Adding and Removing Users 00:06:00
Linux Adding and Removing Users 00:01:00
Operating Systems – Ben Life as a CIO 00:02:00
Windows File Permissions 00:06:00
Linux File Permissions 00:03:00
Windows Modifying Permissions 00:07:00
Linux Modifying Permissions 00:05:00
Windows Special Permissions 00:05:00
Linux SetUID, SetGID, Sticky Bit 00:06:00
Module 10
Package and Software Management – Module Introduction 00:01:00
Package and Software Management – Introduction 00:07:00
Linux Software Packages 00:03:00
Windows Archives 00:04:00
Linux Archives 00:02:00
Windows Package Dependencies 00:07:00
Linux Package Dependencies 00:02:00
Windows Package Manager 00:05:00
Linux Package Manager Apt 00:06:00
Windows Underneath the Hood 00:04:00
Linux Underneath the Hood 00:02:00
Windows Devices and Drivers 00:04:00
Linux Devices and Drivers 00:04:00
Window Operating System Updates 00:04:00
Linux Operating System Updates 00:03:00
Module 11
Filesystems – Module Introduction 00:01:00
Review of Filesystems 00:03:00
Filesystems – Disk Anatomy 00:03:00
Windows Disk Partitioning and Formatting a Filesystem 00:07:00
Windows Mounting and Unmounting a Filesystem 00:01:00
Linux Disk Partitioning and Formatting a Filesystem 00:06:00
Linux Mounting and Unmounting a Filesystem 00:04:00
Filesystems – Windows Swap 00:04:00
Filesystems – Linux Swap 00:02:00
Window Files 00:06:00
Linux Files 00:03:00
Filesystems – Windows Disk Usage 00:04:00
Filesystems – Linux Disk Usage 00:02:00
Windows Filesystem Repair 00:04:00
Linux Filesystem Repair 00:02:00
Filesystems – Ben Passion 00:01:00
Module 12
Process Management – Module Introduction 00:01:00
Process Management – Programs vs Processes Revisited 00:03:00
Process Management – Windows Process Creation and Termination 00:04:00
Process Management – Linux Process Creation and Termination 00:01:00
Process Management – Jess Passions 00:02:00
Process Management – Windows Reading Process Information 00:04:00
Process Management – Linux Reading Process Information 00:04:00
Process Management – Linux Signals 00:01:00
Process Management – Windows Managing Processes 00:05:00
Process Management – Linux Managing Processes 00:04:00
Process Management – Windows Resource Monitoring 00:05:00
Process Management – Linux Resource Monitoring 00:04:00
Module 13
Operating Systems in Practice – Introduction 00:01:00
Remote Connection and SSH 00:07:00
Remote Connections on Windows 00:06:00
Remote Connection File Transfer 00:02:00
Remote Connection File Transfer on Windows 00:04:00
Virtual Machines 00:04:00
System Monitoring 00:02:00
The Windows Event Viewer 00:05:00
Linux Logs 00:05:00
Working with Logs 00:04:00
Imaging Software 00:01:00
Operating Systems Deployment Methods 00:04:00
Operating Systems – Course Wrap Up 00:02:00
Module 14
Operating Systems – Heather Early Career Advice 00:02:00
Operating Systems – Heather Early Career Advice 00:02:00
System Administration and IT Infrastructure Services – Course Introductio 00:05:00
What is Systems Administration 00:03:00
System Administration and IT Infrastructure Services – Servers Revisited 00:05:00
System Administration and IT Infrastructure Services – The Cloud 00:04:00
System Administration – Organizational Policies 00:03:00
System Administration – IT Infrastructure Services 00:01:00
System Administration – User and Hardware Provisioning 00:04:00
System Administration – Routine Maintenance 00:01:00
System Administration – Vendors 00:02:00
System Administration – Troubleshooting and Managing Issues 00:03:00
System Administration – In Case of Fire, Break Glass 00:02:00
System Administration – Dion Michelle Obama Story 00:02:00
What are IT Infrastructure Services 00:01:00
The Role of IT Infrastructure Services in SysAdmin 00:01:00
Types of IT Infrastructure Services 00:06:00
Network and Infrastructure Services – Heather First Tech Job 00:02:00
