Curriculum For This Course
Video tutorials list
-
Introduction
Video Name Time 1. Welcome 13:00 -
Operating System Types
Video Name Time 1. Operating System Types (OBJ. 1.8) 7:55 2. Windows (OBJ. 1.8) 7:41 3. Linux (OBJ. 1.8) 9:03 4. Android (OBJ. 1.8) 4:12 5. Chrome OS (OBJ. 1.8) 5:32 6. macOS (OBJ. 1.8) 3:04 7. iOS and iPadOS (OBJ. 1.8) 4:21 8. Operating Systems (OBJ. 1.8) 18:10 9. Filesystem Types (OBJ. 1.8) 12:53 10. Compatibility Concerns (OBJ. 1.8) 7:02 -
Windows Versions
Video Name Time 1. Windows Versions (OBJ. 1.1 & 1.7) 1:58 2. 64-bit vs 32-bit Versions (OBJ. 1.7) 4:29 3. Windows Home (OBJ. 1.1) 6:19 4. Windows Pro (OBJ. 1.1) 8:27 5. Windows Enterprise and Education (OBJ. 1.1) 6:03 6. Upgrading Windows (OBJ. 1.1) 5:01 7. In-place Upgrade (OBJ. 1.1) 8:52 -
Windows Installation
Video Name Time 1. Windows Installation (OBJ. 1.9) 2:34 2. Installation Types (OBJ. 1.9) 8:29 3. Upgrade Considerations (OBJ. 1.9) 6:40 4. Product Lifecycle (OBJ. 1.9) 6:04 5. Boot Methods (OBJ. 1.9) 5:34 6. Partitioning Storage Devices (OBJ. 1.9) 7:28 7. Recovery and Reset (OBJ. 1.9) 5:20 8. Using a Recovery Partition (OBJ. 1.9) 10:45 -
Application Configuration
Video Name Time 1. Application Configuration (OBJ. 1.7) 2:41 2. Application Requirements (OBJ. 1.7) 8:43 3. Distribution Methods (OBJ. 1.7) 9:27 4. Business Impacts (OBJ. 1.7) 7:03 5. Operational Impacts (OBJ. 1.7) 3:15 6. Device Impacts (OBJ. 1.7) 3:29 7. Network Impacts (OBJ. 1.7) 3:36 8. Installing Applications (OBJ. 1.7) 19:47 -
Windows Networking
Video Name Time 1. Windows Networking (OBJ. 1.6) 3:56 2. Wired Connections (OBJ. 1.6) 8:10 3. Wireless Connections (OBJ. 1.6) 6:53 4. WWAN Connections (OBJ. 1.6) 6:17 5. VPN Connections (OBJ. 1.6) 4:27 6. Network Client Configuration (OBJ. 1.6) 6:45 7. Network Locations (OBJ. 1.6) 8:37 8. Proxy Settings (OBJ. 1.6) 5:08 -
Windows Control Panel
Video Name Time 1. Windows Control Panel (OBJ. 1.4) 6:19 2. Account Settings (OBJ. 1.4) 12:36 3. Programs and Features (OBJ. 1.4) 5:28 4. Devices and Printers (OBJ. 1.4) 8:42 5. Internet Options (OBJ. 1.4) 9:02 6. Network and Sharing Center (OBJ. 1.4) 8:10 7. Windows Defender Firewall (OBJ. 1.4) 9:18 8. Mail (OBJ. 1.4) 8:02 9. Sound (OBJ. 1.4) 9:02 10. System (OBJ. 1.4) 11:28 11. Device Manager (OBJ. 1.4) 5:10 12. Administrative Tools (OBJ. 1.4) 3:26 13. Indexing Options (OBJ. 1.4) 4:27 14. File Explorer Options (OBJ. 1.4) 7:12 15. Power Options (OBJ. 1.4) 7:23 16. Ease of Access (OBJ. 1.4) 3:05 -
Windows Settings
