IT Administration and Networking
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Duration
1 Year
-
Start date
Different dates available
-
Support service
Yes
-
Virtual classes
Yes
If you enjoy working with both hardware and software and can manage others, then becoming an IT administrator is a great career choice for you.
IT administrators perform a variety of duties including maintaining the company’s IT network, servers, security systems, and other essential tasks.
Facilities
Location
Start date
Start date
About this course
The IT Administration and Networking course will explain how to recognise computer components, install software and establish network connectivity, anticipate and detect security risks and identify compatibility issues. You will learn about preventative maintenance and understand a company’s network policy, monitoring internet and email use. Prepare yourself for a rewarding job career and gain a comprehensive understanding of Information Technology.
taking this course will let you the opportunity to build a strong foundation from which to start or advance your career in the IT field.
The IT Administration and Networking is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.
Upon successful completion, you will qualify for the UK and internationally-recognised professional qualification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £19 and Hardcopy Certificate for £34.
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 5 years
Subjects
- Risk
- Network Training
- Wireless
- Networking
- Network
- Engineering
- IT risk
- Operating System
- Licensing
- Software Tools
Course programme
Software:
- What is an Operating System
- Configuring the Operating System
- What is an Application
- Using Control Panel
- Software and Concepts
- Licensing
- Using Software
- Software Tools
- Software
- Hardware, Devices, and Peripherals
Hardware:
- Hardware and Peripherals
- Storage
- Connectivity Devices
- Network Components
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
- Classify Threats and Threat Profiles
- Perform Ongoing Threat Research
- Resources that Aid in Research of Threats
- Implement Threat Modeling
- Assess the Impact of Reconnaissance Incidents
- Performing Reconnaissance on a Network
- Examining Reconnaissance Incidents
- Assess the Impact of Social Engineering
- Assessing the impact of Social Engineering
- Assessing the Impact of Phishing
- Types of Wireless Attacks
- Intrusion Monitoring
- Wireless Security Risks
- Authentication Attacks
- Rogue Devices
- Public Hotspots
- Wireless Security Monitoring
- Device Tracking
- WLAN Security Infrastructure
- Management Protocols
- Other RADIUS Solutions
Security:
- Introduction
- Child Safety Online
- Secure Payment Sites
- Online Banking
- How To Keep Your Password Safe
- Common Scams
- How I Got Pharmed
- Virus Protection
- Self Maintenance
- Personal Information Online
- Is The Internet Safe?
- Importance of Cyber Security
- Spyware Can Destroy
- How Does Spyware Spread?
- How To Remove Spyware
- Anti Spyware Program
- The Anti Anti-Spyware Programs
- Research And Learn More
- Choosing The Best Anti Spyware Tool
- Computer Security And Spyware
- The Programs To Avoid
- Is It Legal?
- Checklist Of Protection
- The Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
- Social Engineering
- Malware
- Software-Based Threats
- Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
- A Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
- Respond to Security Incidents
- Recover from a Security Incident
Networking:
- OSI Layers
- LANs and WANs
- Network Types
- Transmissions
- Cables
- Fiber Optics
- Converters and Connectors
- Wireless Security
- Authentication.prproj
- Wireless Security Threats
- TACACS
- Keys
- RADIUS
- VPN Technologies
- Tunneling Protocols.prproj
- Acceptable Use
- Common Problems
- Troubleshooting
- Network Technician Tools
- Physical and Logical Issues
- Open or Closed Ports
- ARP Issues
Basic IT Literacy:
- Core Concepts in Healthcare IT
- EMR EHR Issues
- Regulations, Standards, and Stakeholders
- HIPAA Controls and Compliance
- Roles and Responsibilities
- Manage Communication and Ethics Issues
- Legal Best Practices, Requirements, and Documentation
- Medical Document Imaging
- Sanitation Management
- Computing Essentials
- Networking
- Manage Servers and Software
- Hardware Support
- Set Up a Workstation
- Troubleshoot Basic IT Issues
- Troubleshoot Medical IT Issues
- Implementation of an EMR EHR System
- Change Control
- Manage Physical and Logical Security
- Implement Security Best Practices and Threat Mitigation Techniques
- Manage Remote Access
- Manage Wireless Security
- Perform Backups and Disaster Recovery
How is the course assessed?
- To successfully complete the course you must pass an automated, multiple-choice assessment. The assessment is delivered through our online learning platform. You will receive the results of your assessment immediately upon completion.
IT Administration and Networking