Or follow us:
Join now to receive our Course Deals  

Buy Any Course or Bundle This Month & Get The Personal Success Training Program FREE

Ultimate Introduction to PC Security Online Bundle, 10 Certificate Courses

The Most Comprehensive Introduction to PC Security Bundle


Get Introduction to PC Security, Advanced PC Security, Basic CompTIA A+ Certification Prep, CompTIA Security+ Certification Prep 1, CompTIA Security+ Certification Prep 2, Computer Skills for the Workplace, Advanced Computer TIA A+ Certification Prep, CompTIA Network+ Certification Prep, Intermediate C# Programming and Intermediate CompTIA A+ Certification Prep in this Bundle

1. Introduction to PC Security :  Learn the Fundamentals of PC and Network Security

This Certificate in Introduction to PC Security Online Course, taught by a security expert, will quickly bring you up to speed on the fundamentals of PC and network security.

You'll understand and explore the many vulnerabilities of operating systems, software, and networks. Then, you'll get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You'll find out why, where, and how viruses, worms, and blended threats are created. You'll be able to identify and work to prevent DoS, SYN flooding, and other network attacks. You'll learn a safe way to share files and data across the Internet through a virtual private network. And you'll be able to install and configure a firewall to build an impenetrable moat around your computer or network.

What you don't know about PC security really can hurt you! Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world.

2. Advanced PC Security :  Understand the complex method of electronic breaking and entering

You'll gain an understanding of the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. You'll follow packets of data from one point to another through an entire network, and find out where the flaws exist for data loss and security breaches. You'll discover the role of the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. And you'll find out how private data can quickly become public knowledge. 

Hackers are costing businesses around the globe several billions of dollars every year. Don't become part of that sad statistic. Sooner or later, you know that somebody is going to try and break into your network. Why not learn how hackers think so you can harden your defenses against them?

When is hacking legal? When you use it to secure your own network. This new method of hacking, called ethical hacking or white-hat hacking, uses common and readily available hacking tools and techniques to audit your network so you can locate and close security holes. Whether you're running a small home network or you're an enterprise network administrator, this course will teach you how to better protect your system against those who wish to gain unauthorized access.

3. Basic CompTIA A+ Certification Prep :  Learn About the Common Hardware of Every Personal Computer

Time to roll up those sleeves and dive inside the personal computer!  The Basic CompTIA A+ Certification Prep course teaches you about the hardware common to virtually every personal computer, including microprocessors, RAM, power supplies, motherboards, BIOS, CMOS, the expansion bus, and input/output devices. You'll learn how things work, how to configure everything, and how to troubleshoot in real world environments. This course gives you the knowledge upon which you'll base the rest of your CompTIA A+ certification studies for the 220-801 and 220-802 exams. Plus it helps you take that first step to becoming an excellent PC technician. So what are you waiting for?!?

4. CompTIA Security+ Certification Prep 1 :  Start Now To Learn The CompTIA® Security+ Certification Prep 1 Online Course

The U.S. Department of Labor forecasts that information security analysts will be among the fastest-growing occupations through 2022. CompTIA's Security+ certificate is widely regarded as the entry-level certificate for this fast-growing field. Getting that certificate requires passing CompTIA's challenging SY0-401 exam.

This course covers the key terminology and concepts you need to know to ace the exam, all in a condensed format for rapid reading. The course provides helpful study tools including crossword puzzles, games, and practice questions to aid with learning. All of the content is geared toward helping you pass the SY0-401 exam so you can leave the test center with your Security+ certificate in hand.

Please note that if you received your Comp TIA Security+ certification before 1/1/2011, you will be a lifetime credential holder not subject to credential renewals. However, if you achieve your certification after 1/1/2011, you are subject to a CompTIA Security+ renewal process every three years.

5. CompTIA? Security+ Certification Prep 2 :  Start Now To Learn ComTIA® Security+ Certification Prep 2 Online Course

CompTIA's Security+ certificate is widely regarded as the entry-level certificate for this fast-growing field. Getting that certificate requires passing CompTIA's challenging SY0-301 exam.

This course, the second of two courses, reviews the key terminology and concepts needed to ace the exam, all in a condensed format for rapid reading. The course provides helpful study tools, including crossword puzzles, games, and practice questions to aid your learning. All of the content is geared toward helping you prepare to pass the SY0-301 exam, so you can leave the test center with your Security+ passing score in hand.

Please note that you will be subject to a CompTIA Security+ renewal process every three years.

6. Computer Skills for the Workplace :  Learn How to Implement the Powers of Modern Office Software

Most jobs today require a working knowledge of certain computer skills. Employers seek and reward employees with the skills and knowledge to send messages across the country via e-mail; use a spreadsheet to create a graph and paste it into a report; add and edit data in a database; understand the implications of file sizes, memory limitations, and network arrangements; and recognize the function and features of modern computer components. Any job candidate who already possesses these skills will stand above those who do not.

This computer skills for the workplace online course is designed to provide the fundamental computer competencies you need to survive and prosper in today's fast-changing workplace.

You will learn how to implement the powers of modern office software to work faster and more efficiently.

We'll focus on practical application for software most common to the workplace. When you finish this course, you will have learned why employers consider technological literacy so critical to the success of any organization.

