This program is designed to give you the foundational and confidence required for an entry-level IT support role. You will get a hands-on experience dynamic mix of labs and other exercises. This curriculum is focused to prepare you to be ready for a job in IT sectors. But this course also allows you to have an opportunity to work with Google, Bank of America and other top organizations as an IT support professional.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer need to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49. Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: Google
Course Curriculum
Module 01 | |||
IT Technical Support Fundamentals – Introduction | 00:05:00 | ||
IT Technical Support Fundamentals – Introduction | 00:05:00 | ||
Introduction to IT Support – What does an IT Support Specialist do | 00:03:00 | ||
Introduction to IT Support – Course Introduction | 00:02:00 | ||
History of Computing – From Abacus to Analytical Engine | 00:06:00 | ||
History of Computing – The Path to Modern Computers | 00:11:00 | ||
Digital Logic – Computer Language | 00:03:00 | ||
Digital Logic – Character Encoding | 00:03:00 | ||
Digital Logic – Binary | 00:03:00 | ||
Digital Logic – How to Count in Binary | 00:03:00 | ||
Module 02 | |||
Computer Architecture – Abstraction | 00:02:00 | ||
Computer Architecture Overview | 00:03:00 | ||
Computer Architecture – Kevin Advice | 00:01:00 | ||
The Modern Computer – Module Introduction | 00:03:00 | ||
The Modern Computer – Hardware | 00:05:00 | ||
The Modern Computer – Programs and Hardware | 00:09:00 | ||
Computer Components – CPU | 00:05:00 | ||
Computer Components – RAM | 00:04:00 | ||
Computer Components – Motherboards | 00:04:00 | ||
Computer Components – Storage | 00:05:00 | ||
Computer Components – Power Supplies | 00:04:00 | ||
Computer Components – Peripherals | 00:04:00 | ||
Starting It Up – BIOS | 00:05:00 | ||
Starting It Up – Ben’s Advice | 00:01:00 | ||
Computer Components – Putting it All Together | 00:22:00 | ||
Operating System – Introduction | 00:03:00 | ||
Components of an Operating System | 00:06:00 | ||
Operating System – Files and File Systems | 00:04:00 | ||
Operating System – Process Management | 00:03:00 | ||
Operating System – Memory Management | 00:02:00 | ||
Operating System – IO Management | 00:02:00 | ||
Operating System – Interacting with the OS User Space | 00:04:00 | ||
Operating System – Logs | 00:02:00 | ||
Operating System – The Boot Process | 00:03:00 | ||
Module 03 | |||
Installing an Operating System – Choosing an Operating System | 00:04:00 | ||
Installing an Operating System – Virtual Machines | 00:06:00 | ||
Installing Windows | 00:05:00 | ||
Installing Linux | 00:07:00 | ||
Installing Mac OS X | 00:04:00 | ||
Installing an Operating System – Tri Ngo Obstacles & How to be successful in IT | 00:02:00 | ||
Networking – Module Introduction | 00:04:00 | ||
Basics of Networking | 00:08:00 | ||
Networking Hardware | 00:04:00 | ||
Networking – Language of the Internet | 00:02:00 | ||
Networking – The Web | 00:04:00 | ||
Networking – History of the Internet | 00:04:00 | ||
Networking – Limitations of the Internet | 00:04:00 | ||
Networking Impact | 00:04:00 | ||
Networking – Internet of Things | 00:02:00 | ||
Networking – Gian What he does in Android Security | 00:01:00 | ||
Networking – Privacy and Security | 00:04:00 | ||
Networking – Heather Adkins Keeping Hackers Out | 00:02:00 | ||
Module 04 | |||
Software – Module Introduction | 00:03:00 | ||
What is Software | 00:03:00 | ||
Types of Software | 00:04:00 | ||
Software – Revisiting Abstraction | 00:01:00 | ||
Software – Recipe for Computing | 00:04:00 | ||