Video Name Time 1. Windows Settings (OBJ. 1.5) 4:41 2. Accounts (OBJ. 1.5) 5:46 3. System Settings (OBJ. 1.5) 7:26 4. Update and Security (OBJ. 1.5) 7:27 5. Network and Internet (OBJ. 1.5) 4:35 6. Devices (OBJ. 1.5) 4:29 7. Privacy (OBJ. 1.5) 5:37 8. Time and Language (OBJ. 1.5) 6:48 9. Personalization (OBJ. 1.5) 7:13 10. Apps (OBJ. 1.5) 6:37 11. Gaming (OBJ. 1.5) 4:33 -
Windows Tools
Video Name Time 1. Windows Tools (OBJ. 1.3) 4:58 2. Task Manager (OBJ. 1.3) 9:06 3. Device Manager (OBJ. 1.3) 7:51 4. Disk Management Console (OBJ. 1.3) 10:28 5. Disk Maintenance Tools (OBJ. 1.3) 8:51 6. Task Scheduler (OBJ. 1.3) 9:49 7. Event Viewer (OBJ. 1.3) 8:33 8. Performance Monitor (OBJ. 1.3) 10:09 9. Local Users and Groups (OBJ. 1.3) 6:40 10. Group Policy Editor (OBJ. 1.3) 9:58 11. Certificate Manager (OBJ. 1.3) 3:44 12. System Information (OBJ. 1.3) 5:01 13. Resource Monitor (OBJ. 1.3) 4:04 14. System Configuration (OBJ. 1.3) 6:43 15. Registry Editor (OBJ. 1.3) 9:00 16. Microsoft Management Console (OBJ. 1.3) 3:50 -
Windows Command Line Tools
Video Name Time 1. Windows Command Line Tools (OBJ. 1.2) 8:05 2. Using the GUI (OBJ. 1.2) 10:28 3. Using the Command Prompt (OBJ. 1.2) 10:28 4. Navigation Commands (OBJ. 1.2) 12:12 5. Copying Commands (OBJ. 1.2) 5:46 6. Disk Management Commands (OBJ. 1.2) 10:51 7. Shutdown (OBJ. 1.2) 3:35 8. System File Checker (OBJ. 1.2) 2:41 9. Windows Version (OBJ. 1.2) 3:07 10. Network Troubleshooting Commands (OBJ. 1.2) 15:46 11. Name Resolution Commands (OBJ. 1.2) 4:18 12. The netstat Command (OBJ. 1.2) 5:33 13. Group Policy Commands (OBJ. 1.2) 4:33 -
Windows Shares
Video Name Time 1. Windows Shares (OBJ. 1.2, 1.6, & 2.5) 3:22 2. Workgroups and Domains (OBJ. 1.6) 7:48 3. File Sharing (OBJ. 2.5) 9:06 4. NTFS Permissions (OBJ. 2.5) 10:48 5. Mapping Drives (OBJ. 1.6) 4:54 6. The net Command (OBJ. 1.2) 8:18 7. User Data on Domains (OBJ. 1.6) 10:34 8. Printer Sharing (OBJ. 1.6) 3:41 -
macOS
Video Name Time 1. macOS (OBJ. 1.10) 6:42 2. Finder, Dock, and Spotlight (OBJ. 1.10) 16:30 3. Mission Control (OBJ. 1.10) 4:39 4. Terminal (OBJ. 1.10) 5:24 5. Disk Utility (OBJ. 1.10) 6:19 6. File Vault (OBJ. 1.10) 2:48 7. Remote Disc (OBJ. 1.10) 1:59 8. Gestures (OBJ. 1.10) 8:21 9. Keychain (OBJ. 1.10) 3:43 10. iCloud and Apple ID (OBJ. 1.10) 5:56 11. System Preferences (OBJ. 1.10) 18:24 12. Managing macOS Applications (OBJ. 1.10) 9:33 13. Best Practices for macOS (OBJ. 1.10) 7:59 -
Linux
