Welcome to ONLC Training Centers

PC Introduction On-Demand: Fundamentals (Applications, Security & The Internet)

Price:$295

Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.


PC Introduction On-Demand: Fundamentals (Applications, Security & The Internet) Course Outline

**Note: This is an On-Demand Self Study Course, 6 days of content, 6-month unlimited access, $295**
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
This is a popular course for new computer users.You may take the course at any time; there are no set dates. The course covers Digital Security Awareness for Business and Home Users, Computer Fundamentals, Key Applications & Living Online topics.

About This Course
This Online On-Demand (self-study) training course includes expert lectures, PowerPoint visuals, and demonstrations. You will be able to follow along and successfully complete the course by completing the quizzes and exams. You do not need to own the software for the course and will be able to access the course from any device, provided you have internet access.

When you purchase your On-Demand course from ONLC you will receive a printed book to be used as a supplemental learning resource at no charge!

Duration
This course takes 6 days to complete and includes 19H 48M of video presentation

Course Outline

Security Awareness:

Chapter 01- Types of Security Threats
Your Computer
Your Internet
Yourself
Your Words
Your E-mail
Your Home
Your Files

Chapter 02 - Social Engineering
What is Social Engineering?
Social Engineering Defense
Manipulation
Why Does it Work?
Fooling People
What Else Can Be Done?
Personal Precautions

Chapter 03 - Identity Theft
How Does it Happen?
How to Defend Yourself
What Criminals Do with Your Information
How Can You Tell if You’re a Victim?
Actions to Take if You are a Victim
Contact Information

Chapter 04 - Data Classification
Policies for Data Sharing
Least Privilege
How to Classify
Types of Classifications
Jurisdictional Issues
Your Involvement
What Could Happen?
What Type of Policies?
How to Destroy Data

Chapter 05 - Protecting Your Digital Information
Why Do a Backup?
Types of Backups
What to Backup
Where to Store Backups
How to Perform Backups
Backup Utilities
Backup Management Practices
Passwords
Password Management
AAA

Chapter 06 - Malware
Basic Definitions
What to Look For
How You Can Get Infected
Software Detection
Hardware Detection
Cloud Detection
Know the Extensions
Your Defenses

Chapter 07 - Security from End-to-End
Physical Security
Home/Workstation Security
Encryption
Hand Held Electronics
Workstation Software
Updating the OS and Software
Secure E-mail Use
E-mail Encryption
E-mail Hazards
How to Stop SPAM
E-mail Attachments
Other E-mail Warnings
What if You Get Malware from E-mail?
How to Avoid SPAM
Secure Web Browsing
Secure Instant Messaging / Social Sites

Chapter 08 - Piracy
What is Intellectual Property
Copyrights
Software Piracy
Types of Piracy
Risks

Chapter 09 - Security Policies
Why are Policies Important
Defining an Incident
Response Teams
Response Checklist

Chapter 10 - Moving Forward
Education and Awareness
Individuals
Organizations
Know the Principles of Security Domains

Computing Fundamentals:

Chapter 01 - Operating System Fundamentals
How Applications and Hardware Work with an OS
The Old Days of the CLI
What the Modern OS Supplied
Common OS Features
Directory Infrastructure
Drivers and Hardware
Common Interface
Directory Infrastructure
Updates and Patches
Visual Options
The Background
Working with the Operating System
Working with the Software
Security
Software
Hardware
Visual Devices
Date/Time
Servers

Chapter 02 - Computer and Network Terminology
Hardware and Peripherals
Storage
Configuration
How a Hard Drive Works
Connectivity Devices
Server Types
Desktop
Switches
Routers
Firewalls

Module 03 - Working with Software and the OS
Software
Types of Software Licenses
Pirating
Hardware Limitations
Presentations
Publishing
Content and Entertainment
Working with Media
Database vs. Spreadsheet
File Compression
Compression
Disk Management
Malware Detection

Chapter 04 - Troubleshooting
Updates
Removing Malware
Safe Mode
Knowledge Base
Task and Process Management
Firmware
Cables and Connections
Devices and Peripherals
Backups

Key Applications:

Chapter 01 - Application Features
Commands and Features in Common
Formatting
Navigating Applications
Multimedia

Chapter 02 - Working with Word Processing
Layouts
Manual Page Break
Adding a Header
The Margins Tab
Tabs
Tabs and Setting Other Types of Tabs
Paragraph Alignments
Working with Data
Adding Rows and Columns
Define New Bullet Dialog Box

Chapter 03 - Working with Spreadsheets
Spreadsheets
Entering Cell References with Mouse
Worksheet Navigation Methods
Saving Workbooks
Workbook
Data
Formulas
Entering Formulas
Formatting
Adding Headers and Footers
Charts and Graphs
Chart Elements

Chapter 04 - Making a Presentation
Opening Presentations
Updating Presentations
Using Content
Character and
Paragraph Formatting
Changing the Font
Changing the Font Size
Finding and
Replacing Text
Adding Tables
Inserting a Chart
Slides
Moving Between Slides
Adding Slides
Slides
Deleting
Slides
Slides from Other Presentations
Slide Design
Inserting Pictures
Adding Clip Art

Chapter 05 - Databases
What is a Database?
Queries
Database Security

Chapter 06 - Collaboration
Collaborating with Others
Methods of Sharing Data

Living Online:

Chapter 01 - Web Browsers
Web Browsing
Navigating the Browser

Chapter 02 - Networking Terminology
Internet Connections
Network Types
Troubleshooting

Chapter 03 - E-mail
Inbox
Tools for Managing Junk Email
Live Chat
Chat Communications
Real-Time

Chapter 04 - Communicating in the Modern World
Standards
Legal and Responsible Use

Chapter 05 - Protecting Yourself
Secure Communications
Data Protection
Ergonomics

Chapter 06 - Web Searching
Using Search Engines
Do You Believe the Results?
Advanced Search Options

View outline in Word

GPCZ18

Attend hands-on, instructor-led PC Introduction On-Demand: Fundamentals (Applications, Security & The Internet) training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
www.onlc.com