• No products in the basket.

  • LOGIN

Login

  • 67 Students

  • Certified

Boost your hardware, software and networking skills and enrich your resume.

What You'll Learn

Skills You Will Gain

Who is this course for

Whether you’re an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.

The IT Administration and Networking is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.

Career Path​

This course will enrich your IT knowledge and skills. You will earn the ability to pursue a flourishing career in the IT sector.

FREQUENTLY ASKED QUESTIONS

What exactly are CPD hours/points?

CPD is an abbreviation for Continuing Professional Development. Your employer may require you to complete a certain number of CPD hours or points per year if you work in certain professions or for certain companies. 

Do you provide CPD certification? How to obtain CPD certification? 

Yes, all of our courses offer CPD certification. After successfully completing the MCQ assessment of this course, you will qualify for the CPD Certificate from One Education, as proof of your continued professional development. With a 60% passing score you will be qualified for CPD accredited certificates. 

Do your certificates expire? 

No, our certificates do not come with any expiration date.

Do I need to pay for the certification? 

Yes, certification is available in PDF format, at the cost of £9, or a hard copy can be sent to you via post, at the cost of £15.

Do I need to pay for the exams? 

No, there are no extra fees and hidden costs for the exam.

What is the method of teaching? 

The course is fully online. You can study this course at your own pace. You will be taught through a combination of 

  • Video lessons
  • Online study materials

How can I further assess my learning and get full tutor support?  

Full tutor support is available only on weekdays ( Monday – Friday). You are advised to complete the assignment questions provided at the end of the course, our expert tutor will assess your assignment and will give you feedback on your performance.

How can I gift this course to my beloved one? 

In just 3 steps you can gift any course to your beloved ones. The steps are : 

  1. Select gift these course button 
  2. Enter your email, your recipient email and your desired message 
  3. Select send as gift button 
  4. Proceed to checkout and pay for the course 

And done! The course will be sent to your desired recipient. 

Can I purchase this course in bulk?

Yes, you can. To purchase courses in bulk, add the desired number of courses in the cart and then proceed to the payment option. We also have special discounts for Business Customers

How long can I access this course ? 

All of our courses can be accessed for 1 Year. After one year you have to buy this course again if you wish to continue. 