Video Name Time 1. Linux (OBJ. 1.11) 9:51 2. Shells and Terminals (OBJ. 1.11) 3:45 3. Linux Navigation (OBJ. 1.11) 10:37 4. File Management Commands (OBJ. 1.11) 11:31 5. Disk Usage Commands (OBJ. 1.11) 5:14 6. Text Manipulation (OBJ. 1.11) 11:41 7. Search Commands (OBJ. 1.11) 6:26 8. User Management (OBJ. 1.11) 9:36 9. File Permission Commands (OBJ. 1.11) 7:21 10. Application Management (OBJ. 1.11) 8:26 11. Resource Management Commands (OBJ. 1.11) 6:26 12. Networking Commands (OBJ. 1.11) 6:37 13. Getting Help in Linux (OBJ. 1.11) 3:23 14. Best Practices for Linux (OBJ. 1.11) 7:13 -
Threats and Vulnerabilities
Video Name Time 1. Threats and Vulnerabilities (OBJ. 2.4) 14:14 2. CIA Triad (OBJ. 2.4) 6:59 3. Vulnerabilities (OBJ. 2.4) 8:45 4. Zero-day Attack (OBJ. 2.4) 5:03 5. DoS and DDoS (OBJ. 2.4) 8:02 6. Spoofing (OBJ. 2.4) 4:17 7. On-path Attack (OBJ. 2.4) 3:58 8. SQL Injection (OBJ. 2.4) 6:06 9. XSS and XSRF (OBJ. 2.4) 3:03 10. Password Cracking (OBJ. 2.4) 8:19 11. Insider Threat (OBJ. 2.4) 3:13 -
Malware
Video Name Time 1. Malware (OBJ. 2.3) 2:28 2. Viruses, Worms, and Trojans (OBJ. 2.3) 11:21 3. Viruses and Trojans (OBJ. 2.3) 6:16 4. Ransomware (OBJ. 2.3) 2:30 5. Spyware (OBJ. 2.3) 2:38 6. Rootkits (OBJ. 2.3) 3:29 7. Botnets and Zombies (OBJ. 2.3) 3:30 8. Symptoms of Infection (OBJ. 2.3) 4:10 9. Removing Malware (OBJ. 3.3) 5:02 10. Preventing Malware (OBJ. 2.3) 5:50 -
Social Engineering
Video Name Time 1. Social Engineering (OBJ. 2.3 & 2.4) 3:23 2. Phishing Attacks (OBJ. 2.4) 12:12 3. Anti-phishing Training (OBJ. 2.3) 5:19 4. Spam (OBJ. 2.3) 2:56 5. Impersonation (OBJ. 2.4) 4:03 6. Pretexting (OBJ. 2.4) 4:14 7. Social Engineering Attacks (OBJ. 2.4) 4:23 8. Evil Twin (OBJ. 2.4) 4:43 9. Software Firewalls (OBJ. 2.3) 4:15 10. Using Software Firewalls (OBJ. 2.3) 6:30 11. User Education (OBJ. 2.3) 4:43 -
Security Controls
Video Name Time 1. Security Controls (OBJ. 2.1) 5:47 2. Perimeter Defense (OBJ. 2.1) 5:56 3. Surveillance (OBJ. 2.1) 7:05 4. Physical Access Controls (OBJ. 2.1) 13:25 5. Security Principles (OBJ. 2.1) 11:18 6. Multifactor Authentication (OBJ. 2.1) 8:23 7. Mobile Device Management (OBJ. 2.1) 8:16 8. Active Directory Security (OBJ. 2.1) 9:07 -
Wireless Security
Video Name Time 1. Wireless Security (OBJ. 2.2 & 2.9) 3:10 2. Wireless Encryption (OBJ. 2.2) 5:21 3. Cracking Wireless Networks (OBJ. 2.2) 7:39 4. WPA3 (OBJ. 2.2) 7:18 5. Wireless Authentication (OBJ. 2.2) 9:57 6. Wireless Network Security (OBJ. 2.9) 9:31 7. Configuring SOHO Networks (OBJ. 2.9) 26:28 8. Securing Wireless Networks (OBJ. 2.9) 13:42 9. Configuring SOHO Firewalls (OBJ. 2.9) 8:48 -
Movile Device Security