7. Advanced Computer TIA A+ Certification Prep :  Finish your CompTIA A+ Certification by focusing in fun technology

The Advanced CompTIA A+ Certification Prep course focuses on fun technology. You’ll learn everything you need to know to select, install, and service video, sound, and portable computers.

The course teaches networking, both wired and wireless, because every well-rounded tech needs to know it. You’ll learn about security, security, security. Plus you’ll learn my troubleshooting methodology, tried and true in countless computer crises. The Advanced course completes the three-course CompTIA A+ Certification Exam Prep cycle and prepares you for both the 2009 exams and for real life as a PC tech. Let’s get to it!

8. CompTIA Network+ Certification Prep :  Start Now To Learn CompTIA® Network+ Certification Prep Online Course 

This course will teach you everything you need to know to take and pass the challenging CompTIA Network+ certification exam and become an excellent network technician. You'll learn about topologies, the OSI Seven-Layer model, protocol suites, modern network operating systems, network hardware, cabling standards, remote connectivity, Internet connections, network troubleshooting, and more. This course will prepare you for the 2009 exam objectives (N10-005 and JK0-016). CompTIA Network+ certification also counts as one of the elective exams for the Microsoft Certified Systems Administrator (MCSA) certification.

9. Intermediate C# Programming :  Learn Net Framework Foundation and Common GUI Controls

This Certificate in Intermediate C# Programming Online Course will show you how to write professional looking applications with many of the common GUI controls, such as buttons, labels, text boxes, check boxes, and radio buttons. You'll also learn how to put menus and toolbars into your program to make them easier to use. And later in the course, you'll find out how to make your program interact with sequential files, random access files, and databases.

This six-week course will walk you through computer application design and implementation by giving you real examples that you can enter as you learn. Since practicing is the best way to learn programming, most lessons have more than one example, and each provides a programming problem you can solve to demonstrate your new knowledge.

10. Intermediate CompTIA A+ Certification Prep : Start Now To Learn Intermediate CompTIA A+ Certification Prep

The Intermediate CompTIA A+ Certification Prep course picks up where the Basic course left off and plunges you head-first into Windows. You learn how to install, organize, maintain, and troubleshoot three different versions of Windows. You'll examine and compare the features and structures of Windows XP, Vista, and 7. Toward the end of the course you'll get a deeper understanding of how we use virtualization and virtual machines in modern networks. Plus you'll learn about printers, from the various technologies in use to installing and troubleshooting. This course takes you through the second of three steps you need to become both a highly-competent PC tech and a CompTIA A+ certified technician, using the 801 and 802 competencies. 

For comprehensive information on units of study click the units of study tab above.

This is an incredible opportunity to invest in yourself and your future, sharpen your training skills and learn what it takes to create your own success with Courses For Success Today!

Course Fast Facts:

  1. This course is delivered 100% on-line and is accessible 24/7 from any computer or smartphone
  2. Instructors lead each course and you will be able to interact with them and ask questions
  3. You can study from home or at work at your own pace in your own time
  4. You can download printer friendly course material or save for viewing off line
  5. You will be awarded a certificate at completion of this course

How to study online course?

Upon enrolment an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. New courses start every month to ensure that we have the correct ratio of students to tutors available, please ensure you select a starting date when you go through our shopping cart, at checkout. The course is easy to follow and understand.

Recognition & Accreditation

All students who complete each course receive a certificate of completion per course, with a passing score (for the online assessment) and will be issued a certificate via email.

Introduction to PC Security 10 Course Bundle includes the following courses, below is a summary of each course: 

Course 1 - Certificate in Introduction to PC Security Online Course

Introduction to PC Security
In our first lesson, you'll learn the facts--and the myths--about PC security. Then, I'll introduce you to the language of security and explain what you need to know about each acronym. By the end of this lesson, you'll also be able to assess your own risk, whether you're an individual or manage a network of any size. You'll also perform a self-assessment to evaluate just how vulnerable you are to security flaws.
 
Your PC and Network
If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you'll find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.
 
PCs, Networks, and Software Demystified
Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you'll learn all about it in this lesson. I'll also teach you how, why, and where the weak links of security are in software and operating systems.
 
Viruses, Worms, Blended Threats, and More
Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. I'll also show you why people create them and where they come from. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.
 
The Family of Malware
We’ll introduce you to the ware family in this lesson. Who is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You'll meet them and learn all about their family traits and values. I'll also show you where they live, places they frequent, and how to remove these unwelcome guests that inhabit your PC.
 
Exploits and Vulnerabilities
You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you'll find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.
 
Network Attacks
Have you ever tried to access the Web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? If so, you may have been under an attack! Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. Why? Because beginners don't know what they are, why they're happening, or where they're coming from. After this lesson, you'll no longer be left wondering what happened to your Internet connection.
 
Everything You Wanted to Know About Firewalls! (Part One)
This lesson will introduce you to firewalls. Join me in this lesson, and you'll soon start building an impenetrable moat around your network.
 
Everything You Wanted to Know About Firewalls! (Part Two)
Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you'll learn how to configure your firewall and maximize your network security.

Laptops, Notebooks, Netbooks, and Wireless Networking
You may want to check out this lesson before you grab your laptop and run off to the next Internet café, because what you learn today may surprise you! Laptops and wireless connectivity are the buzzwords of the moment, but these two technologies aren't as secure as they appear. You'll understand why in this lesson.
 
