This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Google IT Support Professional Certificate [Complete]
1. Technical Support Fundamentals
1. Introduction to IT Support ()1. (Program Introduction) (5:18)
2. What is IT (4:22)
3. What does an IT Support Specialist do (2:29)
4. Course Introduction (2:06)
5. From Abacus to Analytical Engine (5:45)
6. The Path to Modern Computers (11:00)
7. Kevin Career (1:12)
8. Computer Language (3:00)
9. Character Encoding (3:04)
10. Binary (2:40)
11. How to count in Binary (3:05)
12. Video Abstraction (2:18)
13. Computer Architecture Overview (3:03)
14. Kevin Advice (1:20)
15. Module Introduction (2:39)
16. Introduction to Computer Hardware (4:41)
17. Programs and Hardware (8:40)
18. Joe Diversity (1:05)
CPU cache - Wikipedia_files
How to Overclock Your CPU _ Page 3 _ Digital Trends_files
19. CPU (4:38)
20. RAM (3:28)
21. Motherboards (3:39)
22. Storage (4:28)
23. Power Supplies (4:12)
24. Peripherals (4:09)
32-bit and 64-bit Windows_ Frequently asked questions - Windows Help_files
64-bit computing - Wikipedia_files
Kilobyte - Wikipedia_files
25. BIOS (4:45)
26. Putting it all together (21:29)
27. Ben_s Advice (1:06)
28. Module Introduction (2:49)
29. Components of an Operating System (6:18)
30. Files and File Systems (3:58)
31. Process Management (2:48)
32. Memory Management (2:03)
33. I-O Management (2:17)
34. Interacting with the OS-User Space (3:38)
35. Logs (2:16)
36. the Boot Process (2:26)
37. Cindy Drive _ Career Path (1:34)
Chrome OS - Wikipedia_files
ReFS - Wikipedia_files
38. Choosing an Operating System (3:29)
39. Virtual Machines (2:00)
40. Installing Windows (5:12)
41. Installing Linux (6:37)
42. What is Chrome OS (3:27)
43. Installing Mac OS (3:34)
44. Tri Ngo Obstacles _ How to be Successful in IT (1:36)
45. Introduction to Qwiklabs (1:55)
balenaEtcher - Home_files
The leading operating system for PCs, IoT devices, servers, cloud Ubuntu files
UbuntuUpdates - All package updates_files
46. Module Introduction (3:26)
47. Basics of Networking (7:43)
48. Networking Hardware (3:49)
49. Language of the Internet (2:01)
50. The Web (3:46)
51. Victor_s First Job (1:24)
52. History of the Internet (4:10)
53. Limitations of the Internet (3:52)
54. Impact (3:55)
55. Internet of Things (1:34)
56. Gian what hes does in Android Security (1:11)
57. Privacy and Security (3:49)
58. Heather Adkins Keeping Hacker_s out (2:07)
59. Module Introduction (2:39)
60. What is Software (2:53)
61. Types of Software (3:28)
62. Revisiting Abstraction (1:12)
63. Recipe for Commputing (3:45)
64. Phlean Navy (1:18)
65. Managing Software (3:01)
67. Installing, Updating and Removing Software on Windows (2:53)
68. Installing, Updating and Removing Software on Linux (1:55)
69. Software Automation (1:30)
70. Module Introduction (2:02)
71. Ask Questions! (4:02)
72. Isolating the Problem (3:29)
73. Follow the Cookie Crumbs (3:15)
74. Start with the Quikest Step First (2:13)
75. Troubleshooting Pitfalls to Avoid (1:53)
76. Amir Attributes (1:02)
77. Intro to Soft Skills (8:45)
78. Anatomy of an Interaction (7:32)
79. How to deal with Difficult Situations (10:08)
80. Ticketing Systems and Documenting Your Work (2:33)
81. Process Documentation (1:56)
82. Documenting in Ticketing Systems (1:23)
83. Your Opportunity for Success (1:41)
84. Standing out from the Crowd (3:22)
85. Getting Ready for the Interview (2:46)
86. What to Expect During the Technical Interview (2:44)
87. Showing your best self during the Interview (1:51)
88. Interview Role Play-Customer Service (3:08)
89. Rob finding a great candidate (1:20)
90. Module Wrap up (1:27)
Crafting Your Resume
Creating Your Elevator Pitch
91. Course Wrap up (2:25)
92. Sabrina No degree (1:04)
93. Congratulations (0:12)
work
5. Writing Effective Documentation
2. The Bits and Bytes of Computer Networking
Course Introduction - Google (5:48)
Alex Why Networking (1:12)
The TCP IP Five Layer Network Model (5:14)
