Cademy logoCademy Marketplace

Course Images

IT Administrator Diploma

IT Administrator Diploma

By John Academy

4.3(43)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 48 hours

  • All levels

Description

As an IT administrator, you will be responsible for maintaining the company's IT network, servers, security systems and other essential tasks. Enrolling in the IT Administrator Diploma will give you the opportunity to build a solid base from which to start, or further, your career in IT field. The knowledge acquired from the course will prepare you to begin a career in IT as it provides you with a comprehensive understanding of Information Technology.

Description

In this IT Administrator Diploma, you will learn to recognise computer components, including how to install software and establish network connectivity accurately.

Keep in mind that it is hardly ever possible to undertake security issues without relevant knowledge and proper supervision. This course teaches you how to anticipate security risks as well as identify compatibility issues in a reachable way possible. Furthermore, you will also enhance your knowledge about preventative maintenance that will help you stand out from your competition when you are hunting for your desired job.

There's plenty in this course to take advantage of, and it will provide you with a stimulating and insightful description of the ways in which you will confidently perform the maintenance, configuration, and reliable operation of computer systems.

Entry Requirement:

  • This course is available to all learners, of all academic backgrounds.
  • Learners should be aged 16 or over to undertake the qualification.
  • Good understanding of English language, numeracy and ICT are required to attend this course.

Assessment:  

  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
  • Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam.

Certification:

After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Why choose us?

  • Affordable, engaging & high-quality e-learning study materials;
  • Tutorial videos/materials from the industry leading experts;
  • Study in a user-friendly, advanced online learning platform;
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognized accredited qualification;
  • Access to course content on mobile, tablet or desktop from anywhere anytime;
  • The benefit of career advancement opportunities;
  • 24/7 student support via email.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Software:
What is an Operating SystemFREE 00:48:00
Configuring the Operating System 00:06:00
What is an Application 00:10:00
Using Control Panel 00:18:00
Software and Concepts 00:10:00
Licensing 00:06:00
Using Software 00:07:00
Software Tools 00:10:00
Software 00:14:00
Hardware, Devices, and Peripherals 00:06:00
Hardware:
Hardware and Peripherals 00:07:00
Storage 00:12:00
Connectivity Devices 00:05:00
Network Components 00:09:00
Identify the Importance of Risk ManagementFREE 00:11:00
Assess Risk 00:13:00
Mitigate Risk 00:22:00
Integrate Documentation into Risk Management 00:14:00
Classify Threats and Threat Profiles 00:07:00
Perform Ongoing Threat Research 00:12:00
Resources that Aid in Research of Threats 00:03:00
Implement Threat Modeling 00:09:00
Assess the Impact of Reconnaissance Incidents 00:10:00
Performing Reconnaissance on a Network 00:07:00
Examining Reconnaissance Incidents 00:08:00
Assess the Impact of Social Engineering 00:10:00
Assessing the impact of Social Engineering 00:07:00
Assessing the Impact of Phishing 00:03:00
Types of Wireless Attacks 00:30:00
Intrusion Monitoring 00:08:00
Wireless Security Risks 00:22:00
Authentication Attacks 00:20:00
Rogue Devices 00:04:00
Public Hotspots 00:06:00
Wireless Security Monitoring 00:21:00
Device Tracking 00:17:00
WLAN Security Infrastructure 00:37:00
Management Protocols 00:23:00
Other RADIUS Solutions 00:15:00
Security:
Introduction 00:30:00
Child Safety Online 01:00:00
Secure Payment Sites 01:00:00
Online Banking 00:30:00
How To Keep Your Password Safe 00:30:00
Common Scams 01:00:00
How I Got Pharmed 01:00:00
Virus Protection 01:00:00
Self Maintenance 00:30:00
Personal Information Online 01:00:00
Is The Internet Safe? 00:30:00
Importance of Cyber Security 00:30:00
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
The Information Security CycleFREE 00:37:00
Information Security Controls 00:35:00
Authentication Methods 00:09:00
Cryptography Fundamentals 00:56:00
Security Policy Fundamentals 00:11:00
Social Engineering 00:31:00
Malware 00:25:00
Software-Based Threats 00:21:00
Based Threats 00:38:00
Wireless Threats and Vulnerabilities 00:43:00
Physical Threats and Vulnerabilities 00:09:00
Manage Data Security 00:47:00
Manage Application Security 00:56:00
Manage Device and Host Security 01:07:00
Manage Mobile Security 00:10:00
A Risk Analysis 00:17:00
Implement Vulnerability Assessment Tools and Techniques 00:04:00
Scan for Vulnerabilities 00:27:00
Mitigation and Deterrent Techniques 00:19:00
Respond to Security Incidents 00:23:00
Recover from a Security Incident 00:09:00
Networking:
OSI LayersFREE 00:44:00
LANs and WANs 00:14:00
Network Types 00:07:00
Transmissions 00:36:00
Cables 00:41:00
Fiber Optics 00:16:00
Converters and Connectors 00:26:00
Wireless Security 00:15:00
Authentication.prproj 00:21:00
Wireless Security Threats 00:30:00
TACACS 00:10:00
Keys 00:26:00
RADIUS 00:06:00
VPN Technologies 00:16:00
Tunneling Protocols.prproj 00:05:00
Acceptable Use 00:59:00
Common Problems 00:32:00
Troubleshooting 00:27:00
Network Technician Tools 00:46:00
Physical and Logical Issues 00:19:00
Open or Closed Ports 00:09:00
ARP Issues 00:13:00
Basic IT Literacy:
Core Concepts in Healthcare ITFREE 00:06:00
EMR EHR Issues 00:04:00
Regulations, Standards, and Stakeholders 00:13:00
HIPAA Controls and Compliance 00:07:00
Roles and Responsibilities 00:09:00
Manage Communication and Ethics Issues 00:15:00
Legal Best Practices, Requirements, and Documentation 00:09:00
Medical Document Imaging 00:04:00
Sanitation Management 00:02:00
Computing Essentials 00:05:00
Networking 00:32:00
Manage Servers and Software 00:27:00
Hardware Support 00:14:00
Set Up a Workstation 00:08:00
Troubleshoot Basic IT Issues 00:15:00
Troubleshoot Medical IT Issues 00:19:00
Implementation of an EMR EHR System 00:34:00
Change Control 00:07:00
Manage Physical and Logical Security 00:36:00
Implement Security Best Practices and Threat Mitigation Techniques 00:13:00
Manage Remote Access 00:06:00
Manage Wireless Security 00:14:00
Perform Backups and Disaster Recovery 00:18:00
Mock Exam
Mock Exam- IT Administrator Diploma 00:30:00
Final Exam
Final Exam- IT Administrator Diploma 00:30:00
Certificate and Transcript
Order Your Certificates and Transcripts 00:00:00

About The Provider

Tags

Reviews