Virtual Private Networking (VPN)
I'm going to share my love for VPNs with you today. You'll learn what a Virtual Private Network is, how it's different from standard networks, how it works, how to secure it, and how to set up your own. Just think about the possibilities! You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.
 
The Changing Face of Security
Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? Have no fear, for I'll show you a simple method for staying up-to-date with those security issues that only pertain to you. You'll also learn about emerging security technology, sources to use that will help make the job of managing and securing your network easier, and creating a checklist to keep handy. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.

Course 2 - Certificate in Advanced PC Security Online Course

Introduction to Hacking

If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!

Social Engineering

This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!

Google Hacking 101

If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.

Google Hacking 102

In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!

 

 The Network Model

Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model. And I assure you it will be painless!

 The Internet and Packet Spoofing

Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.

 Vulnerabilities

Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.

Port Scanning and Discovery

We all know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, we'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.

 Services

While the term necessary evil is a cliché, we do have a few necessary evils in the computing world. In order to make networks function, sometimes we need to run programs that might not be good for our security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.

Roots and Rootkits

Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's both hard to find and hard to get rid of rootkits, so for the sake of your PC's security, get ready to apply this lesson today!

 Audit Plan and Risk

Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, we'll talk about what to do once you've found them.

Computer Forensics

If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.

Course 3 - Certificate in Basic CompTIA A+ Certification Prep Online Course

The Art of the Tech
In Lesson 1, I'll introduce you to the course and to the CompTIA A+ certification, and then move right into essential information for every tech. You'll get the scoop on how the many components of the personal computer work together. We'll discuss how professional techs behave and interact with clients. And we'll finish with a tried-and-true troubleshooting methodology that will apply to all tech situations.

The Visible PC
In Lesson 2, we'll take a tour of the PC, starting with the exterior connectors. We'll go into details of the interior devices as well. Our goal is to begin teaching proper tech terminology and familiarize you with standard PC components.
    
Maintenance and Safety Precautions
Today, we dive into the important safety techniques that every good tech absolutely needs to know. These range from how to clean the PC to methods to avoid tech-induced damage to how to dispose of old parts safely.

Central Processing Units
In this lesson, I'll deliver the goods on central processing units, the core processing component in every PC. I'll explain variations in technology and then give practical information and advice on installing and troubleshooting CPUs.

RAM
In Lesson 5, we'll dig into the details of one of the foundations of the PC: RAM. With RAM, the CPU can make magic happen. Without it? Literally nothing can happen. You'll learn about the different varieties of RAM and proper techniques for installing it. Then, we'll wrap up the lesson with troubleshooting RAM and memory problems.

BIOS and CMOS
In this lesson, I'll teach you about the essential programming that makes computers function, what's called the BIOS. Plus, you'll learn about the special tools we use for storing configuration options for BIOS, called the CMOS. It's awesome stuff!

Motherboards and Cases
In Lesson 7, I'll teach you all about motherboards, the bedrock of every PC. You'll learn form factors, types of expansion slots, and installation steps for expansion cards. In this lesson, we'll also cover upgrading, installing, and troubleshooting motherboards.
    
Powering the PC
Today, I'll introduce you to power supplies and the basics of powering a PC. You'll learn about how electricity gets from your wall outlet into your PC, along with how to test that electricity. I'll teach you about the many power supply standards and how to install one inside your PC. Finally, we'll discuss how to troubleshoot a power supply with problems.

Input Devices
In this lesson, you'll learn about devices that enable you to input data into your computer. I'll discuss standard input devices (like keyboards and mice) and multimedia devices (like digital cameras and webcams). I'll also teach you about connecting those devices to your computers using connectors like USB and FireWire.
    
Hard Drive Technologies
Today, we'll dig into hard drive technologies, including traditional hard disk drives and modern solid-state drives. You'll also learn how to install hard drives. I'll explain the fundamentals of protecting data with RAID technology and give you some tips and tricks for troubleshooting bad drives.
    
Implementing Hard Drives
In Lesson 11, you'll learn how to prepare a hard drive for use by an operating system. I'll teach you about partitioning and formatting a hard drive. We'll also cover maintaining your data using several included Windows utilities.

Removable Media
As we wrap up the course, you'll learn about the various forms of removable media. I'll teach you about older formats like floppy disks and tape drives. We'll discuss flash media like USB thumb drives and memory cards. Finally, you'll learn about optical media like DVDs and Blu-ray Discs, as well as external drives.

Course 4 - Certificate in CompTIA Security+ Certification Prep 1 Online Course

The Security+ Exam and Basic Network Security

Computer security and related computer-support specialties are among today's fastest-growing occupations. Getting a CompTIA Security+ credential is your first step to gaining entrance into this exciting, fast-paced field. By the time you finish this first lesson, you'll know what you need to do to achieve a Security+ credential. You'll also understand the basic goals, tools, and techniques of computer security.

Network Security Administration

In this lesson, we'll review the tasks and actions a secure network administrator performs, including setting up security rules and ensuring secure device configurations. We'll also cover what you need to consider in the design of a secure network. You'll learn the definitions, structures, and methods that combine to create a secure network environment.

Network Security Protocols

In Lesson 3, we'll explore the common network security protocols and ports in use on secure networks, and we'll discuss which ones are most likely to show up on the Security+ exam. You'll learn the purpose and function of each of the protocols and features in this lesson. This knowledge will help you not only pass the exam, but also work as a successful secure network administrator.