Server Operating Systems 00:01:00
Physical Infrastructure Services – Virtualization 00:03:00
Physical Infrastructure Services – Remote Access 00:04:00
Module 15
Network Services – FTP, SFTP, and TFTP 00:03:00
Network Services – NTP 00:02:00
Network Support Services 00:02:00
Network Services – DNS 00:02:00
Network Services – DNS for Web Servers 00:02:00
Network Services – DNS for Internal Networks 00:04:00
Network Services – DHCP 00:02:00
Network Services – Unable to Resolve a Hostname or Domain Name 00:05:00
Software and Platform Services – Module Introduction 00:01:00
Configuring Communication Services 00:03:00
Configuring Email Services 00:04:00
Configuring User Productivity Services 00:02:00
Configuring Security Services 00:04:00
Software Services – Heather Managing Self Doubt 00:02:00
What are file services 00:02:00
Network File Storage 00:04:00
Configuring Print Services 00:03:00
Web Servers Revisited 00:04:00
What is a database server 00:02:00
Is the website down? 00:05:00
Directory Services – Module Introduction 00:01:00
What is a directory server 00:05:00
Implementing Directory Services 00:03:00
What is centralized management 00:05:00
What is LDAP 00:04:00
What is LDAP Authentication 00:03:00
Directory Services – Heather Overcoming Obstacles 00:01:00
What is Active Directory 00:07:00
Managing Active Directory 00:03:00
Managing Active Directory Users and Groups 00:12:00
Managing Active Directory User Passwords 00:05:00
Joining an Active Directory Domain 00:05:00
Directory Services – What is Group Policy 00:05:00
Group Policy Creation and Editing 00:14:00
Group Policy Inheritance and Precedence 00:08:00
Group Policy Troubleshooting 00:14:00
Module 16
What is OpenLDAP 00:04:00
Managing OpenLDAP 00:04:00
Data Recovery & Backups – Module Introduction 00:01:00
What is Data Recovery 00:04:00
Backing Up Your Data 00:04:00
Backup Solutions 00:03:00
Testing Backups 00:02:00
Types of Backup 00:06:00
User Backups 00:02:00
What’s a Disaster Recovery Plan 00:05:00
Designing a Disaster Recovery Plan 00:06:00
What’s a post mortem 00:03:00
Writing a Post Mortem 00:05:00
IT Automation – Introduction to Automation 00:05:00
IT Automation – Pitfalls of Automation 00:07:00
IT Automation – What is programming 00:04:00
IT Automation – Benefits of Automation 00:05:00
IT Automation – Pitfalls of Automation 00:07:00
IT Automation – Sabrina What is SRE 00:02:00
Ruby and Other Scripting Languages 00:04:00
IT Automation – Similarities and Differences 00:01:00
Hello, World! 00:03:00
Data Types 00:03:00
Expressions and Numbers 00:05:00
Comparing Things 00:03:00
Precedence 00:02:00
Variables 00:02:00
Naming Variables 00:03:00
Flow Control Branching 00:05:00
Branching with the Else statement 00:03:00
Branching Summary 00:02:00
Object Orientation Concepts to Code 00:04:00
Object Orientation Classes 00:02:00
Object Orientation Everything is an Object 00:03:00
Object Orientation Inheritance 00:02:00
Object Orientation Recap 00:01:00
Module 17
Arrays 00:03:00
Arrays Iteration 00:02:00
Arrays and Codeblocks 00:02:00
Flow Control Loops 00:03:00
Hashes 00:02:00
Iterating with Hashes 00:03:00
Hashes vs Arrays 00:01:00
Methods 00:05:00
Instance Variables 00:02:00
Organization 00:03:00
Stylish Code 00:02:00
Principles of Style 00:02:00
Comments and Consistency 00:03:00
Phelan Challenge 00:02:00
System Programming – Introduction 00:01:00
System Programming – Reusing Code 00:02:00
System Programming – Code from Other Files 00:01:00
System Programming – Require 00:02:00
System Programming – Load 00:01:00
System Programming – Modules 00:02:00
System Programming – Namespaces 00:02:00
System Programming – Mixins 00:03:00
System Programming – Libraries 00:04:00
System Programming – Packages 00:03:00
System Programming – Finding Packages 00:01:00
Module 18