1. Cables (4:02)
2. Hubs and Switches (2:28)
3. Routers (2:11)
4. Servers and Clients (2:00)
5. Sergio Being A Network Engineer (1:26)
6. Moving Bits Across the Wire (2:19)
7. Twisted Pair Cabling and Duplexing (1:54)
8. Network Ports and Patch Panels (2:28)
9. Ethernet and MAC Addresses (6:43)
10. Unicast, Multicast, and Broadcast (1:58)
11. Dissecting an Ethernet Frame (5:35)
12. Victor Escobedo Practical Experience in IT (1:20)
Introduction to The Network Layer (1:11)
13. The Network Layer (1:23)
14. IP Addresses (2:46)
15. IP Datagrams and Encapsulation (6:42)
16. IP Address Classes (3:57)
17. Address Resolution Protocol (2:08)
18. Sergio Path (1:35)
19. Subnetting (2:16)
20. Subnet Masks (7:26)
21. Basic Binary Math (6:49)
22. CIDR (4:44)
23. Basic Routing Concepts (8:22)
24. Routing Tables (3:35)
25. Interior Gateway Protocols (5:46)
26. Exterior Gateway Protocols (3:10)
27. Non-Routable Address Space (3:19)
28. Alex Good Story (1:30)
Introduction to the Transport (1:22)
29. The Transport Layer (3:31)
30. Dissection of a TCP Segment (5:22)
31. TCP Control Flags and the Three-way Handshake (5:51)
32. TCP Socket States (3:03)
33. Connection-oriented and Connectionless Protocols (4:24)
34. Firewalls (2:16)
35. The Application Layer (3:05)
36. The Application Layer and the OSI Model (2:08)
37. All the Layers Working in Unison (11:42)
Introduction to Network Services (1:41)
38. Introduction to Network Services (4:14)
39. The Many Steps of Name Resolution (8:39)
40. DNS and UDP (6:13)
41. DNS and UDP (1:44)
42. Resource Record Types (8:00)
43. Anatomy of a Domain Name (3:31)
44. DNS Zones (4:36)
45. Overview of DHCP (4:59)
46. DHCP in Action (5:12)
47. Basics of NAT (4:14)
48. NAT and the Transport Layer (4:15)
49. NAT, Non-Routable Address Space and the Limits of IPv4 (3:44)
50. Virtual Private Networks (4:19)
51. Proxy Services (4:45)
Introduction to Connecting to the Internet (1:38)
52. Dial-up, Modems and Point-to-Point Protocols (4:01)
53. What is broadband (3:11)
54. T Carrier Technologies (2:18)
55. Digital Subscriber Lines (3:59)
56. Cable Broadband (4:03)
57. Fiber Connections (2:49)
58. Wide Area Network Technologies (3:07)
59. Point-to-Point VPNs (2:00)
60. Introduction to Wireless Networking Technologies (5:46)
61. Wireless Network Configurations (2:51)
62. Wireless Channels (4:52)
63. Wireless Security (2:44)
64. Cellular Networking (1:48)
Introduction to Troubleshooting (1:53)
65. Ping Internet Control Message Protocol (5:18)
66. Traceroute (2:57)
67. Testing Port Connectivity (2:43)
68. Name Resolution Tools (2:27)
69. Public DNS Servers (3:52)
70. DNS Registration and Expiration (2:37)
71. Hosts Files (3:39)
72. What is The Cloud (6:42)
73. Everything as a Service (3:01)
74. Cloud Storage (2:14)
75. IPv6 Addressing and Subnetting (7:01)
76. IPv6 Headers (2:52)
77. IPv6 and IPv4 Harmony (3:32)
78. Interview Role Play Networking (4:21)
79. Course Wrap Up (1:59)
80. Alex Career Path (1:26)
81. Congratulations! (0:13)
3. Operating Systems and You Becoming a Power User
Course Introduction - Google (5:58)
1. Lesson Overview _ Practice Tips - Google (2:23)
2. List Directories in a GUI - Google (5:27)
3. Windows- List Directories in CLI - Google (4:20)
4. Linux- List Directories - Google (6:01)
5. Windows- Changing Directories in the GUI - Google (1:02)
6. Windows- Changing Directories in the CLI - Google (4:22)
7. Linux- Changing Directories in Bash - Google (1:39)
8. Windows- Make Directories in the GUI _ CLI - Google (2:23)
9. Linux- Make Directories in Bash - Google (1:22)
10. Windows- Command History - Google (2:32)
11. Linux- Command History - Google (0:47)
12. Windows- Copying Files _ Directories - Google (4:39)
13. Linux- Copying Files and Directories - Google (1:56)
14. Windows- Moving and Renaming Files, Directories - Google (2:02)
15. Linux- Moving and Renaming Files, Directories - Google (1:19)
16. Windows- Removing Files _ Directories - Google (3:43)