Compliance and Operational Security: Part 1

If you work as a secure network administrator, you'll spend most of your days focusing on risk. Risk comes in many forms, and identifying, mitigating, and reducing risk is what network security is all about. In this lesson, you'll get a broad overview of how we deal with risks. We'll explore security policies, risk analysis, risk control methods, and the duties of risk administration.

Incident Response

Despite your best efforts, there are times when a security incident will occur. In this lesson, you'll learn how to respond to an incident. We'll explore the forensic processes you can use to gather evidence after an incident, and we'll go over the procedures you'll use to report and record the outcome of your investigation. With thorough incident response, you'll be able to minimize the damage from an incident and find out how you can prevent similar incidents from happening in the future.

Compliance and Operational Security: Part 2

In this lesson, we'll explore some topics important to keeping your network secure and performing at its best. We'll start with user awareness. When it comes to preventing security incidents, how can you make an organization's employees your allies instead of your enemies? We'll look at some compliance procedures that can help. We'll also discuss how we classify information according to its sensitivity and then apply security protections accordingly. Next, we'll investigate some physical and logical security options. Finally, we'll talk about how to secure the network's environment from hazards such as weather, fire, and high heat or humidity. There's a lot to think about when securing a network, but you'll get a good grasp on the ins and outs in this lesson.

Threat Awareness, User Behaviors, and Business Continuity

Many of the threats that face a secure network come from sources you might not expect. Network users can be unknowingly creating vulnerabilities every day. The Web provides avenues to attackers who wish to infect networks with viruses, phishing attacks, and other types of exploits. The expansion of social networking and even simple peer-to-peer file sharing across a network can also add new types of threats to your network. While these threats can affect the network, they can also interrupt the continuity of your business operations. In this lesson, we'll investigate each potential threat and how you can keep threats at bay.

Redundancy, Fault Tolerance, and Resiliency

Even the best security designs and implementations are only in effect if an entire system is up and running. If part of a system or network fails, its security measures could also fail simply because they aren't running. In this lesson, we'll look at the various methods and technologies that help to ensure that a system or network remains up and running. We'll explore redundancy and fault tolerance, and how RAID can help us achieve them. We'll also look at high availability, clustering, load balancing, failover, and network resiliency. By the end of this lesson, you'll have a good understanding of how these technologies help prevent network downtime.

Malware, Network, and Social Engineering Attacks

This is the first of three lessons in which we'll focus on threats and vulnerabilities. In Lesson 9, we'll cover the various types of malware, the different types of attacks that threaten your network, and the variety of social engineering attacks that seek to gain information about you, your users, your organization, and your network. Once you know your enemy, you'll be better prepared to protect your network.

Wireless Threats and Vulnerabilities

So far, we've talked about many threats that affect wired networks. But wireless networks have their own unique set of threats and vulnerabilities. In this lesson, we'll look at these wireless threats and vulnerabilities. You'll find out the strategies behind many wireless attacks, including client-to-client attacks, war jacking, interception attacks, and more. Finally, you'll see how to design a wireless network for maximum security and mitigation of these threats.

Application and Injection Attacks

In this lesson, we'll continue our exploration of the many types of threats and vulnerabilities that can hurt a network with a look at application and injection attacks. This time, we'll also focus on the actions of attackers, the types of attacks they can launch, and the mitigation methods we can use to determine the nature and damage of an attack. By the end of this lesson, you'll not only be well-informed about the types of attacks you can expect to see while working in network security, but you'll also know what methods you can use to prevent and minimize damage from attacks.

Protective Measures

In the final lesson of the course, we'll explore a few methods and security measures that you can apply to a network to reduce its vulnerabilities. First, we'll talk about the hardening process, which includes tasks such as securing accounts, removing unnecessary accounts, and applying port security. Then we'll look at different types of intrusion detection and prevention systems. We'll wrap up with a discussion of the tools and processes some of these systems use. I'll show you how you can put some of the concepts you've been learning throughout this course into practice on a network.

Course 5 - Certificate in CompTIA? Security+ Certification Prep 2 Online Course

Authentication 

We'll start off with a brief review of the Security+ exam and its objectives. Then we'll jump right into talking about access control. Authentication—verifying that a user requesting entry to a system or network is who they claim to be—is the first step in access control, which protects valuable and sensitive resources from unauthorized users and evildoers. In this lesson, we'll explore authentication, as well as its methods, protocols, and devices.

Authorization and Access Control

Last time, we talked about the authentication step in access control. In this lesson, we're going to continue our exploration of access control with a closer look at authorization and types of access control. Both of these are extremely important parts of the security policies protecting network resources. We'll take a detailed look at the elements that make up these two processes.

Managing and Securing User Accounts

In this lesson, we'll cover the policy and administration of accounts in a secure environment. First, we'll go over the different types of accounts you might work with, including individual accounts and group accounts. Then we'll talk about password policies, which govern how to make passwords as strong as possible, when passwords should expire, and how to deal with lost or forgotten passwords. Lastly, we'll discuss permissions, privileges, and the administrative actions required to minimize vulnerability.

Risk Management

As network administrators, we're constantly managing risk. But what does that really mean? In this lesson, we'll investigate the elements of the risk management process, including vulnerabilities, threats, risks, and likelihood and the methods used to identify, determine, or calculate each. The ultimate goal of risk management is to reduce risk to a level that's acceptable to the system and organization. In this lesson, you'll discover the methods we use to figure out what level of risk is acceptable.