Managing Software | 00:03:00 | ||
Installing, Updating, and Removing Software on Windows | 00:03:00 | ||
Installing, Updating, and Removing Software on Linux | 00:02:00 | ||
Software Automation | 00:02:00 | ||
Troubleshooting – Module Introduction | 00:02:00 | ||
Troubleshooting – Ask Questions! | 00:04:00 | ||
Troubleshooting – Isolating the Problem | 00:04:00 | ||
Troubleshooting – Follow the Cookie Crumbs | 00:03:00 | ||
Troubleshooting – Start with the Quickest Step First | 00:02:00 | ||
Troubleshooting Pitfalls to Avoid | 00:02:00 | ||
IT Technical Support Customer Service – Intro to Soft Skills | 00:09:00 | ||
IT Technical Support Customer Service – Anatomy of an Interaction | 00:08:00 | ||
IT Technical Support Customer Service – How to Deal with Difficult Situations | 00:10:00 | ||
IT Technical Support Customer Service – Amir Soft Skills | 00:01:00 | ||
Troubleshooting – Ticketing Systems and Documenting Your Work | 00:03:00 | ||
Troubleshooting – Process Documentation | 00:02:00 | ||
Troubleshooting – Documenting in Ticketing Systems | 00:02:00 | ||
Troubleshooting – Module Wrap Up | 00:02:00 | ||
IT Technical Support Fundamentals – Course Wrap Up | 00:03:00 | ||
IT Technical Support Fundamentals – Sabrina No Degree | 00:01:00 | ||
Module 05 | |||
Networking – Course Introduction | 00:06:00 | ||
Networking – The TCPIP Five Layer Network Model | 00:05:00 | ||
Networking – Alex Why Networking | 00:01:00 | ||
Networking Devices – Cables | 00:04:00 | ||
Networking Devices – Hubs and Switches | 00:03:00 | ||
Networking Devices – Routers | 00:02:00 | ||
Networking Devices – Servers and Clients | 00:02:00 | ||
Networking Devices – Sergio Being A Network Engineer | 00:02:00 | ||
Networking – Moving Bits Across the Wire | 00:02:00 | ||
Networking – Twisted Pair Cabling and Duplexing | 00:02:00 | ||
Networking – Network Ports and Patch Panels | 00:03:00 | ||
Networking – Ethernet and MAC Addresses | 00:07:00 | ||
Networking – Unicast, Multicast, and Broadcast | 00:02:00 | ||
Networking – Dissecting an Ethernet Frame | 00:06:00 | ||
Networking – Victor Escobedo Practical Experience in IT | 00:01:00 | ||
Introduction to The Network Layer | 00:01:00 | ||
The Network Layer | 00:02:00 | ||
Network Layer – IP Addresses | 00:03:00 | ||
Network Layer – IP Datagrams and Encapsulation | 00:07:00 | ||
Network Layer – IP Address Classes | 00:04:00 | ||
Network Layer – Address Resolution Protocol | 00:02:00 | ||
Network Layer – Sergio Path | 00:02:00 | ||
Subnetting | 00:02:00 | ||
Subnet Masks | 00:08:00 | ||
Subnetting – Basic Binary Math | 00:07:00 | ||
Subnetting – CIDR | 00:05:00 | ||
Basic Routing Concepts | 00:09:00 | ||
Routing Tables | 00:04:00 | ||
Routing – Interior Gateway Protocols | 00:06:00 | ||
Routing – Exterior Gateway Protocols | 00:03:00 | ||
Routing – Non Routable Address Space | 00:03:00 | ||
Routing – Alex Good Story | 00:02:00 | ||
Module 06 | |||
1 Introduction to the Transport and Application Layers | 00:02:00 | ||
Networking – The Transport Layer | 00:04:00 | ||
Networking – Dissection of a TCP Segment | 00:06:00 | ||
Networking – TCP Control Flags and the Three way Handshake | 00:06:00 | ||
Networking – TCP Socket States | 00:03:00 | ||
Networking – Connection oriented and Connectionless Protocols | 00:05:00 | ||
Networking – Firewalls | 00:02:00 | ||
Networking – The Application Layer | 00:03:00 | ||
Networking – The Application Layer and the OSI Model | 00:02:00 | ||
Networking – All the Layers Working in Unison | 00:12:00 | ||
Introduction to Network Services | 00:02:00 | ||
Networking – Why do we need DNS | 00:04:00 | ||
Networking – The Many Steps of Name Resolution | 00:09:00 | ||