17. Linux- Removing Files _ Directories - Google (1:17)
18. Cindy Why OS is Important - Google (1:37)
19. Windows- Display File Contents - Google (3:53)
20. Linux- Display File Contents - Google (2:24)
21. Windows- Modifying Text Files - Google (2:04)
22. Linux- Modifying Text Files - Google (1:53)
23. Windows Powershell - Google (3:09)
24. Windows- Searching within Files - Google (6:15)
25. Windows- Searching within Directories - Google (1:01)
26. Linux- Searching within Files - Google (1:02)
27. Windows- Input, Output, and the Pipeline - Google (7:02)
28. Linux- Input, Output and Pipeline - Google (3:41)
29. Windows and Linux Advanced Navigation - Google (1:40)
30. Ben First Tech Job - Google (1:13)
31. Users, Administrators, and Groups, Oh My! - Google (3:07)
32. Windows- View User and Group Information - Google (6:16)
33. Windows- View User and Group Information using CLI - Google (2:59)
34. Linux- Users, Superuser and Beyond - Google (4:58)
35. Windows- Passwords - Google (4:35)
36. Linux- Passwords - Google (1:12)
37. Windows- Adding and Removing Users - Google (5:37)
38. Linux- Adding and Removing Users - Google (0:50)
39. Ben Life as a CIO - Google (1:29)
39. Windows- File Permissions - Google (5:48)
40. Linux- File Permissions - Google (2:55)
41. Windows- Modifying Permissions - Google (7:19)
42. Linux- Modifying Permissions - Google (4:56)
43. Windows- Special Permissions - Google (4:59)
44. Linux- SetUID, SetGID, Sticky Bit - Google (5:52)
45. Module Introduction - Google (0:43)
46. Windows- Software Packages - Google (6:22)
47. Linux- Software Packages - Google (3:06)
48. Windows- Archives - Google (3:43)
49. Linux- Archives - Google (1:25)
50. Windows- Package Dependencies - Google (7:05)
51. Linux- Package Dependencies - Google (1:55)
52. Windows- Package Manager - Google (4:28)
53. Linux- Package Manager Apt - Google (5:51)
54. Windows- Underneath the Hood - Google (3:37)
55. Linux- Underneath the Hood - Google (1:54)
56. Windows- Devices and Drivers - Google (3:37)
57. Linux- Devices and Drivers - Google (4:01)
58. Linux- Operating System Updates - Google (2:34)
59. Window- Operating System Updates - Google (4:09)
60. Module Introduction - Google (0:49)
61. Review of Filesystems - Google (2:33)
62. Disk Anatomy - Google (3:02)
63. Windows- Disk Partitioning & Formatting a Filesystem (6:59)
64. Windows- Mounting and Unmounting a Filesystem - Google (0:51)
65. Linux- Disk Partitioning and Formatting a Filesystem - Google (6:01)
66. Windows- Swap - Google (3:44)
67. Linux- Swap - Google (2:18)
68. Windows- Files - Google (6:02)
69. Linux- Files - Google (2:56)
70. Windows- Disk Usage - Google (3:47)
71. Linux- Disk Usage - Google (1:44)
72. Windows- Filesystem Repair - Google (4:20)
73. Linux- Filesystem Repair - Google (1:45)
74. Ben Passion - Google (1:16)
75. Module Introduction - Google (1:01)
76. Programs vs Processes Revisited - Google (2:45)
77. Windows- Process Creation and Termination - Google (3:33)
78. Linux- Process Creation and Termination - Google (1:21)
79. Jess Passions - Google (1:39)
80. Windows- Reading Process Information - Google (3:42)
81. Linux- Reading Process Information - Google (4:13)
82. Windows- Signals - Google (1:52)
83. Linux- Signals - Google (1:13)
84. Windows- Managing Processes - Google (5:01)
85. Linux- Managing Processes - Google (4:12)
86. Windows- Resource Monitoring - Google (4:24)
87. Linux- Resource Monitoring - Google (3:40)
89. Introduction - Google (0:50)
90. Remote Connection and SSH - Google (6:25)
91. Remote Connections on Windows - Google (5:29)
100. Remote Connection File Transfer - Google (1:49)
101. Remote Connection File Transfer on Windows - Google (3:51)
102. Virtual Machines - Google (4:02)
103. System Monitoring - Google (1:33)
104. The Windows Event Viewer - Google (4:34)
105. Linux Logs - Google (4:47)
106. Working with Logs - Google (4:19)
4. System Administration and IT Infrastructure Services