Penetration Testing, Vulnerability Scanning, and Data Recovery

Do you know the differences between penetration testing and vulnerability scanning? When is it best to use each? In this lesson, you'll find out the answers to those questions. We'll take a look at the six phases of the penetration testing process, and you'll find out how vulnerability management works. Then we'll look at methods of software vulnerability testing, including black box, white box, and gray box testing. We'll wrap up the lesson with a discussion of disaster recovery plans and data backup methods.

Data Security

How do we protect the crucial data that allows our organizations to function day in and day out? That's the question we'll address in this lesson. We'll start with a look at data loss prevention systems, which manage, identify, and protect data in its various states. You'll get acquainted with data encryption applications and hardware-based encryption devices. And we'll cover some considerations for off-site and remote data storage—what should you keep in mind about data when deciding where to store it and back it up? Maintaining your data's integrity and security is incredibly important, so you won't want to miss this lesson.

Application, Host, and Hardware Security

In Lesson 7, we'll focus on the security of application software. There are a few ways to make applications more secure, including application hardening and careful patch management. We'll see how these work, and we'll take a look at some common application attacks. You'll also see how to make sure the in-house software development process is as secure as you can make it. We'll even look at the ways in which a host computer is secured both internally and externally.

Securing Mobile Devices

As businesses go global and standard business hours no longer apply, mobile devices are becoming more common in organizational networks. In this lesson, we'll look at the threats mobile devices introduce and the security methods for removing these threats. We'll investigate some internal measures for dealing with mobile devices, including what you can to protect data if a device is lost or stolen. We'll also explore what you should include in external security policies for mobile devices, and you'll see how technologies like mobile biometrics, voice encryption, and GPS tracking can help on the mobile security front. Mobile devices are only getting more essential to both our business and personal lives, so securing them is an increasingly important priority.

Virtualization and Cloud Computing

If you're working in IT these days, chances are you're working with virtualization in some form. But what exactly is virtualization? In this lesson, we'll build on what you learned about it in the first course. You'll find out how server virtualization works, and we'll explore virtualization software and hardware. You'll also learn how virtualization can benefit an organization, and we'll discuss the particular security concerns that come along with it. We'll finish up with a look at the various types of cloud computing available today.

Cryptography

If you work in network security, being cryptic is just part of the job! Cryptography, or encryption, is what we use to prevent unauthorized people from being able to understand or use intercepted data. In Lesson 10, we'll explore the concepts behind encryption and the primary types of encryption in use. We'll talk about the most common encryption algorithms and ciphers, and you'll learn about the secure transport of encrypted data.

Public Key Infrastructure

With the Internet so integrated into our everyday lives, we depend on a security and validation system that most of us take for granted: the public key infrastructure (PKI). The PKI protects us, often unknowingly, against people and companies we don't know and may not trust if we did. In this lesson, you'll learn about the PKI and the security elements that work to protect you. We'll also talk about how and why they work.

Preparing for the Security+ Exam

The CompTIA Security+ exam covers a wide-range of security concepts, topics, terminology, and practices, as well as a bit of hardware and software. In this lesson, which is the last of the two prep courses for the Security+ exam, we'll review the key terms and concepts you'll see on the exam. We'll revisit what you really must know, and I'll give you some final tips for taking a CompTIA exam.

Course 6 - Certificate in Computer Skills for the Workplace Online Course

Overview: The Workplace Technology Solution

Whether you're looking for a new job or looking to improve your position at your current company, computer skills are essential to your success. In our first lesson, we'll examine how companies set up and use technology solutions. Then we'll take a close look at some of the components of those solutions. Just understanding how technology fits into the overall flow of work at your company will advance your position relative to your peers.

Outlook: E-Mail and Scheduling

Your computer has a software program installed on it that's referred to as an "operating system." Most often, this system is Microsoft Windows, but it could be others, such as Macintosh or Linux. In this lesson, you'll learn how this system controls many important parts of the computer and how you use those controls every day for tasks like managing where you keep important files, and printing hard copies of documents. We'll also talk about menus, taskbars, and shortcuts along the way.

Word: Creating and Formatting Documents

Next to e-mail, the word processor is probably the most frequently used application software in the workplace. Yet, if you've never taken the time to learn the basic features of most word processors, you're not performing nearly to your potential. In today's lesson, you'll learn and practice the important capabilities of word processors like Microsoft Word.

Word: More Advanced Formatting

There are many excellent features in Microsoft Word that can enable you to create and edit very professional-looking documents. In this lesson, we are going to incorporate some of the more advanced Word functions to create documents that are sure to impress your peers and your supervisor. We’ll focus on formatting and organizing your information using a wide range of Word processor tools.

Excel: Spreadsheet Basics

During today's lesson, we'll go over some important fundamental concepts related to spreadsheets, including spreadsheet organization, formatting, basic formulas, and data sorting. Once you discover how to create a basic budget spreadsheet, you'll see how the skills and knowledge you gain from this lesson can have a powerful impact on your ability to contribute more in the workplace.

