This site is powered by
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lecture
Complete and Continue
Google IT Support Professional Certificate [Complete]
1. Technical Support Fundamentals
1. Introduction to IT Support ()1. (Program Introduction) (5:18)
2. What is IT (4:22)
3. What does an IT Support Specialist do (2:29)
4. Course Introduction (2:06)
5. From Abacus to Analytical Engine (5:45)
6. The Path to Modern Computers (11:00)
7. Kevin Career (1:12)
8. Computer Language (3:00)
9. Character Encoding (3:04)
10. Binary (2:40)
11. How to count in Binary (3:05)
12. Video Abstraction (2:18)
13. Computer Architecture Overview (3:03)
14. Kevin Advice (1:20)
15. Module Introduction (2:39)
16. Introduction to Computer Hardware (4:41)
17. Programs and Hardware (8:40)
18. Joe Diversity (1:05)
CPU cache - Wikipedia_files
How to Overclock Your CPU _ Page 3 _ Digital Trends_files
19. CPU (4:38)
20. RAM (3:28)
21. Motherboards (3:39)
22. Storage (4:28)
23. Power Supplies (4:12)
24. Peripherals (4:09)
32-bit and 64-bit Windows_ Frequently asked questions - Windows Help_files
64-bit computing - Wikipedia_files
Kilobyte - Wikipedia_files
25. BIOS (4:45)
26. Putting it all together (21:29)
27. Ben_s Advice (1:06)
28. Module Introduction (2:49)
29. Components of an Operating System (6:18)
30. Files and File Systems (3:58)
31. Process Management (2:48)
32. Memory Management (2:03)
33. I-O Management (2:17)
34. Interacting with the OS-User Space (3:38)
35. Logs (2:16)
36. the Boot Process (2:26)
37. Cindy Drive _ Career Path (1:34)
Chrome OS - Wikipedia_files
ReFS - Wikipedia_files
38. Choosing an Operating System (3:29)
39. Virtual Machines (2:00)
40. Installing Windows (5:12)
41. Installing Linux (6:37)
42. What is Chrome OS (3:27)
43. Installing Mac OS (3:34)
44. Tri Ngo Obstacles _ How to be Successful in IT (1:36)
45. Introduction to Qwiklabs (1:55)
balenaEtcher - Home_files
The leading operating system for PCs, IoT devices, servers, cloud Ubuntu files
UbuntuUpdates - All package updates_files
46. Module Introduction (3:26)
47. Basics of Networking (7:43)
48. Networking Hardware (3:49)
49. Language of the Internet (2:01)
50. The Web (3:46)
51. Victor_s First Job (1:24)
52. History of the Internet (4:10)
53. Limitations of the Internet (3:52)
54. Impact (3:55)
55. Internet of Things (1:34)
56. Gian what hes does in Android Security (1:11)
57. Privacy and Security (3:49)
58. Heather Adkins Keeping Hacker_s out (2:07)
59. Module Introduction (2:39)
60. What is Software (2:53)
61. Types of Software (3:28)
62. Revisiting Abstraction (1:12)
63. Recipe for Commputing (3:45)
64. Phlean Navy (1:18)
65. Managing Software (3:01)
67. Installing, Updating and Removing Software on Windows (2:53)
68. Installing, Updating and Removing Software on Linux (1:55)
69. Software Automation (1:30)
70. Module Introduction (2:02)
71. Ask Questions! (4:02)
72. Isolating the Problem (3:29)
73. Follow the Cookie Crumbs (3:15)
74. Start with the Quikest Step First (2:13)
75. Troubleshooting Pitfalls to Avoid (1:53)
76. Amir Attributes (1:02)
77. Intro to Soft Skills (8:45)
78. Anatomy of an Interaction (7:32)
79. How to deal with Difficult Situations (10:08)
80. Ticketing Systems and Documenting Your Work (2:33)
81. Process Documentation (1:56)
82. Documenting in Ticketing Systems (1:23)
83. Your Opportunity for Success (1:41)
84. Standing out from the Crowd (3:22)
85. Getting Ready for the Interview (2:46)
86. What to Expect During the Technical Interview (2:44)
87. Showing your best self during the Interview (1:51)
88. Interview Role Play-Customer Service (3:08)
89. Rob finding a great candidate (1:20)
90. Module Wrap up (1:27)
Crafting Your Resume
Creating Your Elevator Pitch
91. Course Wrap up (2:25)
92. Sabrina No degree (1:04)
93. Congratulations (0:12)
work
5. Writing Effective Documentation
2. The Bits and Bytes of Computer Networking
Course Introduction - Google (5:48)
Alex Why Networking (1:12)