Networking – DNS and UDP | 00:06:00 | ||
Networking – Sergio IT Great Field | 00:02:00 | ||
Networking – Resource Record Types | 00:08:00 | ||
Networking – Anatomy of a Domain Name | 00:04:00 | ||
Networking – DNS Zones | 00:05:00 | ||
Networking – Overview of Dynamic Host Configuration Protocol (DHCP) | 00:05:00 | ||
Networking – DHCP in Action | 00:05:00 | ||
Networking – Basics of Network Address Translation (NAT) | 00:04:00 | ||
Networking – NAT and the Transport Layer | 00:04:00 | ||
Networking – NAT, Non Routable Address Space and the Limits of IPv4 | 00:04:00 | ||
Networking – Virtual Private Networks | 00:04:00 | ||
Networking – Proxy Services | 00:05:00 | ||
Networking – Introduction to Connecting to the Internet | 00:02:00 | ||
Networking – Dial up, Modems and Point to Point Protocols | 00:04:00 | ||
Networking – Cable Broadband | 00:04:00 | ||
Networking – T Carrier Technologies | 00:02:00 | ||
Networking – Digital Subscriber Lines | 00:04:00 | ||
Networking – Cable Broadband | 00:04:00 | ||
Networking – Fiber Connections | 00:03:00 | ||
Networking – Wide Area Network Technologies (WAN) | 00:03:00 | ||
Networking – Point to Point VPNs | 00:02:00 | ||
Module 07 | |||
Introduction to Wireless Networking Technologies | 00:06:00 | ||
Wireless Network Configurations | 00:03:00 | ||
Wireless Networking – Wireless Channels | 00:05:00 | ||
Wireless Networking – Wireless Security | 00:03:00 | ||
Wireless Networking – Cellular Networking | 00:02:00 | ||
Introduction to Troubleshooting and the Future of Networking | 00:02:00 | ||
Networking – Ping Internet Control Message Protocol | 00:05:00 | ||
Networking – Traceroute | 00:03:00 | ||
Networking – Testing Port Connectivity | 00:03:00 | ||
Networking – Name Resolution Tools | 00:03:00 | ||
Networking – Public DNS Servers | 00:04:00 | ||
Networking – DNS Registration and Expiration | 00:03:00 | ||
Networking – Hosts Files | 00:04:00 | ||
Networking – What is The Cloud | 00:07:00 | ||
Networking – IPv6 Addressing and Subnetting | 00:07:00 | ||
Networking – IPv6 Headers | 00:03:00 | ||
Networking – IPv6 and IPv4 Harmony | 00:04:00 | ||
The Bits and Bytes of Computer Networking – Course Wrap Up | 00:02:00 | ||
Module 08 | |||
Operating Systems and You: Becoming a Power User – Introduction | 00:06:00 | ||
Operating Systems – Lesson Overview & Practice Tips | 00:03:00 | ||
Operating Systems – List Directories in a GUI | 00:06:00 | ||
Windows List Directories in CLI | 00:04:00 | ||
Linux List Directories | 00:06:00 | ||
Windows Changing Directories in the GUI | 00:01:00 | ||
Linux Changing Directories in Bash | 00:02:00 | ||
Windows Make Directories in the GUI & CLI | 00:03:00 | ||
Linux Make Directories in Bash | 00:01:00 | ||
Windows Command History | 00:03:00 | ||
Linux Command History | 00:01:00 | ||
Windows Copying Files & Directories | 00:05:00 | ||
Linux Copying Files and Directories | 00:02:00 | ||
Windows Moving and Renaming Files, Directories | 00:02:00 | ||
Linux Moving and Renaming Files, Directories | 00:01:00 | ||
Windows Removing Files & Directories | 00:04:00 | ||
Linux Removing Files & Directories | 00:01:00 | ||
Operating Systems – Cindy Why OS is Important | 00:02:00 | ||
Windows Display File Contents | 00:04:00 | ||
Linux Display File Contents | 00:03:00 | ||
Windows Modifying Text Files | 00:02:00 | ||
Linux Modifying Text Files | 00:02:00 | ||
Module 09 | |||
Windows Powershell | 00:03:00 | ||
Windows Searching within Files | 00:07:00 | ||
Windows Searching within Directories | 00:01:00 | ||
Linux Searching within Files | 00:01:00 | ||
Windows Input, Output, and the Pipeline | 00:07:00 | ||
Linux Input, Output and Pipe | 00:04:00 | ||
