IT Administration and Networking

4.8( 9 REVIEWS )
9 STUDENTS
IT Administration and Networking

See the Curriculum Section for materials and enjoy learning with Imperial Academy.

Course Curriculum

Software:
What is an Operating System 00:48:00
Configuring the Operating System 00:06:00
What is an Application 00:10:00
Using Control Panel 00:18:00
Software and Concepts 00:11:00
Licensing 00:06:00
Using Software 00:07:00
Software Tools 00:10:00
Software 00:14:00
Hardware, Devices, and Peripherals 00:06:00
Hardware:
Hardware and Peripherals 00:07:00
Storage 00:12:00
Connectivity Devices 00:05:00
Network Components 00:09:00
Identify the Importance of Risk Management 00:11:00
Assess Risk 00:13:00
Mitigate Risk 00:24:00
Integrate Documentation into Risk Management 00:15:00
Classify Threats and Threat Profiles 00:08:00
Perform Ongoing Threat Research 00:13:00
Resources that Aid in Research of Threats 00:03:00
Implement Threat Modeling 00:10:00
Assess the Impact of Reconnaissance Incidents 00:11:00
Performing Reconnaissance on a Network 00:07:00
Examining Reconnaissance Incidents 00:08:00
Assess the Impact of Social Engineering 00:11:00
Assessing the impact of Social Engineering 00:07:00
Assessing the Impact of Phishing 00:03:00
Types of Wireless Attacks 00:30:00
Intrusion Monitoring 00:08:00
Wireless Security Risks 00:22:00
Authentication Attacks 00:21:00
Rogue Devices 00:04:00
Public Hotspots 00:07:00
Wireless Security Monitoring 00:21:00
Device Tracking 00:18:00
WLAN Security Infrastructure 00:38:00
Management Protocols 00:23:00
Other RADIUS Solutions 00:16:00
Security:
Introduction 00:30:00
Child Safety Online 01:00:00
Secure Payment Sites 01:00:00
Online Banking 00:30:00
How To Keep Your Password Safe 00:30:00
Common Scams 01:00:00
How I Got Pharmed 01:00:00
Virus Protection 01:00:00
Self Maintenance 00:30:00
Personal Information Online 01:00:00
Is The Internet Safe? 00:30:00
Importance of Cyber Security 00:30:00
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
The Information Security Cycle 00:37:00
Information Security Controls 00:36:00
Authentication Methods 00:09:00
Cryptography Fundamentals 00:56:00
Security Policy Fundamentals 00:11:00
Social Engineering 00:32:00
Malware 00:25:00
Software-Based Threats 00:22:00
Based Threats 00:39:00
Wireless Threats and Vulnerabilities 00:43:00
Physical Threats and Vulnerabilities 00:09:00
Manage Data Security 00:47:00
Manage Application Security 00:55:00
Manage Device and Host Security 01:08:00
Manage Mobile Security 00:10:00
A Risk Analysis 00:17:00
Implement Vulnerability Assessment Tools and Techniques 00:05:00
Scan for Vulnerabilities 00:27:00
Mitigation and Deterrent Techniques 00:19:00
Respond to Security Incidents 00:23:00
Recover from a Security Incident 00:10:00
Networking:
OSI Layers 00:44:00
LANs and WANs 00:14:00
Network Types 00:07:00
Transmissions 00:36:00
Cables 00:41:00
Fiber Optics 00:17:00
Converters and Connectors 00:27:00
Wireless Security 00:15:00
Authentication.prproj 00:21:00
Wireless Security Threats 00:30:00
TACACS 00:10:00
Keys 00:26:00
RADIUS 00:07:00
VPN Technologies 00:16:00
Tunneling Protocols.prproj 00:05:00
Acceptable Use 01:00:00
Common Problems 00:32:00
Troubleshooting 00:28:00
Network Technician Tools 00:46:00
Physical and Logical Issues 00:19:00
Open or Closed Ports 00:09:00
ARP Issues 00:13:00
Basic IT Literacy:
Core Concepts in Healthcare IT 00:06:00
EMR EHR Issues 00:05:00
Regulations, Standards, and Stakeholders 00:14:00
HIPAA Controls and Compliance 00:08:00
Roles and Responsibilities 00:10:00
Manage Communication and Ethics Issues 00:15:00
Legal Best Practices, Requirements, and Documentation 00:09:00
Medical Document Imaging 00:04:00
Sanitation Management 00:03:00
Computing Essentials 00:05:00
Networking 00:33:00
Manage Servers and Software 00:27:00
Hardware Support 00:14:00
Set Up a Workstation 00:08:00
Troubleshoot Basic IT Issues 00:15:00
Troubleshoot Medical IT Issues 00:20:00
Implementation of an EMR EHR System 00:34:00
Change Control 00:08:00
Manage Physical and Logical Security 00:36:00
Implement Security Best Practices and Threat Mitigation Techniques 00:13:00
Manage Remote Access 00:06:00
Manage Wireless Security 00:15:00
Perform Backups and Disaster Recovery 00:16:00

Certificate of Achievement

Learners will get an certificate of achievement directly at their doorstep after successfully completing the course!

It should also be noted that international students must pay £10 for shipping cost.

CPD Accredited Certification

Upon successfully completing the course, you will be qualified for CPD Accredited Certificate. Certification is available –

Course Reviews

4.8

4.8
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

Course Info

4.8
9 Enrolled
  • Development
  • Personal Development
PRIVATE COURSE
  • PRIVATE
  • 1 year
  • Number of Units128
  • Number of Quizzes0
  • 2 days, 1 hour

© 2024 IMPERIAL ACADEMY COPYRIGHT