The TCP IP Five Layer Network Model (5:14)
1. Cables (4:02)
2. Hubs and Switches (2:28)
3. Routers (2:11)
4. Servers and Clients (2:00)
5. Sergio Being A Network Engineer (1:26)
6. Moving Bits Across the Wire (2:19)
7. Twisted Pair Cabling and Duplexing (1:54)
8. Network Ports and Patch Panels (2:28)
9. Ethernet and MAC Addresses (6:43)
10. Unicast, Multicast, and Broadcast (1:58)
11. Dissecting an Ethernet Frame (5:35)
12. Victor Escobedo Practical Experience in IT (1:20)
Introduction to The Network Layer (1:11)
13. The Network Layer (1:23)
14. IP Addresses (2:46)
15. IP Datagrams and Encapsulation (6:42)
16. IP Address Classes (3:57)
17. Address Resolution Protocol (2:08)
18. Sergio Path (1:35)
19. Subnetting (2:16)
20. Subnet Masks (7:26)
21. Basic Binary Math (6:49)
22. CIDR (4:44)
23. Basic Routing Concepts (8:22)
24. Routing Tables (3:35)
25. Interior Gateway Protocols (5:46)
26. Exterior Gateway Protocols (3:10)
27. Non-Routable Address Space (3:19)
28. Alex Good Story (1:30)
Introduction to the Transport (1:22)
29. The Transport Layer (3:31)
30. Dissection of a TCP Segment (5:22)
31. TCP Control Flags and the Three-way Handshake (5:51)
32. TCP Socket States (3:03)
33. Connection-oriented and Connectionless Protocols (4:24)
34. Firewalls (2:16)
35. The Application Layer (3:05)
36. The Application Layer and the OSI Model (2:08)
37. All the Layers Working in Unison (11:42)
Introduction to Network Services (1:41)
38. Introduction to Network Services (4:14)
39. The Many Steps of Name Resolution (8:39)
40. DNS and UDP (6:13)
41. DNS and UDP (1:44)
42. Resource Record Types (8:00)
43. Anatomy of a Domain Name (3:31)
44. DNS Zones (4:36)
45. Overview of DHCP (4:59)
46. DHCP in Action (5:12)
47. Basics of NAT (4:14)
48. NAT and the Transport Layer (4:15)
49. NAT, Non-Routable Address Space and the Limits of IPv4 (3:44)
50. Virtual Private Networks (4:19)
51. Proxy Services (4:45)
Introduction to Connecting to the Internet (1:38)
52. Dial-up, Modems and Point-to-Point Protocols (4:01)
53. What is broadband (3:11)
54. T Carrier Technologies (2:18)
55. Digital Subscriber Lines (3:59)
56. Cable Broadband (4:03)
57. Fiber Connections (2:49)
58. Wide Area Network Technologies (3:07)
59. Point-to-Point VPNs (2:00)
60. Introduction to Wireless Networking Technologies (5:46)
61. Wireless Network Configurations (2:51)
62. Wireless Channels (4:52)
63. Wireless Security (2:44)
64. Cellular Networking (1:48)
Introduction to Troubleshooting (1:53)
65. Ping Internet Control Message Protocol (5:18)
66. Traceroute (2:57)
67. Testing Port Connectivity (2:43)
68. Name Resolution Tools (2:27)
69. Public DNS Servers (3:52)
70. DNS Registration and Expiration (2:37)
71. Hosts Files (3:39)
72. What is The Cloud (6:42)
73. Everything as a Service (3:01)
74. Cloud Storage (2:14)
75. IPv6 Addressing and Subnetting (7:01)
76. IPv6 Headers (2:52)
77. IPv6 and IPv4 Harmony (3:32)
78. Interview Role Play Networking (4:21)
79. Course Wrap Up (1:59)
80. Alex Career Path (1:26)
81. Congratulations! (0:13)
3. Operating Systems and You Becoming a Power User
Course Introduction - Google (5:58)
1. Lesson Overview _ Practice Tips - Google (2:23)
2. List Directories in a GUI - Google (5:27)
3. Windows- List Directories in CLI - Google (4:20)
4. Linux- List Directories - Google (6:01)
5. Windows- Changing Directories in the GUI - Google (1:02)
6. Windows- Changing Directories in the CLI - Google (4:22)
7. Linux- Changing Directories in Bash - Google (1:39)
8. Windows- Make Directories in the GUI _ CLI - Google (2:23)
9. Linux- Make Directories in Bash - Google (1:22)
10. Windows- Command History - Google (2:32)
11. Linux- Command History - Google (0:47)
12. Windows- Copying Files _ Directories - Google (4:39)
13. Linux- Copying Files and Directories - Google (1:56)
14. Windows- Moving and Renaming Files, Directories - Google (2:02)
15. Linux- Moving and Renaming Files, Directories - Google (1:19)
16. Windows- Removing Files _ Directories - Google (3:43)