Windows and Linux Advanced Navigation | 00:02:00 | ||
Operating Systems – Ben First Tech Job | 00:01:00 | ||
Operating Systems – Users, Administrators, and Groups, Oh My! | 00:03:00 | ||
Windows View User and Group Information | 00:06:00 | ||
Windows View User and Group Information using CLI | 00:03:00 | ||
Linux Users, Superuser and Beyond | 00:05:00 | ||
Windows Passwords | 00:05:00 | ||
Linux Passwords | 00:01:00 | ||
Windows Adding and Removing Users | 00:06:00 | ||
Linux Adding and Removing Users | 00:01:00 | ||
Operating Systems – Ben Life as a CIO | 00:02:00 | ||
Windows File Permissions | 00:06:00 | ||
Linux File Permissions | 00:03:00 | ||
Windows Modifying Permissions | 00:07:00 | ||
Linux Modifying Permissions | 00:05:00 | ||
Windows Special Permissions | 00:05:00 | ||
Linux SetUID, SetGID, Sticky Bit | 00:06:00 | ||
Module 10 | |||
Package and Software Management – Module Introduction | 00:01:00 | ||
Package and Software Management – Introduction | 00:07:00 | ||
Linux Software Packages | 00:03:00 | ||
Windows Archives | 00:04:00 | ||
Linux Archives | 00:02:00 | ||
Windows Package Dependencies | 00:07:00 | ||
Linux Package Dependencies | 00:02:00 | ||
Windows Package Manager | 00:05:00 | ||
Linux Package Manager Apt | 00:06:00 | ||
Windows Underneath the Hood | 00:04:00 | ||
Linux Underneath the Hood | 00:02:00 | ||
Windows Devices and Drivers | 00:04:00 | ||
Linux Devices and Drivers | 00:04:00 | ||
Window Operating System Updates | 00:04:00 | ||
Linux Operating System Updates | 00:03:00 | ||
Module 11 | |||
Filesystems – Module Introduction | 00:01:00 | ||
Review of Filesystems | 00:03:00 | ||
Filesystems – Disk Anatomy | 00:03:00 | ||
Windows Disk Partitioning and Formatting a Filesystem | 00:07:00 | ||
Windows Mounting and Unmounting a Filesystem | 00:01:00 | ||
Linux Disk Partitioning and Formatting a Filesystem | 00:06:00 | ||
Linux Mounting and Unmounting a Filesystem | 00:04:00 | ||
Filesystems – Windows Swap | 00:04:00 | ||
Filesystems – Linux Swap | 00:02:00 | ||
Window Files | 00:06:00 | ||
Linux Files | 00:03:00 | ||
Filesystems – Windows Disk Usage | 00:04:00 | ||
Filesystems – Linux Disk Usage | 00:02:00 | ||
Windows Filesystem Repair | 00:04:00 | ||
Linux Filesystem Repair | 00:02:00 | ||
Filesystems – Ben Passion | 00:01:00 | ||
Module 12 | |||
Process Management – Module Introduction | 00:01:00 | ||
Process Management – Programs vs Processes Revisited | 00:03:00 | ||
Process Management – Windows Process Creation and Termination | 00:04:00 | ||
Process Management – Linux Process Creation and Termination | 00:01:00 | ||
Process Management – Jess Passions | 00:02:00 | ||
Process Management – Windows Reading Process Information | 00:04:00 | ||
Process Management – Linux Reading Process Information | 00:04:00 | ||
Process Management – Linux Signals | 00:01:00 | ||
Process Management – Windows Managing Processes | 00:05:00 | ||
Process Management – Linux Managing Processes | 00:04:00 | ||
Process Management – Windows Resource Monitoring | 00:05:00 | ||
Process Management – Linux Resource Monitoring | 00:04:00 | ||
Module 13 | |||
Operating Systems in Practice – Introduction | 00:01:00 | ||
Remote Connection and SSH | 00:07:00 | ||
Remote Connections on Windows | 00:06:00 | ||
Remote Connection File Transfer | 00:02:00 | ||
Remote Connection File Transfer on Windows | 00:04:00 | ||
Virtual Machines | 00:04:00 | ||
System Monitoring | 00:02:00 | ||
The Windows Event Viewer | 00:05:00 | ||
Linux Logs | 00:05:00 | ||
Working with Logs | 00:04:00 | ||
Imaging Software | 00:01:00 | ||
Operating Systems Deployment Methods | 00:04:00 | ||
