top of page
man-using-computer-and-programming-to-break-protec-2022-11-14-12-02-27-utc.jpg

Course Details / IT Fundamentals

Explore insightful courses led by experienced IT professionals you can trust. These are trainers you can ask questions – not pre-recorded cookie-cutter offerings.

ABOUT

Dive into the dynamic world of Information Technology (IT) with our comprehensive "IT Fundamentals" course! Designed for beginners and those looking to solidify their foundational knowledge, this course offers an indepth exploration of essential IT concepts and principles. From understanding computer hardware and software components to grasping the basics of networks, cybersecurity, and data management, participants will be equipped with the critical tools to navigate the rapidly evolving digital landscape. Whether you're considering a career in IT, or simply wish to be more tech-savvy in our interconnected world, this course will pave the way for your digital proficiency journey. Join us and unravel the magic behind the screens!

tablet-programmer-hands-and-html-screen-for-codin-2023-02-25-00-31-42-utc.jpg

CURRICULUM

security.png
Computers and Their Language

Hardware components

Operating System

Networking

Database

Storage

Virtualization

Cloud

Troubleshooting and Support

computer (2).png
Networking Fundamentals

Computer Communications

IP Address (Static vs DHCP)

MAC Address

TCP/IP

Subnetting and subnet masks

OSI layer

LAN, WAN, and MAN

Secure Web Browsing

Network Devices (Switvches, Routers, Modems,   Access Points)

computer.png
Operating Systems

Boot Process

UEFI (Unified Extensible Firmware Interface)

Type of Operating Systems

CLI vs GUI Operating Systems

OS File Systems Management

Troubleshooting and Support

computer (1).png
Virtualization and Cloud

Virtualization concept

Virtualization Technologies

Setting up Virtual Machines

cyber-security (1).png
Software Fundamentals

System Software

Application Software

Freeware and Shareware

Open-source software

BIOS

Programs and Services

Microsoft Office 365 Overview

Microsoft Word, Excel, Powerpoint

cyber-security (1).png
Computer Security

Types of Security Breach

Types of Security Threat

Securing Operating Systems

Security Implementation Tools

CIA Triad

Security Best Practices

bottom of page