Course Curriculum

Software:
What is an Operating System 00:48:00
Configuring the Operating System 00:06:00
What is an Application 00:10:00
Using Control Panel 00:18:00
Software and Concepts 00:11:00
Licensing 00:06:00
Using Software 00:07:00
Software Tools 00:10:00
Software 00:14:00
Hardware, Devices, and Peripherals 00:06:00
Hardware:
Hardware and Peripherals 00:07:00
Storage 00:12:00
Connectivity Devices 00:05:00
Network Components 00:09:00
Identify the Importance of Risk Management 00:11:00
Assess Risk 00:13:00
Mitigate Risk 00:24:00
Integrate Documentation into Risk Management 00:15:00
Classify Threats and Threat Profiles 00:08:00
Perform Ongoing Threat Research 00:13:00
Resources that Aid in Research of Threats 00:03:00
Implement Threat Modeling 00:10:00
Assess the Impact of Reconnaissance Incidents 00:11:00
Performing Reconnaissance on a Network 00:07:00
Examining Reconnaissance Incidents 00:08:00
Assess the Impact of Social Engineering 00:11:00
Assessing the impact of Social Engineering 00:07:00
Assessing the Impact of Phishing 00:03:00
Types of Wireless Attacks 00:30:00
Intrusion Monitoring 00:08:00
Wireless Security Risks 00:22:00
Authentication Attacks 00:21:00
Rogue Devices 00:04:00
Public Hotspots 00:07:00
Wireless Security Monitoring 00:21:00
Device Tracking 00:18:00
WLAN Security Infrastructure 00:38:00
Management Protocols 00:23:00
Other RADIUS Solutions 00:16:00
Security:
Introduction 00:30:00
Child Safety Online 01:00:00
Secure Payment Sites 01:00:00
Online Banking 00:30:00
How To Keep Your Password Safe 00:30:00
Common Scams 01:00:00
How I Got Pharmed 01:00:00
Virus Protection 01:00:00
Self Maintenance 00:30:00
Personal Information Online 01:00:00
Is The Internet Safe? 00:30:00
Importance of Cyber Security 00:30:00
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
The Information Security Cycle 00:37:00
Information Security Controls 00:36:00
Authentication Methods 00:09:00
Cryptography Fundamentals 00:56:00
Security Policy Fundamentals 00:11:00
Social Engineering 00:32:00
Malware 00:25:00
Software-Based Threats 00:22:00
Based Threats 00:39:00
Wireless Threats and Vulnerabilities 00:43:00
Physical Threats and Vulnerabilities 00:09:00
Manage Data Security 00:47:00
Manage Application Security 00:55:00
Manage Device and Host Security 01:08:00
Manage Mobile Security 00:10:00
A Risk Analysis 00:17:00
Implement Vulnerability Assessment Tools and Techniques 00:05:00
Scan for Vulnerabilities 00:27:00
Mitigation and Deterrent Techniques 00:19:00
Respond to Security Incidents 00:23:00
Recover from a Security Incident 00:10:00
Networking:
OSI Layers 00:44:00
LANs and WANs 00:14:00
Network Types 00:07:00
Transmissions 00:36:00
Cables 00:41:00
Fiber Optics 00:17:00
Converters and Connectors 00:27:00
Wireless Security 00:15:00
Authentication.prproj 00:21:00
Wireless Security Threats 00:30:00
TACACS 00:10:00
Keys 00:26:00
RADIUS 00:07:00
VPN Technologies 00:16:00
Tunneling Protocols.prproj 00:05:00
Acceptable Use 01:00:00
Common Problems 00:32:00
Troubleshooting 00:28:00
Network Technician Tools 00:46:00
Physical and Logical Issues 00:19:00
Open or Closed Ports 00:09:00
ARP Issues 00:13:00
Basic IT Literacy:
Core Concepts in Healthcare IT 00:06:00
EMR EHR Issues 00:05:00
Regulations, Standards, and Stakeholders 00:14:00
HIPAA Controls and Compliance 00:08:00
Roles and Responsibilities 00:10:00
Manage Communication and Ethics Issues 00:15:00
Legal Best Practices, Requirements, and Documentation 00:09:00
Medical Document Imaging 00:04:00
Sanitation Management 00:03:00
Computing Essentials 00:05:00
Networking 00:33:00
Manage Servers and Software 00:27:00
Hardware Support 00:14:00
Set Up a Workstation 00:08:00
Troubleshoot Basic IT Issues 00:15:00
Troubleshoot Medical IT Issues 00:20:00
Implementation of an EMR EHR System 00:34:00
Change Control 00:08:00
Manage Physical and Logical Security 00:36:00
Implement Security Best Practices and Threat Mitigation Techniques 00:13:00
Manage Remote Access 00:06:00
Manage Wireless Security 00:15:00
Perform Backups and Disaster Recovery 00:16:00
Mock Exam
Mock Exam- IT Administration and Networking 00:30:00
Final Exam
Final Exam- IT Administration and Networking 00:30:00

Training 10 or more people?

Get your team access to 3,000+ top courses anytime, anywhere.

Try One Education Business

 width=

 

Course Reviews

  1. Anthony Warner

    Enjoyable and easily understandable lessons. I loved every bit of the course. I’ll recommend anyone to learn IT Administration and security from the course.

    4
  2. Francesca Perry

    Amazing course outline. It helped me to resurface the forgotten lessons of software management. Highly recommended.

    4
  3. Michael Horton

    This course helped me to understand networking and software security easily. I love how simple and easily understandable it is.

    4
  4. Kai Hammond

    The lessons on IT security were very elaborate and detailed. It helped me build a good foundation of the security system. I am glad that I took this course.

    5
  5. 1 2 3

Certifications

Get accredited certificates

New skills

Add skills to your CV

Exams

Test your skills

Dedicated Support

For any questions

Set your own speed

Self-paced learning

Save your money

Monthly subscription

COPYRIGHT © 2022 One Education

0
Your Cart
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]