Operating Systems – Course Wrap Up | 00:02:00 | ||
Module 14 | |||
Operating Systems – Heather Early Career Advice | 00:02:00 | ||
Operating Systems – Heather Early Career Advice | 00:02:00 | ||
System Administration and IT Infrastructure Services – Course Introductio | 00:05:00 | ||
What is Systems Administration | 00:03:00 | ||
System Administration and IT Infrastructure Services – Servers Revisited | 00:05:00 | ||
System Administration and IT Infrastructure Services – The Cloud | 00:04:00 | ||
System Administration – Organizational Policies | 00:03:00 | ||
System Administration – IT Infrastructure Services | 00:01:00 | ||
System Administration – User and Hardware Provisioning | 00:04:00 | ||
System Administration – Routine Maintenance | 00:01:00 | ||
System Administration – Vendors | 00:02:00 | ||
System Administration – Troubleshooting and Managing Issues | 00:03:00 | ||
System Administration – In Case of Fire, Break Glass | 00:02:00 | ||
System Administration – Dion Michelle Obama Story | 00:02:00 | ||
What are IT Infrastructure Services | 00:01:00 | ||
The Role of IT Infrastructure Services in SysAdmin | 00:01:00 | ||
Types of IT Infrastructure Services | 00:06:00 | ||
Network and Infrastructure Services – Heather First Tech Job | 00:02:00 | ||
Server Operating Systems | 00:01:00 | ||
Physical Infrastructure Services – Virtualization | 00:03:00 | ||
Physical Infrastructure Services – Remote Access | 00:04:00 | ||
Module 15 | |||
Network Services – FTP, SFTP, and TFTP | 00:03:00 | ||
Network Services – NTP | 00:02:00 | ||
Network Support Services | 00:02:00 | ||
Network Services – DNS | 00:02:00 | ||
Network Services – DNS for Web Servers | 00:02:00 | ||
Network Services – DNS for Internal Networks | 00:04:00 | ||
Network Services – DHCP | 00:02:00 | ||
Network Services – Unable to Resolve a Hostname or Domain Name | 00:05:00 | ||
Software and Platform Services – Module Introduction | 00:01:00 | ||
Configuring Communication Services | 00:03:00 | ||
Configuring Email Services | 00:04:00 | ||
Configuring User Productivity Services | 00:02:00 | ||
Configuring Security Services | 00:04:00 | ||
Software Services – Heather Managing Self Doubt | 00:02:00 | ||
What are file services | 00:02:00 | ||
Network File Storage | 00:04:00 | ||
Configuring Print Services | 00:03:00 | ||
Web Servers Revisited | 00:04:00 | ||
What is a database server | 00:02:00 | ||
Is the website down? | 00:05:00 | ||
Directory Services – Module Introduction | 00:01:00 | ||
What is a directory server | 00:05:00 | ||
Implementing Directory Services | 00:03:00 | ||
What is centralized management | 00:05:00 | ||
What is LDAP | 00:04:00 | ||
What is LDAP Authentication | 00:03:00 | ||
Directory Services – Heather Overcoming Obstacles | 00:01:00 | ||
What is Active Directory | 00:07:00 | ||
Managing Active Directory | 00:03:00 | ||
Managing Active Directory Users and Groups | 00:12:00 | ||
Managing Active Directory User Passwords | 00:05:00 | ||
Joining an Active Directory Domain | 00:05:00 | ||
Directory Services – What is Group Policy | 00:05:00 | ||
Group Policy Creation and Editing | 00:14:00 | ||
Group Policy Inheritance and Precedence | 00:08:00 | ||
Group Policy Troubleshooting | 00:14:00 | ||
Module 16 | |||
What is OpenLDAP | 00:04:00 | ||
Managing OpenLDAP | 00:04:00 | ||
Data Recovery & Backups – Module Introduction | 00:01:00 | ||
What is Data Recovery | 00:04:00 | ||
Backing Up Your Data | 00:04:00 | ||
Backup Solutions | 00:03:00 | ||
Testing Backups | 00:02:00 | ||
Types of Backup | 00:06:00 | ||
User Backups | 00:02:00 | ||
What’s a Disaster Recovery Plan | 00:05:00 | ||
Designing a Disaster Recovery Plan | 00:06:00 | ||
