| Software: | |||
| What is an Operating System | 00:48:00 | ||
| Configuring the Operating System | 00:06:00 | ||
| What is an Application | 00:10:00 | ||
| Using Control Panel | 00:18:00 | ||
| Software and Concepts | 00:11:00 | ||
| Licensing | 00:06:00 | ||
| Using Software | 00:07:00 | ||
| Software Tools | 00:10:00 | ||
| Software | 00:14:00 | ||
| Hardware, Devices, and Peripherals | 00:05:00 | ||
| Hardware: | |||
| Hardware and Peripherals | 00:07:00 | ||
| Storage | 00:12:00 | ||
| Connectivity Devices | 00:05:00 | ||
| Network Components | 00:09:00 | ||
| Identify the Importance of Risk Management | 00:11:00 | ||
| Assess Risk | 00:13:00 | ||
| Mitigate Risk | 00:24:00 | ||
| Integrate Documentation into Risk Management | 00:15:00 | ||
| Classify Threats and Threat Profiles | 00:08:00 | ||
| Perform Ongoing Threat Research | 00:13:00 | ||
| Resources that Aid in Research of Threats | 00:03:00 | ||
| Implement Threat Modeling | 00:10:00 | ||
| Assess the Impact of Reconnaissance Incidents | 00:11:00 | ||
| Performing Reconnaissance on a Network | 00:07:00 | ||
| Examining Reconnaissance Incidents | 00:08:00 | ||
| Assess the Impact of Social Engineering | 00:11:00 | ||
| Assessing the impact of Social Engineering | 00:07:00 | ||
| Assessing the Impact of Phishing | 00:03:00 | ||
| Types of Wireless Attacks | 00:30:00 | ||
| Intrusion Monitoring | 00:08:00 | ||
| Wireless Security Risks | 00:22:00 | ||
| Authentication Attacks | 00:21:00 | ||
| Rogue Devices | 00:04:00 | ||
| Public Hotspots | 00:07:00 | ||
| Wireless Security Monitoring | 00:21:00 | ||
| Device Tracking | 00:18:00 | ||
| WLAN Security Infrastructure | 00:38:00 | ||
| Management Protocols | 00:23:00 | ||
| Other RADIUS Solutions | 00:16:00 | ||
| Security: | |||
| Introduction | 00:30:00 | ||
| Child Safety Online | 01:00:00 | ||
| Secure Payment Sites | 01:00:00 | ||
| Online Banking | 00:30:00 | ||
| How To Keep Your Password Safe | 00:30:00 | ||
| Common Scams | 01:00:00 | ||
| How I Got Pharmed | 01:00:00 | ||
| Virus Protection | 01:00:00 | ||
| Self Maintenance | 00:30:00 | ||
| Personal Information Online | 01:00:00 | ||
| Is The Internet Safe? | 00:30:00 | ||
| Importance of Cyber Security | 00:30:00 | ||
| Spyware Can Destroy | 00:30:00 | ||
| How Does Spyware Spread? | 01:00:00 | ||
| How To Remove Spyware | 01:00:00 | ||
| Anti Spyware Program | 01:00:00 | ||
| The Anti Anti-Spyware Programs | 00:30:00 | ||
| Research And Learn More | 00:30:00 | ||
| Choosing The Best Anti Spyware Tool | 01:00:00 | ||
| Computer Security And Spyware | 01:00:00 | ||
| The Programs To Avoid | 00:15:00 | ||
| Is It Legal? | 00:30:00 | ||
| Checklist Of Protection | 00:15:00 | ||
| The Information Security Cycle | 00:37:00 | ||
| Information Security Controls | 00:36:00 | ||
| Authentication Methods | 00:09:00 | ||
| Cryptography Fundamentals | 00:56:00 | ||
| Security Policy Fundamentals | 00:11:00 | ||
| Social Engineering | 00:32:00 | ||
| Malware | 00:25:00 | ||
| Software-Based Threats | 00:22:00 | ||
| Based Threats | 00:39:00 | ||
| Wireless Threats and Vulnerabilities | 00:43:00 | ||
| Physical Threats and Vulnerabilities | 00:09:00 | ||
| Manage Data Security | 00:47:00 | ||
| Manage Application Security | 00:55:00 | ||
| Manage Device and Host Security | 01:08:00 | ||
| Manage Mobile Security | 00:10:00 | ||
| A Risk Analysis | 00:17:00 | ||
| Implement Vulnerability Assessment Tools and Techniques | 00:05:00 | ||
| Scan for Vulnerabilities | 00:27:00 | ||
| Mitigation and Deterrent Techniques | 00:19:00 | ||
| Respond to Security Incidents | 00:23:00 | ||
| Recover from a Security Incident | 00:10:00 | ||
| Networking: | |||
| OSI Layers | 00:44:00 | ||
| LANs and WANs | 00:14:00 | ||
| Network Types | 00:07:00 | ||
| Transmissions | 00:36:00 | ||
| Cables | 00:41:00 | ||
| Fiber Optics | 00:17:00 | ||
| Converters and Connectors | 00:27:00 | ||
| Wireless Security | 00:15:00 | ||
| Authentication.prproj | 00:21:00 | ||
| Wireless Security Threats | 00:30:00 | ||
| TACACS | 00:10:00 | ||
| Keys | 00:26:00 | ||
| RADIUS | 00:07:00 | ||
| VPN Technologies | 00:16:00 | ||
| Tunneling Protocols.prproj | 00:05:00 | ||
| Acceptable Use | 01:00:00 | ||
| Common Problems | 00:32:00 | ||
| Troubleshooting | 00:28:00 | ||
| Network Technician Tools | 00:46:00 | ||
| Physical and Logical Issues | 00:19:00 | ||
| Open or Closed Ports | 00:09:00 | ||
| ARP Issues | 00:13:00 | ||
| Basic IT Literacy: | |||
| Core Concepts in Healthcare IT | 00:06:00 | ||
| EMR EHR Issues | 00:05:00 | ||
| Regulations, Standards, and Stakeholders | 00:14:00 | ||
| HIPAA Controls and Compliance | 00:08:00 | ||
| Roles and Responsibilities | 00:10:00 | ||
| Manage Communication and Ethics Issues | 00:15:00 | ||
| Legal Best Practices, Requirements, and Documentation | 00:09:00 | ||
| Medical Document Imaging | 00:04:00 | ||
| Sanitation Management | 00:03:00 | ||
| Computing Essentials | 00:05:00 | ||
| Networking | 00:33:00 | ||
| Manage Servers and Software | 00:27:00 | ||
| Hardware Support | 00:14:00 | ||
| Set Up a Workstation | 00:08:00 | ||
| Troubleshoot Basic IT Issues | 00:15:00 | ||
| Troubleshoot Medical IT Issues | 00:20:00 | ||
| Implementation of an EMR EHR System | 00:34:00 | ||
| Change Control | 00:08:00 | ||
| Manage Physical and Logical Security | 00:36:00 | ||
| Implement Security Best Practices and Threat Mitigation Techniques | 00:13:00 | ||
| Manage Remote Access | 00:06:00 | ||
| Manage Wireless Security | 00:15:00 | ||
| Perform Backups and Disaster Recovery | 00:16:00 | ||
| Mock Exam | |||
| Mock Exam- IT Administration and Networking | 00:30:00 | ||
| Final Exam | |||
| Final Exam- IT Administration and Networking | 00:30:00 | ||