17. Linux- Removing Files _ Directories - Google (1:17)
18. Cindy Why OS is Important - Google (1:37)
19. Windows- Display File Contents - Google (3:53)
20. Linux- Display File Contents - Google (2:24)
21. Windows- Modifying Text Files - Google (2:04)
22. Linux- Modifying Text Files - Google (1:53)
23. Windows Powershell - Google (3:09)
24. Windows- Searching within Files - Google (6:15)
25. Windows- Searching within Directories - Google (1:01)
26. Linux- Searching within Files - Google (1:02)
27. Windows- Input, Output, and the Pipeline - Google (7:02)
28. Linux- Input, Output and Pipeline - Google (3:41)
29. Windows and Linux Advanced Navigation - Google (1:40)
30. Ben First Tech Job - Google (1:13)
31. Users, Administrators, and Groups, Oh My! - Google (3:07)
32. Windows- View User and Group Information - Google (6:16)
33. Windows- View User and Group Information using CLI - Google (2:59)
34. Linux- Users, Superuser and Beyond - Google (4:58)
35. Windows- Passwords - Google (4:35)
36. Linux- Passwords - Google (1:12)
37. Windows- Adding and Removing Users - Google (5:37)
38. Linux- Adding and Removing Users - Google (0:50)
39. Ben Life as a CIO - Google (1:29)
39. Windows- File Permissions - Google (5:48)
40. Linux- File Permissions - Google (2:55)
41. Windows- Modifying Permissions - Google (7:19)
42. Linux- Modifying Permissions - Google (4:56)
43. Windows- Special Permissions - Google (4:59)
44. Linux- SetUID, SetGID, Sticky Bit - Google (5:52)
45. Module Introduction - Google (0:43)
46. Windows- Software Packages - Google (6:22)
47. Linux- Software Packages - Google (3:06)
48. Windows- Archives - Google (3:43)
49. Linux- Archives - Google (1:25)
50. Windows- Package Dependencies - Google (7:05)
51. Linux- Package Dependencies - Google (1:55)
52. Windows- Package Manager - Google (4:28)
53. Linux- Package Manager Apt - Google (5:51)
54. Windows- Underneath the Hood - Google (3:37)
55. Linux- Underneath the Hood - Google (1:54)
56. Windows- Devices and Drivers - Google (3:37)
57. Linux- Devices and Drivers - Google (4:01)
58. Linux- Operating System Updates - Google (2:34)
59. Window- Operating System Updates - Google (4:09)
60. Module Introduction - Google (0:49)
61. Review of Filesystems - Google (2:33)
62. Disk Anatomy - Google (3:02)
63. Windows- Disk Partitioning & Formatting a Filesystem (6:59)
64. Windows- Mounting and Unmounting a Filesystem - Google (0:51)
65. Linux- Disk Partitioning and Formatting a Filesystem - Google (6:01)
66. Windows- Swap - Google (3:44)
67. Linux- Swap - Google (2:18)
68. Windows- Files - Google (6:02)
69. Linux- Files - Google (2:56)
70. Windows- Disk Usage - Google (3:47)
71. Linux- Disk Usage - Google (1:44)
72. Windows- Filesystem Repair - Google (4:20)
73. Linux- Filesystem Repair - Google (1:45)
74. Ben Passion - Google (1:16)
75. Module Introduction - Google (1:01)
76. Programs vs Processes Revisited - Google (2:45)
77. Windows- Process Creation and Termination - Google (3:33)
78. Linux- Process Creation and Termination - Google (1:21)
79. Jess Passions - Google (1:39)
80. Windows- Reading Process Information - Google (3:42)
81. Linux- Reading Process Information - Google (4:13)
82. Windows- Signals - Google (1:52)
83. Linux- Signals - Google (1:13)
84. Windows- Managing Processes - Google (5:01)
85. Linux- Managing Processes - Google (4:12)
86. Windows- Resource Monitoring - Google (4:24)
87. Linux- Resource Monitoring - Google (3:40)
89. Introduction - Google (0:50)
90. Remote Connection and SSH - Google (6:25)
91. Remote Connections on Windows - Google (5:29)
100. Remote Connection File Transfer - Google (1:49)
101. Remote Connection File Transfer on Windows - Google (3:51)
102. Virtual Machines - Google (4:02)
103. System Monitoring - Google (1:33)
104. The Windows Event Viewer - Google (4:34)
105. Linux Logs - Google (4:47)
106. Working with Logs - Google (4:19)
4. System Administration and IT Infrastructure Services
Course Introduction (4:37)
1. What is Systems Administration- - Google (2:35)
2. Servers Revisited - Google (4:23)
3. The Cloud - Google (3:45)
4. Organizational Policies - Google (2:34)
5. IT Infrastructure Services - Google (1:15)
6. User and Hardware Provisioning - Google (4:01)
7. Routine Maintenance - Google (1:11)
8. Vendors - Google (1:58)
9. Troubleshooting and Managing Issues - Google (3:13)
10. In Case of Fire, Break Glass - Google (1:26)
11. Dion Michelle Obama Story - Google (1:46)
12. With Great Power Comes Great Responsibility - Google (3:51)
13. Never Test in Production - Google (2:53)
14. Assessing Risk - Google (2:02)
15. Fixing Things the Right Way - Google (2:23)
16. What are IT Infrastructure Services (0:56)
17. Role of IT Infrastructure Services in SysAdmin (0:56)
18. Types of IT Infrastructure Services (6:03)
19. How do Qwiklabs Work- - Google (1:31)
20. Heather First Tech Job - Google (1:39)
21. Server Operating Systems - Google (1:19)
22. Virtualization - Google (2:50)
23. Remote Access Revisited - Google (3:48)
24. FTP, SFTP, and TFTP - Google (3:02)
25. NTP - Google (2:16)
26. Network Support Services Revisited - Google (1:59)
27. DNS - Google (1:46)
28. DNS for Web Servers - Google (2:07)
29. DNS for Internal Networks - Google (3:29)
30. DHCP - Google (2:18)
31. Unable to Resolve Hostname Domain Name (3:58)
32. What do Services Look Like in Action - Google (2:08)
33. Managing Services in Linux - Google (4:59)
34. Managing Services in Windows - Google (3:40)
35. Configuring Services in Linux - Google (4:55)
36. Configuring Services in Windows - Google (4:51)
37. Configuring DNS with Dnsmasq - Google (6:14)
38. Configuring DHCP with Dnsmasq - Google (7:51)
39. Module Introduction - Google (1:08)
40. Configuring Communication Services - Google (2:55)
41. Configuring Email Services - Google (3:54)
42. Configuring User Productivity Services - Google (2:02)
43. Configuring Security Services - Google (3:52)
44. Heather Managing Self Doubt - Google (1:44)
Redbooth101-LetstalkAboutEmail-Redbooth
45. What are file services- - Google (1:23)
46. Network File Storage - Google (3:29)
47. Configuring Print Services - Google (3:17)
48. Web Servers Revisited - Google (4:09)
49. What is a database server- - Google (1:48)
50. Is the website down- - Google (4:01)
51. Cloud Concepts - Google (3:17)
52. Typical Cloud Infrastructure Setups - Google (1:59)
53. When and How to Choose Cloud - Google (2:49)
54. Module Introduction (0:50)
55. What is a directory server (4:24)
56. Implementing Directory Services (2:47)
What is centralized management- - Google (4:57)
57. What is LDAP- - Google (1:56)
58. What is LDAP Authentication- - Google (3:09)
59. Heather Overcoming Obstacles - Google (1:19)
60. What is Active Directory- - Google (6:23)
61. Managing Active Directory - Google (3:19)
62. Managing Active Directory Users and Groups - Google (11:43)
63. Managing Active Directory User Passwords - Google (4:43)
64. Joining an Active Directory Domain - Google (4:43)
65. What is Group Policy- - Google (4:35)
66. Group Policy Creation and Editing - Google (13:43)
67. Group Policy Inheritance and Precedence - Google (8:15)
68. Group Policy Troubleshooting - Google (13:38)
69. What is OpenLDAP- - Google (4:08)
70. Managing OpenLDAP - Google (3:35)
71. Module Introduction - Google (0:44)
72. What is Data Recovery- - Google (3:33)
73. Backing Up Your Data - Google (3:24)
74. Backup Solutions - Google (3:20)
75. Testing Backups - Google (2:03)
76. Types of Backup - Google (5:51)
77. User Backups - Google (1:46)
72. What_s a Disaster Recovery Plan- - Google (5:03)
73. Designing a Disaster Recovery Plan - Google (6:13)
74. What_s a post-mortem- - Google (2:35)
75. Writing a Post-Mortem - Google (4:40)
76. Interview Role Play- Sys Admin - Google (2:54)
77. Final Project Introduction - Google (2:46)
79. Alex passion _ success - Google (1:16)
Congratulations! - Google (0:12)