Programming with files 00:02:00
Reading files 00:05:00
Writing files 00:02:00
Working with files 00:03:00
Directories 00:03:00
Manipulating files and directories – Summary 00:01:00
Intro to IO Steams 00:01:00
Standard Streams 00:02:00
Redirecting Streams 00:04:00
Pipes and Pipelines 00:04:00
Running System Commands in Ruby 00:01:00
Scripting Subprocesses 00:03:00
Backticks 00:04:00
Open3 00:02:00
When to Use Subprocesses 00:02:00
Subprocesses Summary 00:02:00
Writing a script from the ground up – Introduction 00:01:00
Writing a script from the ground up – Problem Statement 00:02:00
Writing a script from the ground up – Research 00:03:00
Writing a script from the ground up – Planning 00:02:00
Writing a script from the ground up – Writing the Script 00:04:00
Writing a script from the ground up – Putting it All Together 00:01:00
Writing a script from the ground up – Next Steps 00:02:00
Module 19
Strings – Text Processing Introduction 00:04:00
String Indexing 00:04:00
String Substitution 00:04:00
More String Methods 00:04:00
Strings – Summary 00:01:00
regular expressions 00:02:00
What are regular expressions 00:02:00
regular expressions – Basic Syntax 00:06:00
regular expressions – Advanced Matching 00:04:00
regular expressions – Character Classes 00:03:00
Regular Expressions and String Methods 00:02:00
regular expressions – Summary 00:01:00
Processing Log Files 00:06:00
Command Line Text Processing 00:05:00
Data Formats – Introduction 00:02:00
Reading CSV files 00:02:00
Searching CSV files 00:02:00
Modifying CSV files 00:02:00
CSV Summary 00:01:00
HTML processing 00:03:00
HTML Parsing Libraries 00:03:00
Data Formats – Summary 00:01:00
What is version control 00:03:00
Version Control and Automation 00:03:00
Module 20
What is Git 00:02:00
What is GitHub 00:02:00
What does Git do 00:05:00
Anatomy of Commit Message 00:03:00
he Basic Git Workflow 00:06:00
The Git and GitHub Workflow 00:04:00
More with Git 00:04:00
Git Under the Hood – Undoing Things 00:04:00
Git Under the Hood – Rollbacks 00:03:00
Git Under the Hood – Identifying a Commit 00:04:00
Git Under the Hood – Feeling overwhelmed 00:02:00
Branching and Merging – Introduction 00:01:00
Branching and Merging – What is a branch 00:03:00
Branching and Merging – Working with Branches 00:05:00
Branching and Merging – Merging 00:03:00
Branching and Merging – Merge Conflicts 00:03:00
Git Remotes – What is a remote 00:03:00
Git Remotes – Working with Remotes 00:03:00
Git Fetch 00:02:00
Git Pull 00:01:00
Git Push 00:02:00
Git Summary 00:01:00
Module 21
Version Control – Why test 00:03:00
Version Control – Test Driven Development 00:02:00
Version Control – Black Box vs White Box 00:03:00
Version Control – Test Types 00:03:00
Version Control – Unit Tests 00:03:00
Version Control – Writing Unit Tests in Ruby 00:05:00
Version Control – Summary 00:01:00
Automation at Scale – What is scale 00:02:00
Motivation for Automation at Scale 00:03:00
Automation at Scale – What is configuration management 00:04:00
Automation at Scale – Summary 00:02:00
Intro to Chef 00:04:00
Configuration Management Using Chef – Idempotency and Convergence 00:04:00
Chef and Ruby 00:02:00
Chef Configurations 00:07:00
Chef Local Mode 00:03:00
Chef Ecosystem and Architecture 00:05:00
Configuration Management Using Chef – Summary 00:01:00
Managing Nodes with Chef – Overview 00:02:00
Managing Nodes with Chef – Planning 00:03:00
Managing Nodes with Chef – Creating the Configuration 00:05:00
Managing Nodes with Chef – Testing the Configuration 00:05:00
Managing Nodes with Chef – Deploying 00:07:00
Managing Nodes with Chef – Scaling Chef 00:01:00
Managing Nodes with Chef – Extending Chef 00:02:00
Managing Nodes with Chef – Summary 00:01:00
Managing Nodes with Chef – Sabrina Advice 00:02:00
Module 22
Automation – Where We’ve Been 00:03:00
