Course 4 – System Administration and IT Infrastructure Services

Week 5: Data Recovery & Backups In the fifth week of this course, we’ll focus on data recovery and backup strategies. Understanding how to backup and recover data is crucial in any tech role, especially for system administrators. Additionally, we’ll explore common corporate practices such as creating a disaster recovery plan and writing post-mortem documentation. … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 6: Troubleshooting and The Future Of Networking Introduction to Detection and Incident Response Congratulations on making it to the final week of the course! In this last week, we’ll look into the future of computer networking and cover practical troubleshooting techniques using popular operating systems. By the end of this module, you’ll be equipped … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 5: Connecting to the Internet   In the fifth week of this course, we’ll delve into the history of the Internet, exploring its evolution and how it functions today. You’ll learn about the various methods of connecting to the Internet, including cable, wireless, cellular, and fiber connections. By the end of this module, you’ll … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 4: Networking Services In the fourth week of this course, we’ll dive into networking services. You’ll learn about the importance of DNS and how it functions, as well as the role of DHCP in simplifying network administration. By the end of this module, you’ll understand how DNS and DHCP work, how NAT technologies enhance … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 3: The Transport and Application Layers Introduction to Detection and Incident Response We are going to study the transport and application layers of networking in the third week of this course. By the time we conclude this module, you will be able to describe TCP ports, be able to identify the components that make … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 2: The Network Layer Hereby, in the second week of the course, let us explore the field of network layer more closely. It will devote itself to the addresses of Internet Protocol schemes and how subnetting takes place. In addition, it includes encapsulation-how protocols such as ARP create a layer network-and the foundations of … Read more

Course 5 – IT Security: Defense Against the Digital Dark Arts

Week 1: Understanding Security Threats This is the IT Security of IT Support Professional Certificate. This week, the basics of security within IT environments will be introduced. You’ll learn how to define and identify security risks, vulnerabilities, and threats. Moreover, you will also look at the examples of security attacks that organizations face and how … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 1: Introduction to Networking Introduction to Detection and Incident Response Welcome to the Networking part of the complete IT Support Professional Certificate! This first week is where essential concepts of computer networking will be introduced to you. You will learn about the TCP/IP and OSI networking models and how their layers work harmoniously. We’ll … Read more

Course 2 – The Bits and Bytes Of Computer Networking

Week 3: The Transport and Application Layers During the third week, the part concerning the transport and application layers will be taken up in this course. This module is intended to equip you with: Ability to explain TCP ports and sockets. Identification of various features of the TCP header. Known differentiation between connection-oriented and connectionless … Read more

Course 5 – IT Security: Defense Against the Digital Dark Arts

Week 6: Creating a Company Culture for Security You’re done with the course, and now this final week is all about building up a trust-based security culture. In modern tech roles, however, understanding how to undertake measures in terms of the primary goals- confidentiality, integrity, and availability-with respect to security is important. By the end … Read more