What’s a post mortem | 00:03:00 | ||
Writing a Post Mortem | 00:05:00 | ||
IT Automation – Introduction to Automation | 00:05:00 | ||
IT Automation – Pitfalls of Automation | 00:07:00 | ||
IT Automation – What is programming | 00:04:00 | ||
IT Automation – Benefits of Automation | 00:05:00 | ||
IT Automation – Pitfalls of Automation | 00:07:00 | ||
IT Automation – Sabrina What is SRE | 00:02:00 | ||
Ruby and Other Scripting Languages | 00:04:00 | ||
IT Automation – Similarities and Differences | 00:01:00 | ||
Hello, World! | 00:03:00 | ||
Data Types | 00:03:00 | ||
Expressions and Numbers | 00:05:00 | ||
Comparing Things | 00:03:00 | ||
Precedence | 00:02:00 | ||
Variables | 00:02:00 | ||
Naming Variables | 00:03:00 | ||
Flow Control Branching | 00:05:00 | ||
Branching with the Else statement | 00:03:00 | ||
Branching Summary | 00:02:00 | ||
Object Orientation Concepts to Code | 00:04:00 | ||
Object Orientation Classes | 00:02:00 | ||
Object Orientation Everything is an Object | 00:03:00 | ||
Object Orientation Inheritance | 00:02:00 | ||
Object Orientation Recap | 00:01:00 | ||
Module 17 | |||
Arrays | 00:03:00 | ||
Arrays Iteration | 00:02:00 | ||
Arrays and Codeblocks | 00:02:00 | ||
Flow Control Loops | 00:03:00 | ||
Hashes | 00:02:00 | ||
Iterating with Hashes | 00:03:00 | ||
Hashes vs Arrays | 00:01:00 | ||
Methods | 00:05:00 | ||
Instance Variables | 00:02:00 | ||
Organization | 00:03:00 | ||
Stylish Code | 00:02:00 | ||
Principles of Style | 00:02:00 | ||
Comments and Consistency | 00:03:00 | ||
Phelan Challenge | 00:02:00 | ||
System Programming – Introduction | 00:01:00 | ||
System Programming – Reusing Code | 00:02:00 | ||
System Programming – Code from Other Files | 00:01:00 | ||
System Programming – Require | 00:02:00 | ||
System Programming – Load | 00:01:00 | ||
System Programming – Modules | 00:02:00 | ||
System Programming – Namespaces | 00:02:00 | ||
System Programming – Mixins | 00:03:00 | ||
System Programming – Libraries | 00:04:00 | ||
System Programming – Packages | 00:03:00 | ||
System Programming – Finding Packages | 00:01:00 | ||
Module 18 | |||
Programming with files | 00:02:00 | ||
Reading files | 00:05:00 | ||
Writing files | 00:02:00 | ||
Working with files | 00:03:00 | ||
Directories | 00:03:00 | ||
Manipulating files and directories – Summary | 00:01:00 | ||
Intro to IO Steams | 00:01:00 | ||
Standard Streams | 00:02:00 | ||
Redirecting Streams | 00:04:00 | ||
Pipes and Pipelines | 00:04:00 | ||
Running System Commands in Ruby | 00:01:00 | ||
Scripting Subprocesses | 00:03:00 | ||
Backticks | 00:04:00 | ||
Open3 | 00:02:00 | ||
When to Use Subprocesses | 00:02:00 | ||
Subprocesses Summary | 00:02:00 | ||
Writing a script from the ground up – Introduction | 00:01:00 | ||
Writing a script from the ground up – Problem Statement | 00:02:00 | ||
Writing a script from the ground up – Research | 00:03:00 | ||
Writing a script from the ground up – Planning | 00:02:00 | ||
Writing a script from the ground up – Writing the Script | 00:04:00 | ||
Writing a script from the ground up – Putting it All Together | 00:01:00 | ||
Writing a script from the ground up – Next Steps | 00:02:00 | ||
Module 19 | |||
Strings – Text Processing Introduction | 00:04:00 | ||
String Indexing | 00:04:00 | ||
String Substitution | 00:04:00 | ||
More String Methods | 00:04:00 | ||
Strings – Summary | 00:01:00 | ||
regular expressions | 00:02:00 | ||
What are regular expressions | 00:02:00 | ||
regular expressions – Basic Syntax | 00:06:00 | ||
regular expressions – Advanced Matching | 00:04:00 | ||
regular expressions – Character Classes | 00:03:00 | ||
Regular Expressions and String Methods | 00:02:00 | ||