Course Introduction (4:37)
1. What is Systems Administration- - Google (2:35)
2. Servers Revisited - Google (4:23)
3. The Cloud - Google (3:45)
4. Organizational Policies - Google (2:34)
5. IT Infrastructure Services - Google (1:15)
6. User and Hardware Provisioning - Google (4:01)
7. Routine Maintenance - Google (1:11)
8. Vendors - Google (1:58)
9. Troubleshooting and Managing Issues - Google (3:13)
10. In Case of Fire, Break Glass - Google (1:26)
11. Dion Michelle Obama Story - Google (1:46)
12. With Great Power Comes Great Responsibility - Google (3:51)
13. Never Test in Production - Google (2:53)
14. Assessing Risk - Google (2:02)
15. Fixing Things the Right Way - Google (2:23)
16. What are IT Infrastructure Services (0:56)
17. Role of IT Infrastructure Services in SysAdmin (0:56)
18. Types of IT Infrastructure Services (6:03)
19. How do Qwiklabs Work- - Google (1:31)
20. Heather First Tech Job - Google (1:39)
21. Server Operating Systems - Google (1:19)
22. Virtualization - Google (2:50)
23. Remote Access Revisited - Google (3:48)
24. FTP, SFTP, and TFTP - Google (3:02)
25. NTP - Google (2:16)
26. Network Support Services Revisited - Google (1:59)
27. DNS - Google (1:46)
28. DNS for Web Servers - Google (2:07)
29. DNS for Internal Networks - Google (3:29)
30. DHCP - Google (2:18)
31. Unable to Resolve Hostname Domain Name (3:58)
32. What do Services Look Like in Action - Google (2:08)
33. Managing Services in Linux - Google (4:59)
34. Managing Services in Windows - Google (3:40)
35. Configuring Services in Linux - Google (4:55)
36. Configuring Services in Windows - Google (4:51)
37. Configuring DNS with Dnsmasq - Google (6:14)
38. Configuring DHCP with Dnsmasq - Google (7:51)
39. Module Introduction - Google (1:08)
40. Configuring Communication Services - Google (2:55)
41. Configuring Email Services - Google (3:54)
42. Configuring User Productivity Services - Google (2:02)
43. Configuring Security Services - Google (3:52)
44. Heather Managing Self Doubt - Google (1:44)
Redbooth101-LetstalkAboutEmail-Redbooth
45. What are file services- - Google (1:23)
46. Network File Storage - Google (3:29)
47. Configuring Print Services - Google (3:17)
48. Web Servers Revisited - Google (4:09)
49. What is a database server- - Google (1:48)
50. Is the website down- - Google (4:01)
51. Cloud Concepts - Google (3:17)
52. Typical Cloud Infrastructure Setups - Google (1:59)
53. When and How to Choose Cloud - Google (2:49)
54. Module Introduction (0:50)
55. What is a directory server (4:24)
56. Implementing Directory Services (2:47)
What is centralized management- - Google (4:57)
57. What is LDAP- - Google (1:56)
58. What is LDAP Authentication- - Google (3:09)
59. Heather Overcoming Obstacles - Google (1:19)
60. What is Active Directory- - Google (6:23)
61. Managing Active Directory - Google (3:19)
62. Managing Active Directory Users and Groups - Google (11:43)
63. Managing Active Directory User Passwords - Google (4:43)
64. Joining an Active Directory Domain - Google (4:43)
65. What is Group Policy- - Google (4:35)
66. Group Policy Creation and Editing - Google (13:43)
67. Group Policy Inheritance and Precedence - Google (8:15)
68. Group Policy Troubleshooting - Google (13:38)
69. What is OpenLDAP- - Google (4:08)
70. Managing OpenLDAP - Google (3:35)
71. Module Introduction - Google (0:44)
72. What is Data Recovery- - Google (3:33)
73. Backing Up Your Data - Google (3:24)
74. Backup Solutions - Google (3:20)
75. Testing Backups - Google (2:03)
76. Types of Backup - Google (5:51)
77. User Backups - Google (1:46)
72. What_s a Disaster Recovery Plan- - Google (5:03)
73. Designing a Disaster Recovery Plan - Google (6:13)
74. What_s a post-mortem- - Google (2:35)
75. Writing a Post-Mortem - Google (4:40)
76. Interview Role Play- Sys Admin - Google (2:54)
77. Final Project Introduction - Google (2:46)
79. Alex passion _ success - Google (1:16)
Congratulations! - Google (0:12)
