IT Administrator Diploma

Course

Online

£ 317 VAT inc.

Description

  • Type

    Course

  • Level

    Advanced

  • Methodology

    Online

  • Duration

    1 Year

  • Start date

    Different dates available

  • Online campus

    Yes

  • Delivery of study materials

    Yes

  • Support service

    Yes

  • Virtual classes

    Yes

IT Administrator Diploma is one of our best selling and most popular course.

This course is suitable for anyone aspiring to or already working in IT and looks at skills needed to improve IT . By taking this course you will gain the necessary skills to perform effectively in this field.

The IT Administrator Diploma is organised into 5 modules and includes everything you need to become successful in this profession.

To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 48 hours!

If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

IT Administrator Diploma is suitable for anyone who want to gain extensive knowledge, potential experience and professional skills in the related field. This is a great opportunity for all student from any academic backgrounds to learn more on this subject.

Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of 9.99 and PDF Certificate at 4.99.

Earn a free e-certificate upon successful completion.
Accessible, informative modules taught by expert instructors
Study in your own time, at your own pace, through your computer tablet or mobile device
Benefit from instant feedback through mock exams and multiple-choice assessments
Get 24/7 help or advice from our email and live chat teams
Full Tutor Support on Weekdays

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Wireless
  • Risk
  • Network
  • Engineering
  • IT risk
  • Network Training
  • Operating System
  • System
  • Configuring
  • Control
  • Control panel
  • Licensing

Course programme

Software:
  • What is an Operating System
  • Configuring the Operating System
  • What is an Application
  • Using Control Panel
  • Software and Concepts
  • Licensing
  • Using Software
  • Software Tools
  • Software
  • Hardware, Devices, and Peripherals
Hardware:
  • Hardware and Peripherals
  • Storage
  • Connectivity Devices
  • Network Components
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing
  • Types of Wireless Attacks
  • Intrusion Monitoring
  • Wireless Security Risks
  • Authentication Attacks
  • Rogue Devices
  • Public Hotspots
  • Wireless Security Monitoring
  • Device Tracking
  • WLAN Security Infrastructure
  • Management Protocols
  • Other RADIUS Solutions
Security:
  • Introduction
  • Child Safety Online
  • Secure Payment Sites
  • Online Banking
  • How To Keep Your Password Safe
  • Common Scams
  • How I Got Pharmed
  • Virus Protection
  • Self Maintenance
  • Personal Information Online
  • Is The Internet Safe?
  • Importance of Cyber Security
  • Spyware Can Destroy
  • How Does Spyware Spread?
  • How To Remove Spyware
  • Anti Spyware Program
  • The Anti Anti-Spyware Programs
  • Research And Learn More
  • Choosing The Best Anti Spyware Tool
  • Computer Security And Spyware
  • The Programs To Avoid
  • Is It Legal?
  • Checklist Of Protection
  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals
  • Social Engineering
  • Malware
  • Software-Based Threats
  • Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities
  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security
  • A Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques
  • Respond to Security Incidents
  • Recover from a Security Incident
Networking:
  • OSI Layers
  • LANs and WANs
  • Network Types
  • Transmissions
  • Cables
  • Fiber Optics
  • Converters and Connectors
  • Wireless Security
  • Authentication.prproj
  • Wireless Security Threats
  • TACACS
  • Keys
  • RADIUS
  • VPN Technologies
  • Tunneling Protocols.prproj
  • Acceptable Use
  • Common Problems
  • Troubleshooting
  • Network Technician Tools
  • Physical and Logical Issues
  • Open or Closed Ports
  • ARP Issues
Basic IT Literacy:
  • Core Concepts in Healthcare IT
  • EMR EHR Issues
  • Regulations, Standards, and Stakeholders
  • HIPAA Controls and Compliance
  • Roles and Responsibilities
  • Manage Communication and Ethics Issues
  • Legal Best Practices, Requirements, and Documentation
  • Medical Document Imaging
  • Sanitation Management
  • Computing Essentials
  • Networking
  • Manage Servers and Software
  • Hardware Support
  • Set Up a Workstation
  • Troubleshoot Basic IT Issues
  • Troubleshoot Medical IT Issues
  • Implementation of an EMR EHR System
  • Change Control
  • Manage Physical and Logical Security
  • Implement Security Best Practices and Threat Mitigation Techniques
  • Manage Remote Access
  • Manage Wireless Security
  • Perform Backups and Disaster Recovery
Mock Exam
  • Mock Exam – IT Administrator Diploma
Final Exam
  • Final Exam – IT Administrator Diploma

IT Administrator Diploma

£ 317 VAT inc.