regular expressions – Summary | 00:01:00 | ||
Processing Log Files | 00:06:00 | ||
Command Line Text Processing | 00:05:00 | ||
Data Formats – Introduction | 00:02:00 | ||
Reading CSV files | 00:02:00 | ||
Searching CSV files | 00:02:00 | ||
Modifying CSV files | 00:02:00 | ||
CSV Summary | 00:01:00 | ||
HTML processing | 00:03:00 | ||
HTML Parsing Libraries | 00:03:00 | ||
Data Formats – Summary | 00:01:00 | ||
What is version control | 00:03:00 | ||
Version Control and Automation | 00:03:00 | ||
Module 20 | |||
What is Git | 00:02:00 | ||
What is GitHub | 00:02:00 | ||
What does Git do | 00:05:00 | ||
Anatomy of Commit Message | 00:03:00 | ||
he Basic Git Workflow | 00:06:00 | ||
The Git and GitHub Workflow | 00:04:00 | ||
More with Git | 00:04:00 | ||
Git Under the Hood – Undoing Things | 00:04:00 | ||
Git Under the Hood – Rollbacks | 00:03:00 | ||
Git Under the Hood – Identifying a Commit | 00:04:00 | ||
Git Under the Hood – Feeling overwhelmed | 00:02:00 | ||
Branching and Merging – Introduction | 00:01:00 | ||
Branching and Merging – What is a branch | 00:03:00 | ||
Branching and Merging – Working with Branches | 00:05:00 | ||
Branching and Merging – Merging | 00:03:00 | ||
Branching and Merging – Merge Conflicts | 00:03:00 | ||
Git Remotes – What is a remote | 00:03:00 | ||
Git Remotes – Working with Remotes | 00:03:00 | ||
Git Fetch | 00:02:00 | ||
Git Pull | 00:01:00 | ||
Git Push | 00:02:00 | ||
Git Summary | 00:01:00 | ||
Module 21 | |||
Version Control – Why test | 00:03:00 | ||
Version Control – Test Driven Development | 00:02:00 | ||
Version Control – Black Box vs White Box | 00:03:00 | ||
Version Control – Test Types | 00:03:00 | ||
Version Control – Unit Tests | 00:03:00 | ||
Version Control – Writing Unit Tests in Ruby | 00:05:00 | ||
Version Control – Summary | 00:01:00 | ||
Automation at Scale – What is scale | 00:02:00 | ||
Motivation for Automation at Scale | 00:03:00 | ||
Automation at Scale – What is configuration management | 00:04:00 | ||
Automation at Scale – Summary | 00:02:00 | ||
Intro to Chef | 00:04:00 | ||
Configuration Management Using Chef – Idempotency and Convergence | 00:04:00 | ||
Chef and Ruby | 00:02:00 | ||
Chef Configurations | 00:07:00 | ||
Chef Local Mode | 00:03:00 | ||
Chef Ecosystem and Architecture | 00:05:00 | ||
Configuration Management Using Chef – Summary | 00:01:00 | ||
Managing Nodes with Chef – Overview | 00:02:00 | ||
Managing Nodes with Chef – Planning | 00:03:00 | ||
Managing Nodes with Chef – Creating the Configuration | 00:05:00 | ||
Managing Nodes with Chef – Testing the Configuration | 00:05:00 | ||
Managing Nodes with Chef – Deploying | 00:07:00 | ||
Managing Nodes with Chef – Scaling Chef | 00:01:00 | ||
Managing Nodes with Chef – Extending Chef | 00:02:00 | ||
Managing Nodes with Chef – Summary | 00:01:00 | ||
Managing Nodes with Chef – Sabrina Advice | 00:02:00 | ||
Module 22 | |||
Automation – Where We’ve Been | 00:03:00 | ||
Automation – What is monitoring | 00:06:00 | ||
Automation Monitoring – Sources of Information Metrics | 00:05:00 | ||
Automation Monitoring – Collecting Metrics | 00:07:00 | ||
Automation Monitoring by Example – Metric Visualizations | 00:04:00 | ||
Automation Monitoring – Summary | 00:01:00 | ||
Automation – Alerting | 00:03:00 | ||
Automation – Alert Rules | 00:06:00 | ||
Automation – Blackbox and Whitebox Monitoring | 00:05:00 | ||
Automation – Alerting Philosophy | 00:05:00 | ||
Automation Alerting – Summary | 00:04:00 | ||
Automation – Monitoring Metrics with Prometheus | 00:02:00 | ||
Automation Monitoring by Example – Prometheus Basics | 00:02:00 | ||
Automation Monitoring by Example – Collecting Host Level Metrics | 00:02:00 | ||
Automation Monitoring by Example – Prometheus Targets | 00:04:00 | ||
Automation Monitoring by Example – Metric Visualizations | 00:04:00 | ||
Automation Monitoring by Example – Writing Alerts | 00:05:00 | ||
Automation Monitoring by Example – Prometheus Black Box Monitoring | 00:05:00 | ||
Automation Monitoring by Example – Summary | 00:02:00 | ||
Module 23 | |||
Security Defense against the digital dark arts – Course Introduction | 00:06:00 | ||
Malicious Software – The CIA Triad | 00:03:00 | ||
Essential Security Terms | 00:04:00 | ||
Malicious Software | 00:05:00 | ||
Malware Continued | 00:03:00 | ||
Network Attacks | 00:04:00 | ||
Network Attacks – Denial of Service | 00:03:00 | ||
Client Side Attacks | 00:03:00 | ||
Password Attacks | 00:02:00 | ||
Deceptive Attacks | 00:04:00 | ||
Module 24 | |||
Cryptography | 00:08:00 | ||
Asymmetric Cryptography | 00:08:00 | ||
Asymmetric Encryption Algorithms | 00:06:00 | ||
Rob What a Security Engineer Does | 00:01:00 | ||
Asymmetric Cryptography | 00:08:00 | ||
Asymmetric Encryption Algorithms | 00:06:00 | ||
Hashing | 00:04:00 | ||
Hashing Algorithms | 00:06:00 | ||
Hashing Algorithms continued | 00:06:00 | ||
Public Key Infrastructure | 00:09:00 | ||
Cryptography in Action | 00:09:00 | ||
Securing Network Traffic | 00:06:00 | ||
Cryptographic Hardware | 00:07:00 | ||
Authentication Best Practices | 00:06:00 | ||
Multifactor Authentication | 00:13:00 | ||
Authentication – Certificates | 00:04:00 | ||
Authentication – Certificates | 00:04:00 | ||
Authentication – RADIUS | 00:02:00 | ||
Authentication – Kerberos | 00:08:00 | ||
Authentication – TACACS+ | 00:02:00 | ||
Authentication – Single Sign On | 00:04:00 | ||
Authentication – Rob Path to IT | 00:02:00 | ||
Authorization and Access Control Methods | 00:02:00 | ||
Access Control | 00:05:00 | ||
Access Control List | 00:02:00 | ||
Tracking Usage and Access | 00:03:00 | ||
IT Security – Rob Important Skills in Security | 00:02:00 | ||
Network Hardening Best Practices | 00:09:00 | ||
Network Hardware Hardening | 00:09:00 | ||
Network Software Hardening | 00:05:00 | ||
Module 25 | |||
IT Technical Support – Joe Personal Obstacle | 00:01:00 | ||
Heather Social Engineering | 00:01:00 | ||
WEP Encryption and Why You Shouldn’t Use It | 00:09:00 | ||
Wireless Security – Let’s Get Rid of WEP! WPAWPA2 | 00:14:00 | ||
Wireless Hardening | 00:03:00 | ||
Sniffing the Network | 00:05:00 | ||
Wireshark and tcpdump | 00:07:00 | ||
Intrusion Detection Prevention Systems | 00:07:00 | ||
Intro to Defense in Depth | 00:01:00 | ||
System Hardening – Disabling Unnecessary Components | 00:05:00 | ||
System Hardening – Host Based Firewall | 00:04:00 | ||
System Hardening – Logging and Auditing | 00:07:00 | ||
System Hardening – Antimalware Protection | 00:08:00 | ||
System Hardening – Disk Encryption | 00:07:00 | ||
System Hardening – Heather Self Learning | 00:02:00 | ||
Software Patch Management | 00:07:00 | ||
Module 26 | |||
Application Hardening – Application Policies | 00:05:00 | ||
Intro to Risk in the Workplace | 00:01:00 | ||
Security Goals | 00:08:00 | ||
Measuring and Assessing Risk | 00:06:00 | ||
Risk in the Workplace – Privacy Policy | 00:04:00 | ||
Users – Third Party Security | 00:04:00 | ||
Users – Security Training | 00:04:00 | ||
Creating a Company Culture for Security – Alex Grit Story | 00:02:00 | ||
Incident Reporting and Analysis | 00:07:00 | ||
Incident Response and Recovery | 00:06:00 | ||
3 Creating a Company Culture for Security – Amir Interview | 00:01:00 | ||
Incident Handling – Ari Interview | 00:02:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.