5. IT Security Defense against the digital dark arts
Course Introduction - Google (5:42)
1. The CIA Triad - Google (2:32)
2. Essential Security Terms - Google (4:11)
3. Malicious Software - Google (5:05)
4. Malware Continued - Google (2:50)
5. Network Attacks - Google (3:41)
6. Denial-of-Service - Google (3:21)
7. Client-Side Attacks - Google (2:26)
8. Password Attacks - Google (2:11)
9. Deceptive Attacks - Google (3:43)
10. Cryptography - Google (7:31)
11. Symmetric Cryptography - Google (5:26)
12. Symmetric Encryption Algorithms - Google (9:13)
13. Rob What a Security Engineer Does - Google (1:11)
Supplemental Reading for The Future of Cryptanalysis
14. Asymmetric Cryptography - Google (7:54)
15. Asymmetric Encryption Algorithms - Google (5:45)
Supplemental reading for asymmetric encryption attack
16. Hashing - Google (3:46)
17. Hashing Algorithms - Google (5:24)
18. Hashing Algorithms (continued) - Google (5:36)
Supplemental reading for SHA1 Attacks
19. Public Key Infrastructure - Google (9:05)
20. Cryptography in Action - Google (8:31)
21. Securing Network Traffic - Google (6:04)
22. Cryptographic Hardware - Google (6:42)
Supplemental reading for securing traffic network
Supplemental reading for TPM Attacks
Supplemental reading for X.509 Standard
23. Authentication Best Practices - Google (6:17)
24. Multifactor Authentication - Google (12:24)
25. Certificates - Google (3:37)
26. LDAP - Google (3:35)
27. RADIUS - Google (1:49)
28. Kerberos - Google (7:25)
29. TACACS+ - Google (1:35)
30. Single Sign-On - Google (3:37)
31. Rob Path to IT - Google (1:29)
32. Authorization and Access Control Methods - Google (1:37)
33. Access Control - Google (5:08)
34. Access Control List - Google (1:27)
Supplemental reading for Authorization
35. Tracking Usage and Access - Google (3:01)
36. Rob Important Skills in Security - Google (1:37)
39. Network Hardening Best Practices - Google (8:49)
40. Network Hardware Hardening - Google (9:01)
41. Network Software Hardening - Google (5:00)
42. Joe Personal Obstacle - Google (0:44)
Supplemental reading for HAProxy, nginx and Apache HTTP server
Supplemental reading for Network Hardening Best Practices
43. WEP Encryption and Why You Shouldn_t Use It - Google (8:35)
44. Let_s Get Rid of WEP! WPA_WPA2 - Google (14:18)
45. Wireless Hardening - Google (3:07)
46. Heather Social Engineering - Google (1:21)
Supplemental reading for WEP Encryption and why you shouldn_t use it
47. Sniffing the Network - Google (5:15)
48. Wireshark and tcpdump - Google (6:45)
49. Intrusion Detection_Prevention Systems - Google (6:45)
Supplemental reading for intrusion detection,prevention system
50. Intro to Defense in Depth - Google (1:19)
51. Disabling Unnecessary Components - Google (4:47)
52. Host-Based Firewall - Google (4:21)
53. Logging and Auditing - Google (7:08)
54. Antimalware Protection - Google (7:47)
55. Disk Encryption - Google (6:44)
56. Heather Self Learning - Google (1:23)
Supplemental reading for antimalware protection
Supplemental reading for Disk encryption
Supplemental reading for logging and auditing
57. Software Patch Management - Google (6:32)
58. Application Policies - Google (4:24)
59. The Security Principles of Chrome OS (3:15)
60. Chrome OS Verified Boot - Google (3:16)
61. Chrome OS Data Encryption - Google (2:40)
62. Security Goals - Google (7:34)
63. Measuring and Assessing Risk - Google (5:22)
64. Privacy Policy - Google (3:52)
Supplemental reading for risk in the workplace
65. User Habits - Google (6:01)
66. Third-Party Security - Google (4:09)
67. Security Training - Google (3:33)
68. Alex Grit Story - Google (1:51)
69. Incident Reporting and Analysis - Google (6:48)
70. Incident Response and Recovery - Google (6:06)
71. Interview Role Play- Security - Google (4:11)
72. Amir Interview - Google (1:18)
73. Ari Interview - Google (1:47)
Congratulations! - Google (0:51)
35. Logs
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock