Module 1 | Windows Operating Systems 1.1 – Microsoft Operating Systems |
Unit 1 | 1.1 An Overview of Windows Vista (4:24) |
Unit 2 | 1.1 An Overview of Windows 7 (5:14) |
Unit 3 | 1.1 An Overview of Windows 8 and 8.1 (4:31) |
Unit 4 | 1.1 Windows Features (16:36) |
Unit 5 | 1.1 Windows File Structures and Paths (4:11) |
Unit 6 | 1.1 Windows 8 and 8.1 Features (7:00) |
Unit 7 | 1.1 Windows Upgrade Paths (7:54) |
Module 2 | Windows Operating Systems 1.2 – Installing Windows |
Unit 1 | 1.2 Planning a Windows Installation (14:39) |
Unit 2 | 1.2 Installing Windows Vista (6:44) |
Unit 3 | 1.2 Installing Windows 7 (6:29) |
Unit 4 | 1.2 Installing Windows 8 and 8.1 (7:00) |
Module 3 | Windows Operating Systems 1.3 – The Windows Command Line |
Unit 1 | 1.3 Operating System Command Line Tools (25:32) |
Unit 2 | 1.3 The Windows Recovery Environment Command Prompt (6:29) |
Module 4 | Windows Operating Systems 1.4 – Windows Operating System Features |
Unit 1 | 1.4 Windows Administrative Tools (9:43) |
Unit 2 | 1.4 Windows Firewall with Advanced Security (4:42) |
Unit 3 | 1.4 Using Windows System Configuration (3:45) |
Unit 4 | 1.4 Using Windows Task Manager (3:27) |
Unit 5 | 1.4 Using Windows Disk Management (7:54) |
Unit 6 | 1.4 Windows Migration Tools (5:15) |
Unit 7 | 1.4 Windows System Utilities (12:39) |
Module 5 | Windows Operating Systems 1.5 – The Windows Control Panel |
Unit 1 | 1.5 The Windows Control Panel (9:46) |
Module 6 | Windows Operating Systems 1.6 – Windows Networking |
Unit 1 | 1.6 Windows HomeGroup, Workgroups, and Domains (5:17) |
Unit 2 | 1.6 Windows Network Technologies (5:13) |
Unit 3 | 1.6 Establishing Windows Network Connections (4:51) |
Unit 4 | 1.6 Configuring Windows Firewall (5:24) |
Unit 5 | 1.6 Windows IP Address Configuration (7:09) |
Unit 6 | 1.6 Configuring Network Adapter Properties (5:26) |
Module 7 | Windows Operating Systems 1.7 – Windows Preventive Maintenance |
Unit 1 | 1.7 Windows Preventive Maintenance Best Practices (5:53) |
Unit 2 | 1.7 Windows Preventive Maintenance Tools (3:13) |
Module 8 | Other Operating Systems and Technologies 2.1 – Mac OS and Linux |
Unit 1 | 2.1 Best Practices for Mac OS (3:10) |
Unit 2 | 2.1 Best Practices for Linux (3:13) |
Unit 3 | 2.1 Mac OS Tools (5:03) |
Unit 4 | 2.1 Linux Tools (4:31) |
Unit 5 | 2.1 Mac OS Features (6:39) |
Unit 6 | 2.1 Basic Linux Commands (13:31) |
Module 9 | Other Operating Systems and Technologies 2.2 – Virtualization |
Unit 1 | 2.2 Client-side Virtualization (5:06) |
Module 10 | Other Operating Systems and Technologies 2.3 – Cloud Computing |
Unit 1 | 2.3 Basic Cloud Concepts (6:32) |
Module 11 | Other Operating Systems and Technologies 2.4 – Network Services |
Unit 1 | 2.4 Network Services (9:26) |
Module 12 | Other Operating Systems and Technologies 2.5 – Mobile Operating Systems |
Unit 1 | 2.5 Mobile Operating System Features (6:32) |
Module 13 | Other Operating Systems and Technologies 2.6 – Mobile Connectivity |
Unit 1 | 2.6 Mobile Device Connectivity (5:51) |
Unit 2 | 2.6 Configuring Email on Mobile Devices (4:24) |
Module 14 | Other Operating Systems and Technologies 2.7 – Mobile Synshronization |
Unit 1 | 2.7 Mobile Device Synchronization (3:34) |
Module 15 | Security 3.1 – Security Threats |
Unit 1 | 3.1 Common Security Threats (18:18) |
Module 16 | Security 3.2 – Security Prevention Methods |
Unit 1 | 3.2 Physical Security Prevention Methods (6:44) |
Unit 2 | 3.2 Digital Security Prevention Methods (13:34) |
Unit 3 | 3.2 Security Awareness (2:46) |
Module 17 | Security 3.3 – Windows Security |
Unit 1 | 3.3 Windows Security Settings (9:28) |
Module 18 | Security 3.4 – Security Best Practices |
Unit 1 | 3.4 Workstation Security Best Practices (9:12) |
Module 19 | Security 3.5 – Securing Mobile Devices |
Unit 1 | 3.5 Securing Mobile Devices (9:00) |
Module 20 | Security 3.6– Data Destruction and Disposal |
Unit 1 | 3.6 Data Destruction and Disposal (4:13) |
Module 21 | Security 3.7 – Securing a SOHO Network |
Unit 1 | 3.7 Securing a SOHO Network (13:09) |
Module 22 | Software Troubleshooting 4.1 – Troubleshooting Operating Systems |
Unit 1 | 4.1 Operating System Troubleshooting (14:07) |
Unit 2 | 4.1 Operating System Troubleshooting Tools (10:01) |
Module 23 | Software Troubleshooting 4.2 – Troubleshooting Security Issues |
Unit 1 | 4.2 Troubleshooting Common Security Issues (10:51) |
Unit 2 | 4.2 Tools for Security Troubleshooting (7:33) |
Unit 3 | 4.2 Best Practices for Malware Removal (5:21) |
Module 24 | Software Troubleshooting 4.3 – Troubleshooting Mobile Device Applications |
Unit 1 | 4.3 Mobile Device App Troubleshooting (9:13) |
Module 25 | Software Troubleshooting 4.4 – Troubleshooting Mobile Device Security |
Unit 1 | 4.4 Mobile Device Security Troubleshooting (5:45) |
Module 26 | Operational Procedures 5.1 – Computer Safety Procedures |
Unit 1 | 5.1 Managing Electrostatic Discharge (3:16) |
Unit 2 | 5.1 Computer Safety Procedures (5:04) |
Module 27 | Operational Procedures 5.2 – Environmental Controls |
Unit 1 | 5.2 Managing Your Computing Environment (6:24) |
Module 28 | Operational Procedures 5.3 – Dealing with Prohibited Activity |
Unit 1 | 5.3 Prohibited Activity and End User Policies (5:48) |
Module 29 | Operational Procedures 5.4 – Communication and Professionalism |
Unit 1 | 5.4 Communication (4:13) |
Unit 2 | 5.4 Professionalism (4:12) |
Module 30 | Operational Procedures 5.5 – Troubleshooting Theory |
Unit 1 | 5.5 How to Troubleshoot (4:42) |
Powered By WP Courseware