Video Name Time 1. Mobile Device Security (OBJ. 2.7) 2:03 2. Securing Wireless Devices (OBJ. 2.7) 4:59 3. Mobile Device Unlocking (OBJ. 2.7) 8:59 4. Mobile Malware (OBJ. 2.7) 6:19 5. Mobile Device Theft (OBJ. 2.7) 3:10 6. Mobile App Security (OBJ. 2.7) 5:06 7. Deployment Options (OBJ. 2.7) 7:09 8. Hardening Mobile Devices (OBJ. 2.7) 3:49 9. Implementing Mobile Device Security (OBJ. 2.7) 15:39 10. IoT Vulnerabilities (OBJ. 2.7) 7:10 -
Windows Security
Video Name Time 1. Windows Security (OBJ. 2.5) 2:36 2. Login Options (OBJ. 2.5) 9:23 3. Users and Groups (OBJ. 2.5) 10:10 4. Encrypting Windows Devices (OBJ. 2.5) 5:52 5. File Permissions (OBJ. 2.5) 7:50 6. Microsoft Defender Antivirus (OBJ. 2.5) 7:07 7. Microsoft Defender Firewall (OBJ. 2.5) 8:28 -
Securing Workstations
Video Name Time 1. Securing Workstations (OBJ. 2.6 & 2.8) 3:17 2. Account Management (OBJ. 2.6) 14:08 3. AutoRun and AutoPlay (OBJ. 2.6) 5:11 4. Password Best Practices (OBJ. 2.6) 10:32 5. Encryption Best Practices (OBJ. 2.6) 7:27 6. End-user Best Practices (OBJ. 2.6) 6:46 7. Data Destruction (OBJ. 2.8) 5:04 8. Data Destruction Methods (OBJ. 2.8) 12:32 -
Securing Web Browsers
Video Name Time 1. Securing Web Browsers (OBJ. 2.10) 3:17 2. Web Browser Installation (OBJ. 2.10) 7:26 3. Extensions and Plug-ins (OBJ. 2.10) 9:35 4. Password Managers (OBJ. 2.10) 10:29 5. Encrypted Browsing (OBJ. 2.10) 3:59 6. Private Browsing (OBJ. 2.10) 6:00 7. Pop-up and Ad Blockers (OBJ. 2.10) 7:01 8. Cache and History Clearing (OBJ. 2.10) 5:26 9. Profile Synchronization (OBJ. 2.10) 4:35 -
Supporting Network Operations
Video Name Time 1. Supporting Network Operations (OBJ. 4.1 & 4.2) 2:57 2. Ticketing System (OBJ. 4.1) 18:56 3. Using a Ticketing System (OBJ. 4.1) 5:20 4. Knowledge Base Articles (OBJ. 4.1) 7:20 5. Asset Management (OBJ. 4.1) 13:02 6. Change Management (OBJ. 4.2) 10:57 7. Conducting Change Management (OBJ. 4.2) 13:48 8. Documentation Types (OBJ. 4.1) 13:09 -
Backup, Recovery, and Safety
Video Name Time 1. Backup, Recovery, and Safety 3:06 2. Backup and Recovery (OBJ. 4.3) 11:07 3. Backup Schemes (OBJ. 4.3) 13:50 4. Redundant Power (OBJ. 4.5) 6:04 5. Electrical Safety (OBJ. 4.4) 4:57 6. Component Handling and Storage (OBJ. 4.4) 5:46 7. HVAC Systems (OBJ. 4.5) 5:43 8. Proper Handling and Disposal (OBJ. 4.4 & 4.5) 9:00 9. Personal Safety (OBJ. 4.4 & 4.5) 11:01 -
Policy and Privacy Concepts
Video Name Time 1. Policy and Privacy Concepts (OBJ. 4.6) 2:44 2. Incident Response (OBJ. 4.6) 4:16 3. Chain of Custody (OBJ. 4.6) 7:04 4. Order of Volatility (OBJ. 4.6) 6:28 5. Data Collection Procedures (OBJ. 4.6) 3:11 6. Conduct Disk Imaging (OBJ. 4.6) 9:06 7. Licensing, EULA, and DRM (OBJ. 4.6) 11:35 8. Data Classification (OBJ. 4.6) 2:47 9. Data Retention (OBJ. 4.6) 6:53 10. PII, PHI, and PCI-DSS (OBJ. 4.6) 5:56 11. Security Policies (OBJ. 4.6) 10:14 -