Automation – What is monitoring 00:06:00
Automation Monitoring – Sources of Information Metrics 00:05:00
Automation Monitoring – Collecting Metrics 00:07:00
Automation Monitoring by Example – Metric Visualizations 00:04:00
Automation Monitoring – Summary 00:01:00
Automation – Alerting 00:03:00
Automation – Alert Rules 00:06:00
Automation – Blackbox and Whitebox Monitoring 00:05:00
Automation – Alerting Philosophy 00:05:00
Automation Alerting – Summary 00:04:00
Automation – Monitoring Metrics with Prometheus 00:02:00
Automation Monitoring by Example – Prometheus Basics 00:02:00
Automation Monitoring by Example – Collecting Host Level Metrics 00:02:00
Automation Monitoring by Example – Prometheus Targets 00:04:00
Automation Monitoring by Example – Metric Visualizations 00:04:00
Automation Monitoring by Example – Writing Alerts 00:05:00
Automation Monitoring by Example – Prometheus Black Box Monitoring 00:05:00
Automation Monitoring by Example – Summary 00:02:00
Module 23
Security Defense against the digital dark arts – Course Introduction 00:06:00
Malicious Software – The CIA Triad 00:03:00
Essential Security Terms 00:04:00
Malicious Software 00:05:00
Malware Continued 00:03:00
Network Attacks 00:04:00
Network Attacks – Denial of Service 00:03:00
Client Side Attacks 00:03:00
Password Attacks 00:02:00
Deceptive Attacks 00:04:00
Module 24
Cryptography 00:08:00
Asymmetric Cryptography 00:08:00
Asymmetric Encryption Algorithms 00:06:00
Rob What a Security Engineer Does 00:01:00
Asymmetric Cryptography 00:08:00
Asymmetric Encryption Algorithms 00:06:00
Hashing 00:04:00
Hashing Algorithms 00:06:00
Hashing Algorithms continued 00:06:00
Public Key Infrastructure 00:09:00
Cryptography in Action 00:09:00
Securing Network Traffic 00:06:00
Cryptographic Hardware 00:07:00
Authentication Best Practices 00:06:00
Multifactor Authentication 00:13:00
Authentication – Certificates 00:04:00
Authentication – Certificates 00:04:00
Authentication – RADIUS 00:02:00
Authentication – Kerberos 00:08:00
Authentication – TACACS+ 00:02:00
Authentication – Single Sign On 00:04:00
Authentication – Rob Path to IT 00:02:00
Authorization and Access Control Methods 00:02:00
Access Control 00:05:00
Access Control List 00:02:00
Tracking Usage and Access 00:03:00
IT Security – Rob Important Skills in Security 00:02:00
Network Hardening Best Practices 00:09:00
Network Hardware Hardening 00:09:00
Network Software Hardening 00:05:00
Module 25
IT Technical Support – Joe Personal Obstacle 00:01:00
Heather Social Engineering 00:01:00
WEP Encryption and Why You Shouldn’t Use It 00:09:00
Wireless Security – Let’s Get Rid of WEP! WPAWPA2 00:14:00
Wireless Hardening 00:03:00
Sniffing the Network 00:05:00
Wireshark and tcpdump 00:07:00
Intrusion Detection Prevention Systems 00:07:00
Intro to Defense in Depth 00:01:00
System Hardening – Disabling Unnecessary Components 00:05:00
System Hardening – Host Based Firewall 00:04:00
System Hardening – Logging and Auditing 00:07:00
System Hardening – Antimalware Protection 00:08:00
System Hardening – Disk Encryption 00:07:00
System Hardening – Heather Self Learning 00:02:00
Software Patch Management 00:07:00
Module 26
Application Hardening – Application Policies 00:05:00
Intro to Risk in the Workplace 00:01:00
Security Goals 00:08:00
Measuring and Assessing Risk 00:06:00
Risk in the Workplace – Privacy Policy 00:04:00
Users – Third Party Security 00:04:00
Users – Security Training 00:04:00
Creating a Company Culture for Security – Alex Grit Story 00:02:00
Incident Reporting and Analysis 00:07:00
Incident Response and Recovery 00:06:00
3 Creating a Company Culture for Security – Amir Interview 00:01:00
Incident Handling – Ari Interview 00:02:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

2388 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841