Excel: Formatting, Charts, and Printing

In this lesson, we'll discuss more details about the spreadsheet, and how to provide easy-to-understand, accurate data. You'll learn how to build graphs that can graphically display numeric information so you can easily demonstrate trends, analyze past results, and predict future performance. You'll also find out how to use some advanced spreadsheet tools that can make your spreadsheets even more effective.

Access: Database Basics

During this lesson, we'll examine the components of a database, focusing primarily on the user interface. In your job, you might use this interface to perform a lot of different functions, including data input, data output, and data maintenance. Clerks work with databases to input information. Other employees might work with databases to filter, sort, and read information. Database-management personnel interface with databases to keep them accurate, reliable, and secure.

PowerPoint: Creating and Editing a Presentation

Powerpoint is an important tool for creating presentations suitable for the work environment. This powerful program has many features, but they must be used correctly or else your audience will be distracted or overloaded. In this lesson, we’ll explore the best ways to create an effective presentation that incorporates the right mix of multi-media. You’ll learn how to insert graphics and audio into your presentation in an effective and organized manner.

Integrating Microsoft Office Programs

The suite of Microsoft Office products includes Excel and Access, both very powerful on their own.  In this lesson, you are going to learn how to actually integrate information from one program to the other. You can create data lists with either one and easily transfer the information to the other. Considering all the work we do with lists on the computer, this is a very important skill in today’s work environment.

Using the Internet

In today's lesson, we’re going to have fun working with the Internet. This is the greatest source of information you'll ever have access to—yet it can confusing and overwhelming if you are not familiar with the basic Internet tools.  You’ll really enjoy seeing how easy it is to find information that specifically meets your needs and interests.

Transferring and Protecting Data

Today, we'll go various methods for transferring information from one computer to another. We’ll explore different terms used to describe the volume of information—or size of a file—and then learn how to most effectively and efficiently move that data from place to place. You’ll learn about bytes, megabytes, memory sticks, and external hard drives.

Putting Your Skills to Work

In our final lesson, we will focus on putting all your new knowledge to work! have three specific goals. The first is to identify ways to use your computer skills to find a new job. The second is to use those same computer skills to get a promotion within your current organization. Our third goal is to explore strategies for continued learning in order to support your ever-growing employment goals.

Course 7 - Certificate in Advanced Computer TIA A+ Certification Prep Online Course

Video Technologies

In this first lesson, I'll take you through the details of monitors—standard desktop and projectors—and video cards. You'll learn how they work and function together to produce the display you see.

Installing and Maintaining Video

In Lesson 2, I continue the discussion on video from Lesson 1. I start with video card processors and memory, then go through details about installation and configuration, including 3-D. You'll finish up with troubleshooting video.

Sound

In Lesson 3, I'll delve into the details of sound. We will explore how sound works in a digital environment and then examine all the components that work to record and play back sound.

Portable Computing Devices

Today we'll examine the many features of portable computers. We'll explore the many ways to expand the capabilities of portables, from connecting to external monitors to docking stations.

Maintaining and Upgrading Portables

In today's lesson, we'll cover three essential areas of knowledge for competent PC techs. You'll learn how to manage and maintain portable PCs. The lesson discusses in detail the processes for upgrading and repairing laptops and then finishes with lots of information on troubleshooting problems specific for portable PCs.

Wired Networking

In Lesson 6, I'll introduce you to wired networking. We'll cover topics such as network hardware, topologies, and software. I'll teach you about Ethernet, coaxial and fiber cabling technologies, and more. Let's connect!

Wireless Networking

Today we'll explore wireless technologies, starting with the basics, such as components, software, modes, security, speed, and range. You'll learn about wireless networking standards, such as radio wave and infrared networks. We'll finish the lesson with a look at installing, configuring, and troubleshooting wireless networks.

Networking in Windows

In Lesson 8, we'll delve deeply into the software side of networking. You'll learn details about TCP/IP, the primary protocol suite used today. I'll cover Windows-specific details as well, such as sharing and accessing shared resources. We'll finish the lesson with troubleshooting network-specific problems.

The Internet

Get ready to take the networking covered in previous lessons and expand it to fill the Internet. We'll start with a broad stroke on how the Internet works and then examine the various connections types to get onto the Internet. We'll wrap the lesson with a discussion of common Internet software tools.

Local Security

In today's lesson, we'll analyze security procedures for local area networks. I'll show you the many threats faced and then dive into access-control techniques. We'll hit on topics like data classification, compliance, and reporting procedures. It's more fun than it sounds from this description!

Network Security

Today, we'll jump into aspects of security in the big bad world, notably, discussing threats from outside your network. We'll look at malicious software types and how to deal with them. Then we'll turn to protections you should establish networkwide. The knowledge in this lesson is invaluable to you as both a tech and for the CompTIA A+ certification exams.

Mobile Devices and Convergence

In this our final lesson, you'll complete the trio of CompTIA A+ exam prep courses, focusing on the latest computing devices: mobile devices. You'll learn about the features and capabilities of smartphones and tablets. I'll also explain configuration techniques and describe best practices for securing mobile devices.

Course 8 - Certificate in CompTIA Network+ Certification Prep Online Course

Network Fundamentals
In Lesson 1, we'll examine the purpose of IT certifications, with specific emphasis on CompTIA Network+ and how it fits into the career of a network tech. We'll explore how networks work in general, covering such essential concepts as servers and clients, Ethernet, switches, and LANs. In the last two sections of the lesson, you'll examine two different models technicians have used to troubleshoot networks successfully: the OSI seven-layer model and the TCP/IP model.

Network Media
In this lesson, you'll learn about all kinds of network connections, such as cable types—coaxial, twisted-pair, and fiber—and wireless options. It should be fun and informative and carry you deeper into the CompTIA Network+ journey. 

Network Topologies and Standards
Here in Lesson 3, we'll jump into network topologies and standards, exploring Ethernet in detail. You'll get a shorter look at some other standards that used to matter as well, including the star topology, so you won't be surprised by them on the CompTIA Network+ exam.  

Network Hardware
Network hardware enables networking devices—nodes—to connect together into a network. In Lesson 4, we'll cover all the major device types, such as switches, routers, and wireless access points, teaching how they function in modern networks.

TCP/IP
Most modern networks use TCP/IP, so it's essential knowledge for competent techs. In Lesson 5, we'll delve into the protocol suite, discussing the many protocols included, how they work together, and what resources they require. We'll also discuss the addressing and naming conventions used in TCP/IP networks and how computers get named.

Routing
In Lesson 6, we'll delve into interconnecting networks, such as the Internet. Routers are the primary tools used for the job, so we'll explore how they work and the routing protocols they use.

Virtualization
In Lesson 7, I'll explain the many sides of virtualization, a process of using software to handle jobs traditionally serviced with hardware. We'll cover VLANs and virtual computing, and I'll describe how complex networks use these technologies to accomplish specific goals.

Wide Area Networking
In Lesson 8, we'll examine the many forms of remote connectivity, ways to interconnect a local computer or network with distant computers. We'll discuss everything from older-style dial-up and T-1 lines to the latest satellite and fiber connections.

Network Security
In this lesson, we'll discuss the many aspects of network security. We'll examine threats to your network, from social engineering to cracking encryption. Then we'll look at the many ways the good guys combat the bad guys through authentication and authorization standards and protocols.

The Complete Network
In Lesson 10, we'll start to put together everything you've learned so far in this course. You'll get the scoop on designing and implementing both wired and wireless SOHO networks. We'll also discuss specialized network devices and network configuration management.

Troubleshooting Networks
In Lesson 11, we'll roll up our sleeves and plunge into network troubleshooting. We'll look first at the CompTIA Network+ troubleshooting model and then examine top network hardware faults. We'll finish the lesson with a discussion on network hardware tools.

Configuring and Troubleshooting Hardware and Software

In this final lesson, we'll complete the network troubleshooting we began in Lesson 11, though this time we'll focus on software tools. You'll learn about essential network utilities to help you fix, maintain, and optimize your network.

Course 9 - Certificate in Intermediate C# Programming Online Course

Lesson 01
C# is a wonderful programming language that's been recently updated, and the improvements have made programming using C# even easier than before. In this lesson, I'll give you a brief overview of the C# language, then a tour of the fantastic, user-friendly Integrated Development Environment (IDE). You'll learn how easy it is to rapidly develop a simple graphical program with the IDE, and by the end of the lesson, you'll create your first interactive C# program.

Lesson 02
Programs aren't much fun without interactions, so today we'll start learning to communicate with our users. We'll discuss buttons, text boxes, and labels, and how you can use them for interaction. You'll also learn more about the IDE's Properties window, which allows you to customize your application so that you can grab a user's attention and make your program a work of art!

Lesson 03 
Now that you've used the basic controls to make attractive programs, we'll turn our attention to working calculations. I'll show you how to design your program to do simple math calculations and how easy it is to format numbers to make everything easy on your users. We'll also take some time to go over some other features that will make the user enjoy his or her experience with your programs.

Lesson 04
Are you one of those people who loves to use keyboard shortcuts? Maybe you take pride in your ability to use a graphical program without ever touching your mouse? Well maybe not, but there are definitely people out there who can't or prefer not to use a mouse. So today, you'll find out how to set up your applications to accommodate them. You'll also learn all about radio buttons and check boxes and the best ways to use them to make your users' experience as great as possible.

Lesson 05
Lists, lists, lists. We all have them and we all need a way to keep track of them. So in today's lesson, you'll learn how to put a list box in your program. You'll also find out about arrays and loops, which allow you to work with your lists to store, search, and remove items from a list.

Lesson 06
Now you're ready for some more complex, and more interesting, graphical elements. Have you ever noticed that almost every program you use has similar items in the menu? Well, the developers of C# have made this process pretty simple, and you'll learn all about it in this lesson. You'll also see how easy it is to make a toolbar and separate your program into multiple pages or tabs. These elements will help you to maximize the space on the screen.

Lesson 07
You may have heard that C# is an object-oriented programming (OOP) language, but do you know what that means? It turns out that it's just a different way of viewing a program and it's much different from procedural programming. In this lesson, you'll not only learn about the OOP model, but you'll also get your hands wet by creating such a program. You'll even get to experience the beauty of inheritance and polymorphism and see how they can allow you to structure your code so that it can be reused in future programs.

Lesson 08
Have you ever used a program and gotten one of those awful pop-ups that says a problem occurred and the program had to shut down? Usually this comes at a point in the program when you'll lose an hour or two worth of work. In this lesson, I'll show you how to make it so that those messages don't come up and ruin your user's experience. I'll also show you how to work with data files so that your programs can save the data to be used at a later time.