5. IT Security Defense against the digital dark arts
Course Introduction - Google (5:42)
1. The CIA Triad - Google (2:32)
2. Essential Security Terms - Google (4:11)
3. Malicious Software - Google (5:05)
4. Malware Continued - Google (2:50)
5. Network Attacks - Google (3:41)
6. Denial-of-Service - Google (3:21)
7. Client-Side Attacks - Google (2:26)
8. Password Attacks - Google (2:11)
9. Deceptive Attacks - Google (3:43)
10. Cryptography - Google (7:31)
11. Symmetric Cryptography - Google (5:26)
12. Symmetric Encryption Algorithms - Google (9:13)
13. Rob What a Security Engineer Does - Google (1:11)
Supplemental Reading for The Future of Cryptanalysis
14. Asymmetric Cryptography - Google (7:54)
15. Asymmetric Encryption Algorithms - Google (5:45)
Supplemental reading for asymmetric encryption attack
16. Hashing - Google (3:46)
17. Hashing Algorithms - Google (5:24)
18. Hashing Algorithms (continued) - Google (5:36)
Supplemental reading for SHA1 Attacks
19. Public Key Infrastructure - Google (9:05)
20. Cryptography in Action - Google (8:31)
21. Securing Network Traffic - Google (6:04)
22. Cryptographic Hardware - Google (6:42)
Supplemental reading for securing traffic network
Supplemental reading for TPM Attacks
Supplemental reading for X.509 Standard
23. Authentication Best Practices - Google (6:17)
24. Multifactor Authentication - Google (12:24)
25. Certificates - Google (3:37)
26. LDAP - Google (3:35)
27. RADIUS - Google (1:49)
28. Kerberos - Google (7:25)
29. TACACS+ - Google (1:35)
30. Single Sign-On - Google (3:37)
31. Rob Path to IT - Google (1:29)
32. Authorization and Access Control Methods - Google (1:37)
33. Access Control - Google (5:08)
34. Access Control List - Google (1:27)
Supplemental reading for Authorization
35. Tracking Usage and Access - Google (3:01)
36. Rob Important Skills in Security - Google (1:37)
39. Network Hardening Best Practices - Google (8:49)
40. Network Hardware Hardening - Google (9:01)
41. Network Software Hardening - Google (5:00)
42. Joe Personal Obstacle - Google (0:44)
Supplemental reading for HAProxy, nginx and Apache HTTP server
Supplemental reading for Network Hardening Best Practices
43. WEP Encryption and Why You Shouldn_t Use It - Google (8:35)
44. Let_s Get Rid of WEP! WPA_WPA2 - Google (14:18)
45. Wireless Hardening - Google (3:07)
46. Heather Social Engineering - Google (1:21)
Supplemental reading for WEP Encryption and why you shouldn_t use it
47. Sniffing the Network - Google (5:15)
48. Wireshark and tcpdump - Google (6:45)
49. Intrusion Detection_Prevention Systems - Google (6:45)
Supplemental reading for intrusion detection,prevention system
50. Intro to Defense in Depth - Google (1:19)
51. Disabling Unnecessary Components - Google (4:47)
52. Host-Based Firewall - Google (4:21)
53. Logging and Auditing - Google (7:08)
54. Antimalware Protection - Google (7:47)
55. Disk Encryption - Google (6:44)
56. Heather Self Learning - Google (1:23)
Supplemental reading for antimalware protection
Supplemental reading for Disk encryption
Supplemental reading for logging and auditing
57. Software Patch Management - Google (6:32)
58. Application Policies - Google (4:24)
59. The Security Principles of Chrome OS (3:15)
60. Chrome OS Verified Boot - Google (3:16)
61. Chrome OS Data Encryption - Google (2:40)
62. Security Goals - Google (7:34)
63. Measuring and Assessing Risk - Google (5:22)
64. Privacy Policy - Google (3:52)
Supplemental reading for risk in the workplace
65. User Habits - Google (6:01)
66. Third-Party Security - Google (4:09)
67. Security Training - Google (3:33)
68. Alex Grit Story - Google (1:51)
69. Incident Reporting and Analysis - Google (6:48)
70. Incident Response and Recovery - Google (6:06)
71. Interview Role Play- Security - Google (4:11)
72. Amir Interview - Google (1:18)
73. Ari Interview - Google (1:47)
Congratulations! - Google (0:51)
66. Windows- Swap - Google
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock