The world is becoming faster with the help of ICT. The people who are efficient in IT have great value in this present situation. To become a successful competitor in this IT world you need to do a course that can assist you to make a booming career. To add a new feather to your career with the demand of age you can take the IT Support and Networking Diploma Level 3 course. It may assist you to reach your acme of goal.
The IT support course will introduce you with the basic concepts of IT support and networking system through the PC assembly and Operation Systems, troubleshooting, MS Windows, network operating System, T Networks, physical and practical Network security, along with the outcomes of CompTIA+, and Network+. All these elements are incorporated into our lesson plans through sheets, videos, and tasks so that you can be an expert in this area as an efficient IT specialist.
Method of Assessment:
Upon conclusion of the course, there’s an online multiple-choice quiz assessment, which will determine whether you have passed the course. The test is marked immediately and results are published instantly (60% pass mark).
Certification:
Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.
Requirements
There are no academic entry requirements for this IT support course, and it is open to students of all academic backgrounds.
Course Curriculum
Software: | |||
What is an Operating System | FREE | 00:48:00 | |
Configuring the Operating System | 00:06:00 | ||
What is an Application | 00:10:00 | ||
Using Control Panel | 00:18:00 | ||
Software and Concepts | 00:10:00 | ||
Licensing | 00:06:00 | ||
Using Software | 00:07:00 | ||
Software Tools | 00:10:00 | ||
Software | 00:14:00 | ||
Hardware, Devices, and Peripherals | 00:06:00 | ||
Hardware: | |||
Hardware and Peripherals | 00:07:00 | ||
Storage | 00:12:00 | ||
Connectivity Devices | 00:05:00 | ||
Network Components | 00:09:00 | ||
Identify the Importance of Risk Management | 00:11:00 | ||
Assess Risk | 00:13:00 | ||
Mitigate Risk | 00:22:00 | ||
Integrate Documentation into Risk Management | 00:14:00 | ||
Classify Threats and Threat Profiles | 00:07:00 | ||
Perform Ongoing Threat Research | 00:12:00 | ||
Resources that Aid in Research of Threats | 00:03:00 | ||
Implement Threat Modeling | 00:09:00 | ||
Assess the Impact of Reconnaissance Incidents | 00:10:00 | ||
Performing Reconnaissance on a Network | 00:07:00 | ||
Examining Reconnaissance Incidents | 00:08:00 | ||
Assess the Impact of Social Engineering | 00:10:00 | ||
Assessing the impact of Social Engineering9 | 00:07:00 | ||
Assessing the Impact of Phishing | 00:03:00 | ||
Types of Wireless Attacks | 00:30:00 | ||
Intrusion Monitoring | 00:08:00 | ||
Wireless Security Risks | 00:22:00 | ||
Authentication Attacks | 00:20:00 | ||
Rogue Devices | 00:04:00 | ||
Public Hotspots | 00:06:00 | ||
Wireless Security Monitoring | 00:21:00 | ||
Device Tracking | 00:17:00 | ||
WLAN Security Infrastructure | 00:37:00 | ||
Management Protocols | 00:23:00 | ||
Other RADIUS Solutions | 00:15:00 | ||
Security: | |||
Introduction | 00:30:00 | ||
Child Safety Online | 01:00:00 | ||
Secure Payment Sites | 01:00:00 | ||
Online Banking | 00:30:00 | ||
How To Keep Your Password Safe | 00:30:00 | ||
Common Scams | 01:00:00 | ||
How I Got Pharmed | 01:00:00 | ||
Virus Protection | 01:00:00 | ||
Self Maintenance | 00:30:00 | ||
Personal Information Online | 01:00:00 | ||
Is The Internet Safe? | 00:30:00 | ||
Importance of Cyber Security | 00:30:00 | ||
Spyware Can Destroy | 00:30:00 | ||
How Does Spyware Spread? | 01:00:00 | ||
How To Remove Spyware | 01:00:00 | ||
Anti Spyware Program | 01:00:00 | ||
The Anti Anti-Spyware Programs | 00:30:00 | ||
Research And Learn More | 00:30:00 | ||
Choosing The Best Anti Spyware Tool | 01:00:00 | ||
Computer Security And Spyware | 01:00:00 | ||
The Programs To Avoid | 00:15:00 | ||
Is It Legal? | 00:30:00 | ||
Checklist Of Protection | 00:15:00 | ||
The Information Security Cycle | FREE | 00:37:00 | |
Information Security Controls | 00:35:00 | ||
Authentication Methods | 00:09:00 | ||
Cryptography Fundamentals | 00:56:00 | ||
Security Policy Fundamentals | 00:11:00 | ||
Social Engineering | 00:31:00 | ||
Malware | 00:25:00 | ||
Software-Based Threats | 00:21:00 | ||
Based Threats | 00:38:00 | ||
Wireless Threats and Vulnerabilities | 00:43:00 | ||
Physical Threats and Vulnerabilities | 00:09:00 | ||
Manage Data Security | 00:47:00 | ||
Manage Application Security | 00:56:00 | ||
Manage Device and Host Security | 01:07:00 | ||
Manage Mobile Security | 00:10:00 | ||
A Risk Analysis | 00:17:00 | ||
Implement Vulnerability Assessment Tools and Techniques | 00:04:00 | ||
Scan for Vulnerabilities | 00:27:00 | ||
Mitigation and Deterrent Techniques | 00:19:00 | ||
Respond to Security Incidents | 00:23:00 | ||
Recover from a Security Incident | 00:09:00 | ||
Networking: | |||
OSI Layers | FREE | 00:44:00 | |
LANs and WANs | 00:14:00 | ||
Network Types | 00:07:00 | ||
Transmissions | 00:36:00 | ||
Cables | 00:41:00 | ||
Fiber Optics | 00:16:00 | ||
Converters and Connectors | 00:26:00 | ||
Wireless Security | 00:15:00 | ||
Authentication.prproj | 00:21:00 | ||
Wireless Security Threats | 00:30:00 | ||
TACACS | 00:10:00 | ||
Keys | 00:26:00 | ||
RADIUS | 00:06:00 | ||
VPN Technologies | 00:16:00 | ||
Tunneling Protocols.prproj | 00:05:00 | ||
Acceptable Use | 00:59:00 | ||
Common Problems | 00:32:00 | ||
Troubleshooting | 00:27:00 | ||
Network Technician Tools | 00:46:00 | ||
Physical and Logical Issues | 00:19:00 | ||
Open or Closed Ports | 00:09:00 | ||
ARP Issues | 00:13:00 | ||
Basic IT Literacy: | |||
Core Concepts in Healthcare IT | FREE | 00:06:00 | |
EMR EHR Issues | FREE | 00:04:00 | |
Regulations, Standards, and Stakeholders | 00:13:00 | ||
HIPAA Controls and Compliance | 00:07:00 | ||
Roles and Responsibilities | 00:09:00 | ||
Manage Communication and Ethics Issues | 00:15:00 | ||
Legal Best Practices, Requirements, and Documentation | 00:09:00 | ||
Medical Document Imaging | 00:04:00 | ||
Sanitation Management | 00:02:00 | ||
Computing Essentials | 00:05:00 | ||
Networking | 00:32:00 | ||
Manage Servers and Software | 00:27:00 | ||
Hardware Support | 00:14:00 | ||
Set Up a Workstation | 00:08:00 | ||
Troubleshoot Basic IT Issues | 00:15:00 | ||
Troubleshoot Medical IT Issues | 00:19:00 | ||
Implementation of an EMR EHR System | 00:34:00 | ||
Change Control | 00:07:00 | ||
Manage Physical and Logical Security | 00:36:00 | ||
Implement Security Best Practices and Threat Mitigation Techniques | 00:13:00 | ||
Manage Remote Access | 00:06:00 | ||
Manage Wireless Security | 00:14:00 | ||
Perform Backups and Disaster Recovery | 00:18:00 | ||
Mock Exam | |||
Mock Exam- IT Support and Networking Diploma Level 3 | 00:30:00 | ||
Final Exam | |||
Final Exam- IT Support and Networking Diploma Level 3 | 00:30:00 |
Course Reviews
No Reviews found for this course.