Lesson 09
In this lesson, you'll learn all about the Rich Text Box. This graphical element accepts formatted input from your user. As you learn more about this control in the lesson, you'll build your very own text editor that will allow the user to use bold, italics, color, and even a bulleted list.

Lesson 10
Databases are very important to the world we live in today. It seems that everyone has large amounts of information they want to store and access later. This lesson is the first of two database lessons in the course. You'll start with a small database and learn about the different elements that go into a database application. Continuing on, you'll see how easy it is to write a simple query to get information out of the database.

Lesson 11
This lesson builds upon your current database knowledge and adds more complex database interactions to it. To practice, you'll create an application that works with a database to organize your favorite Web sites. I'll even show you how to display a Web page inside your application. In the end, you'll have a program that's part organizer and part Web browser!

Lesson 12
For our final lesson, we'll turn our attention back to making our users' lives easier. Here, you'll learn about adding tool tips and context, or shortcut menus to your programs. You'll also learn how to make custom controls and splash screens to put your personal touch on your programs and make them unique. And what good is a program if you can't share it? For that reason, we'll finish up the course with a quick look at how to deploy your program so that everyone can enjoy it

Course 10 - Certificate in Intermediate CompTIA A+ Certification Prep Online Course

Installing Windows

In this first lesson, I'll teach you about installing Windows XP, Windows Vista, and Windows 7. You'll learn about the preparation required for installing any version of Windows, such as checking hardware requirements and backing up your personal files. I'll also show you the specific installation process for each version of Windows, along with what you need to do after you successfully complete the installation. Finally, I'll describe some common installation errors and how to recover from them.

Understanding Windows

In this lesson, you'll learn about the various versions and editions of Windows covered on the CompTIA A+ exams. I'll teach you about the main elements of the Windows interface, like the taskbar and Start menu, as well as show you how Windows is structured into special directories. Finally, I'll introduce you to some of the basic tools for configuring and maintaining Windows.

Organizing Windows

Today, you'll learn about more advanced features of Windows. I'll teach you about the key user and system folders of Windows. You'll also learn about how users, groups, and other features shape how you interact with Windows. Finally, we'll walk through the boot process for each version of Windows.

Windows Structures

Get ready to explore the structures that power Windows. You'll learn about the Registry, a database that stores everything about your PC. I'll teach you how Windows uses processes and services, the building blocks for everything running in Windows. Finally, you'll learn about special Windows tools for programmers

The Command-Line Interface

In today's lesson, you'll learn how to use the text-based command-line interface. I'll teach you about the command prompt and how to use it to navigate the Windows folder structure. You'll learn about basic commands for listing commands and creating new directories, and we'll discuss advanced commands for moving and copying files.

Maintaining Windows

Maintaining Windows is critical, so today we'll discuss how to download the latest Windows updates and service packs from Microsoft. You'll also learn about the tools and utilities included in Windows that keep it healthy, like Disk Defragmenter and the System Configuration tool. Finally, I'll teach you how to automate your maintenance procedures with the Windows Task Scheduler.

Optimizing Windows

In Lesson 7, you'll learn about how to improve the performance of your PC by optimizing your hardware and software. We'll discuss installing and removing applications and features, as well as updating and rolling back hardware drivers using Device Manager. I'll also teach you how to prepare your PC for any future problems using the various backup and restore tools included with Windows.

Troubleshooting Windows Boot

Today, I'll teach you how to troubleshoot the Windows boot process. We'll discuss the kinds of problems you can encounter in Windows XP, Windows Vista, and Windows 7, as well as how to deal with them. I'll show you how to use specific utilities like the Windows Recovery Environment and the Windows Preinstallation Environment. Finally, we'll discuss using command-line commands to fix boot errors.

Troubleshooting the Windows GUI

A necessary skill every tech needs is to know how to troubleshoot Windows from multiple perspectives. Today, I'll teach you what to do when the GUI fails to load normally, and I'll point out several troubleshooting tools and the scenarios in which they are most useful. We'll also discuss applications issues like bad installations and Windows compatibility options.

Virtual Machines

In this lesson, we'll discuss virtualization—using special software to run a second operating system within your real OS. I'll show you what virtualization is and explain its many benefits. You'll also learn about the types of virtualization and popular virtualization software.

Printer Technologies

The CompTIA A+ certification strongly stresses the area of printing and expects you to have a high degree of technical knowledge about all types of printers. Today, we'll begin our trip into printers. You'll learn about the types of printers in common use today. I'll teach you how printers connect to PCs and networks; plus I'll talk about how they communicate with computers. Finally, we'll look at the laser printing process in detail so that you can troubleshoot like a printer technician.

Installing and Troubleshooting Printers

 In our final lesson, I'll introduce you to installing and troubleshooting printers. First, I'll discuss installation so that you'll learn setup and optimization techniques for all kinds of printers. Next up, I'll give you an inside look at general printer troubleshooting. Finally, we'll discuss troubleshooting the main types of printers: impact, inkjet, and laser.

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

Now Only US$1199 Save US$4801 (80%)
OFF RRP US$6000
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 007TRB10CB
Delivery Mode: Online
Course Access: 6-8 Weeks Per Course
Time required: 240 Hours
Assessments: Yes
Qualification: Certificate of Completion

Start Dates

This course is available to begin on the following dates

  • 12 December
  • 16 January
  • 13 February
  • 13 March