Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
11m:28s

2.
Download your free study guide

3.
Exam Tips
4m:33s

4.
100% Pass Guarantee
3m:41s

5.
Checkpoint: Introduction

2 -
Notations and Data Types
#
Lesson
Duration
Type
1.
Notations and Data Types
6m:5s

2.
Input, Output, Processing, and Storage
4m:53s

3.
Numbers and Notational Systems
5m:49s

4.
Decimal Notation
4m:59s

5.
Binary Notation
6m:15s

6.
Hexadecimal Notation
3m:58s

7.
Octal Notation
4m:55s

8.
Units of Measure
5m:48s

9.
Data Types
5m:18s

10.
Representing Data
2m:55s

11.
Checkpoint: Notations and Data Types

3 -
Data and Information
#
Lesson
Duration
Type
1.
Data and Information
3m:18s

2.
Data and Information Assets
6m:19s

3.
Big Data
4m:52s

4.
Data Monetization
3m:55s

5.
Data Analytics
2m:32s

6.
Data-driven Business Decisions
3m:36s

7.
Intellectual Property
6m:0s

8.
Digital Products
3m:42s

9.
Digital Security Investments
8m:13s

10.
Checkpoint: Data and Information

4 -
Types of Computers
#
Lesson
Duration
Type
1.
Types of Computers
4m:34s

2.
Overview of a Computer
7m:9s

3.
Desktops and Workstations
8m:14s

4.
Laptops
8m:45s

5.
Servers
9m:8s

6.
Smartphones and Tablets
9m:5s

7.
E Readers
3m:5s

8.
VR & AR
5m:39s

9.
Exercise Equipment
3m:40s

10.
Wearables
2m:35s

11.
Internet of Things (IoT) Devices
5m:8s

12.
Original Equipment Manufacturers (OEM)
5m:4s

13.
Checkpoint: Types of Computers

5 -
Internal System Components
#
Lesson
Duration
Type
1.
Internal System Components
6m:17s

2.
Motherboard or System Board
2m:45s

3.
Central Processing Unit (CPU)
6m:26s

4.
Processor Features
7m:40s

5.
Graphics Processing Unit (GPU)
3m:57s

6.
System Memory (RAM)
3m:4s

7.
Storage Components
4m:32s

8.
Network Interface Card (NIC)
2m:21s

9.
System Bus
3m:52s

10.
System Cooling
2m:54s

11.
System Firmware (BIOS/UEFI)
2m:19s

12.
Checkpoint: Internal System Components

6 -
Devices and Peripherals
#
Lesson
Duration
Type
1.
Devices and Peripherals
3m:8s

2.
Storage Devices
9m:23s

3.
Graphic Devices
7m:20s

4.
Mirroring & Casting
3m:18s

5.
Peripheral Connection Types
6m:17s

6.
Network Connections
5m:59s

7.
Networking Tools and Devices
1m:58s

8.
Input Devices and Peripherals
6m:4s

9.
Output Devices and Peripherals
4m:33s

10.
UPS
2m:49s

11.
Installing Devices and Peripherals
5m:59s

12.
Checkpoint: Devices and Peripherals

7 -
Networking Fundamentals
#
Lesson
Duration
Type
1.
Networking Fundamentals
6m:17s

2.
Network Components
3m:56s

3.
Network Models
4m:1s

4.
LAN vs WAN
3m:32s

5.
Wired and Wireless Networks
4m:12s

6.
Network Communication
4m:9s

7.
Network Addressing
4m:0s

8.
LAN Communications
2m:53s

9.
WAN Communications
2m:55s

10.
Domain Name System (DNS)
4m:2s

11.
Accessing Websites
4m:35s

12.
Accessing Email
3m:0s

13.
Checkpoint: Networking Fundamentals

8 -
Implementing Networks
#
Lesson
Duration
Type
1.
Implementing Networks
3m:11s

2.
Fiber Optic Internet Service
4m:41s

3.
Cable Internet Service
5m:25s

4.
DSL Internet Service
5m:58s

5.
Wireless Internet Service
5m:20s

6.
Wireless (Wi-Fi) Networks
7m:26s

7.
Wireless (Wi-Fi) Security
6m:6s

8.
Wireless Security Best Practices
4m:50s

9.
Configuring a Wireless Network
10m:32s

10.
Checkpoint: Implementing Networks

9 -
Operating Systems
#
Lesson
Duration
Type
1.
Operating Systems
3m:30s

2.
Functions of an Operating System
4m:56s

3.
Operating System Types
5m:43s

4.
Microsoft Windows
7m:4s

5.
Apple's macOS
3m:3s

6.
Apple's iOS
4m:19s

7.
Linux
9m:3s

8.
ChromeOS
5m:31s

9.
Android
4m:12s

10.
Using Operating Systems
18m:10s

11.
Checkpoint: Operating Systems

10 -
Administering Operating Systems
#
Lesson
Duration
Type
1.
Administering Operating Systems
2m:54s

2.
Management Interfaces
6m:21s

3.
Process and Service Management
6m:6s

4.
Memory and Disk Management
6m:57s

5.
Command Prompt and PowerShell
10m:53s

6.
Access Control and Permissions
7m:47s

7.
Managing User Accounts
4m:45s

8.
Device Management
7m:29s

9.
Checkpoint: Administering Operating Systems

11 -
File Systems and Features
#
Lesson
Duration
Type
1.
File Systems and Features
2m:45s

2.
Disk Partitions
2m:21s

3.
File System Types
4m:28s

4.
File System Features
2m:41s

5.
File System Limitations
4m:24s

6.
Folders and Directories
2m:10s

7.
File Types and Extensions
10m:45s

8.
Navigating the File System
10m:45s

9.
Attributes and Permissions
2m:18s

10.
Checkpoint: File Systems and Features

12 -
Software Applications
#
Lesson
Duration
Type
1.
Software Applications
3m:47s

2.
Productivity Software
5m:5s

3.
Collaboration Software
4m:43s

4.
Remote Support Software
3m:25s

5.
Business Software
4m:13s

6.
Software Licensing
7m:31s

7.
Installing Software Applications
4m:26s

8.
Software Installation Methods
4m:2s

9.
Removing or Uninstalling Applications
7m:7s

10.
Checkpoint: Software Applications

13 -
Web Browsing
#
Lesson
Duration
Type
1.
Web Browsing
4m:17s

2.
Malware
5m:27s

3.
Safer Web Browsing
2m:52s

4.
Choosing a Web Browser
5m:8s

5.
Web Browser Features
3m:56s

6.
Types of Active Content
4m:11s

7.
Extensions and Add-ons
3m:9s

8.
Private Browsing
7m:23s

9.
Blockers for Web Browsing
5m:12s

10.
Digital Certificates
2m:38s

11.
Checkpoint: Web Browsing

14 -
Cloud & Virtualization
#
Lesson
Duration
Type
1.
Cloud & Virtualization
4m:26s

2.
Characteristics of the Cloud
11m:54s

3.
Cloud Deployment Models
4m:30s

4.
Cloud Service Models
9m:23s

5.
Virtualization Concepts
4m:25s

6.
Installing a Virtual Machine
4m:33s

7.
Checkpoint: Cloud & Virtualization

15 -
Artificial Intelligence
#
Lesson
Duration
Type
1.
Artificial Intelligence
2m:52s

2.
Chatbots & Assistants
3m:45s

3.
Generative AI
5m:32s

4.
Predictive AI
3m:42s

5.
Checkpoint: Artificial Intelligence

16 -
Troubleshooting Methodology
#
Lesson
Duration
Type
1.
Troubleshooting Methodology
2m:57s

2.
Identify the Problem
5m:50s

3.
Research
4m:39s

4.
Establish a Theory
4m:2s

5.
Test the Theory
4m:4s

6.
Establish a Plan of Action
5m:36s

7.
Implement the Solution
4m:46s

8.
Escalate When Required
5m:54s

9.
Verify Full System Functionality
4m:7s

10.
Implement Preventative Measures
4m:56s

11.
Document Findings and Outcomes
5m:47s

12.
Checkpoint: Troubleshooting Methodology

17 -
Software Development
#
Lesson
Duration
Type
1.
Software Development
4m:40s

2.
Flow Charts and Sequences
4m:54s

3.
Pseudocode
4m:30s

4.
Documentations and Comments
3m:3s

5.
Programming Languages
5m:7s

6.
Variables and Constants
4m:39s

7.
Arrays and Vectors
4m:13s

8.
Branching and Looping
4m:43s

9.
Operators
4m:22s

10.
Functions and Procedures
3m:33s

11.
Object-Oriented Programming (OOP)
4m:32s

12.
Checkpoint: Software Development

18 -
Databases
#
Lesson
Duration
Type
1.
Databases
3m:50s

2.
Functions of a Database
4m:6s

3.
Benefits of a Database
5m:29s

4.
Non-relational Databases
8m:54s

5.
Database Structures
4m:17s

6.
Relational Databases
3m:12s

7.
Data Availability
3m:12s

8.
Checkpoint: Databases

19 -
Cybersecurity Fundamentals
#
Lesson
Duration
Type
1.
Cybersecurity Fundamentals
4m:5s

2.
The CIANA Pentagon
5m:57s

3.
Confidentiality Concerns
5m:29s

4.
Integrity Concerns
6m:22s

5.
Availability Concerns
4m:51s

6.
Social Engineering
5m:35s

7.
AAA of Cybersecurity
3m:39s

8.
Business Continuity
5m:30s

9.
Disaster Recovery
4m:47s

10.
Checkpoint: Cybersecurity Fundamentals

20 -
AAA in Cybersecurity
#
Lesson
Duration
Type
1.
AAA in Cybersecurity
6m:1s

2.
Authentication
9m:10s

3.
Password Best Practices
6m:43s

4.
Using a Password Manager
10m:28s

5.
Authorization
5m:20s

6.
Accounting
2m:31s

7.
Non-repudiation
3m:30s

8.
Encryption
8m:13s

9.
Data at Rest
3m:0s

10.
Data in Transit
2m:27s

11.
Checkpoint: AAA in Cybersecurity

21 -
Securing Your Devices
#
Lesson
Duration
Type
1.
Securing Your Devices
2m:25s

2.
Device Hardening
5m:6s

3.
Patching and Updates
5m:42s

4.
Secure Software Installation
4m:16s

5.
Preventing Malware
4m:26s

6.
Anti-virus and Anti-malware
4m:41s

7.
Host-based Firewall
3m:55s

8.
Checkpoint: Securing Your Devices

22 -
Behavioral Security
#
Lesson
Duration
Type
1.
Behavioral Security
3m:50s

2.
Policies and Procedures
4m:17s

3.
Acceptable Use Policy (AUP)
3m:40s

4.
Privacy Policy
3m:28s

5.
Expectations for Privacy
3m:19s

6.
Handling Confidential Information
3m:18s

7.
Governmental Regulations
2m:57s

8.
Compromised Content
3m:59s

9.
Physical Device Security
3m:31s

10.
Cookie Consent
2m:38s

11.
Checkpoint: Behavioral Security

23 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
11m:37s

2.
BONUS: What comes next?
3m:44s

3.
Practice Exam
