PC Introduction On-Demand: Fundamentals (Applications, Security & The Internet) Course Outline
**Note: This is an On-Demand Self Study Course, 6 days of content, 6-month unlimited access, $295**
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
This is a popular course for new computer users.You may take the course at any time; there are no set dates. The course covers Digital Security Awareness for Business and Home Users, Computer Fundamentals, Key Applications & Living Online topics.
About This Course
This Online On-Demand (self-study) training course includes expert lectures, PowerPoint visuals, and demonstrations. You will be able to follow along and successfully complete the course by completing the quizzes and exams. You do not need to own the software for the course and will be able to access the course from any device, provided you have internet access.
When you purchase your On-Demand course from ONLC you will receive a printed book to be used as a supplemental learning resource at no charge!
Duration
This course takes 6 days to complete and includes 19H 48M of video presentation
Course Outline
Security Awareness:
Chapter 01- Types of Security Threats
Your Computer
Your Internet
Yourself
Your Words
Your E-mail
Your Home
Your Files
Chapter 02 - Social Engineering
What is Social Engineering?
Social Engineering Defense
Manipulation
Why Does it Work?
Fooling People
What Else Can Be Done?
Personal Precautions
Chapter 03 - Identity Theft
How Does it Happen?
How to Defend Yourself
What Criminals Do with Your Information
How Can You Tell if You’re a Victim?
Actions to Take if You are a Victim
Contact Information
Chapter 04 - Data Classification
Policies for Data Sharing
Least Privilege
How to Classify
Types of Classifications
Jurisdictional Issues
Your Involvement
What Could Happen?
What Type of Policies?
How to Destroy Data
Chapter 05 - Protecting Your Digital Information
Why Do a Backup?
Types of Backups
What to Backup
Where to Store Backups
How to Perform Backups
Backup Utilities
Backup Management Practices
Passwords
Password Management
AAA
Chapter 06 - Malware
Basic Definitions
What to Look For
How You Can Get Infected
Software Detection
Hardware Detection
Cloud Detection
Know the Extensions
Your Defenses
Chapter 07 - Security from End-to-End
Physical Security
Home/Workstation Security
Encryption
Hand Held Electronics
Workstation Software
Updating the OS and Software
Secure E-mail Use
E-mail Encryption
E-mail Hazards
How to Stop SPAM
E-mail Attachments
Other E-mail Warnings
What if You Get Malware from E-mail?
How to Avoid SPAM
Secure Web Browsing
Secure Instant Messaging / Social Sites
Chapter 08 - Piracy
What is Intellectual Property
Copyrights
Software Piracy
Types of Piracy
Risks
Chapter 09 - Security Policies
Why are Policies Important
Defining an Incident
Response Teams
Response Checklist
Chapter 10 - Moving Forward
Education and Awareness
Individuals
Organizations
Know the Principles of Security Domains
Computing Fundamentals:
Chapter 01 - Operating System Fundamentals
How Applications and Hardware Work with an OS
The Old Days of the CLI
What the Modern OS Supplied
Common OS Features
Directory Infrastructure
Drivers and Hardware
Common Interface
Directory Infrastructure
Updates and Patches
Visual Options
The Background
Working with the Operating System
Working with the Software
Security
Software
Hardware
Visual Devices
Date/Time
Servers
Chapter 02 - Computer and Network Terminology
Hardware and Peripherals
Storage
Configuration
How a Hard Drive Works
Connectivity Devices
Server Types
Desktop
Switches
Routers
Firewalls
Module 03 - Working with Software and the OS
Software
Types of Software Licenses
Pirating
Hardware Limitations
Presentations
Publishing
Content and Entertainment
Working with Media
Database vs. Spreadsheet
File Compression
Compression
Disk Management
Malware Detection
Chapter 04 - Troubleshooting
Updates
Removing Malware
Safe Mode
Knowledge Base
Task and Process Management
Firmware
Cables and Connections
Devices and Peripherals
Backups
Key Applications:
Chapter 01 - Application Features
Commands and Features in Common
Formatting
Navigating Applications
Multimedia
Chapter 02 - Working with Word Processing
Layouts
Manual Page Break
Adding a Header
The Margins Tab
Tabs
Tabs and Setting Other Types of Tabs
Paragraph Alignments
Working with Data
Adding Rows and Columns
Define New Bullet Dialog Box
Chapter 03 - Working with Spreadsheets
Spreadsheets
Entering Cell References with Mouse
Worksheet Navigation Methods
Saving Workbooks
Workbook
Data
Formulas
Entering Formulas
Formatting
Adding Headers and Footers
Charts and Graphs
Chart Elements
Chapter 04 - Making a Presentation
Opening Presentations
Updating Presentations
Using Content
Character and
Paragraph Formatting
Changing the Font
Changing the Font Size
Finding and
Replacing Text
Adding Tables
Inserting a Chart
Slides
Moving Between Slides
Adding Slides
Slides
Deleting
Slides
Slides from Other Presentations
Slide Design
Inserting Pictures
Adding Clip Art
Chapter 05 - Databases
What is a Database?
Queries
Database Security
Chapter 06 - Collaboration
Collaborating with Others
Methods of Sharing Data
Living Online:
Chapter 01 - Web Browsers
Web Browsing
Navigating the Browser
Chapter 02 - Networking Terminology
Internet Connections
Network Types
Troubleshooting
Chapter 03 - E-mail
Inbox
Tools for Managing Junk Email
Live Chat
Chat Communications
Real-Time
Chapter 04 - Communicating in the Modern World
Standards
Legal and Responsible Use
Chapter 05 - Protecting Yourself
Secure Communications
Data Protection
Ergonomics
Chapter 06 - Web Searching
Using Search Engines
Do You Believe the Results?
Advanced Search Options
View outline in Word
GPCZ18