Scripting
Video Name Time 1. Scripting (OBJ. 4.8) 4:40 2. Script File Types (OBJ. 4.8) 10:00 3. Variables (OBJ. 4.8) 7:40 4. Loops (OBJ. 4.8) 5:19 5. Logic Control (OBJ. 4.8) 4:34 6. Bash Script Example (OBJ. 4.8) 4:08 7. Automation Scripting (OBJ. 4.8) 8:14 8. Scripting Considerations (OBJ. 4.8) 6:34 -
Remote Access Support
Video Name Time 1. Remote Access Support (OBJ. 4.9) 3:09 2. Remote Access Protocols (OBJ. 4.9) 11:54 3. Connecting to a VPN (OBJ. 4.9) 1:36 4. Remote Monitoring and Management (RMM) (OBJ. 4.9) 6:57 5. Microsoft Remote Assistance (MSRA) (OBJ. 4.9) 11:03 6. Other Remote Access Tools (OBJ. 4.9) 5:08 7. Desktop Management Software (OBJ. 4.9) 3:11 -
Troubleshooting Windows
Video Name Time 1. Troubleshooting Windows (OBJ. 3.1) 1:53 2. Boot Issues (OBJ. 3.1) 12:51 3. Boot Recovery Tools (OBJ. 3.1) 5:41 4. Update or Driver Rollback (OBJ. 3.1) 5:26 5. System Restore (OBJ. 3.1) 6:52 6. System Reinstall or Reimage (OBJ. 3.1) 13:06 7. Performance Issues (OBJ. 3.1) 16:59 8. System Fault Issues (OBJ. 3.1) 3:52 9. System Instability Issues (OBJ. 3.1) 6:22 10. Application and Service Issues (OBJ. 3.1) 10:47 -
Troubleshooting Workstation Security
Video Name Time 1. Troubleshooting Workstation Security (OBJ. 3.2 & 3.3) 2:59 2. Malware Removal Process (OBJ. 3.3) 13:39 3. Infected Browser Symptoms (OBJ. 3.2) 10:08 4. Alerts and Notifications (OBJ. 3.2) 3:45 5. OS Update Failures (OBJ. 3.2) 3:34 6. File System Issues (OBJ. 3.2) 3:19 -
Troubleshooting Mobile Issues
Video Name Time 1. Troubleshooting Mobile Issues (OBJ. 3.4) 1:25 2. Reseting or Rebooting (OBJ. 3.4) 6:10 3. Mobile OS Update Failure (OBJ. 3.4) 5:31 4. Mobile Performance Issues (OBJ. 3.4) 7:04 5. Mobile App Issues (OBJ. 3.4) 6:35 6. Mobile Connectivity Issues (OBJ. 3.4) 9:49 7. Mobile Battery Issues (OBJ. 3.4) 7:39 8. Screen Autorotation Issues (OBJ. 3.4) 3:43 -
Troubleshooting Mobile Security
Video Name Time 1. Troubleshooting Mobile Security (OBJ. 3.5) 1:31 2. Rooting and Jailbreaking (OBJ. 3.5) 6:38 3. Sideloading Apps (OBJ. 3.5) 6:30 4. Mobile Malware Symptoms (OBJ. 3.5) 4:08 5. Unexpected Application Behavior (OBJ. 3.5) 2:43 6. Leaked Mobile Data (OBJ. 3.5) 2:54 -
Professionalism
Video Name Time 1. Professionalism (OBJ. 4.7) 5:17 2. Professional Appearance (OBJ. 4.7) 6:33 3. Respect Others' Time (OBJ. 4.7) 8:56 4. Proper Communication (OBJ. 4.7) 15:11 5. Dealing with Private Data (OBJ. 4.7) 6:02 6. Difficult Situations (OBJ. 4.7) 6:33 -
Conclusion
Video Name Time 1. Conclusion 8:41
Add Comment