Course Curriculum
- 5 sections
- 128 lectures
- 00:00:00 total length
-
What is an Operating System
00:48:00 -
Configuring the Operating System
00:06:00 -
What is an Application
00:10:00 -
Using Control Panel
00:18:00 -
Software and Concepts
00:11:00 -
Licensing
00:06:00 -
Using Software
00:07:00 -
Software Tools
00:10:00 -
Software
00:14:00 -
Hardware, Devices, and Peripherals
00:05:00
-
Hardware and Peripherals
00:07:00 -
Storage
00:12:00 -
Connectivity Devices
00:05:00 -
Network Components
00:09:00 -
Identify the Importance of Risk Management
00:11:00 -
Assess Risk
00:13:00 -
Mitigate Risk
00:24:00 -
Integrate Documentation into Risk Management
00:15:00 -
Classify Threats and Threat Profiles
00:08:00 -
Perform Ongoing Threat Research
00:13:00 -
Resources that Aid in Research of Threats
00:03:00 -
Implement Threat Modeling
00:10:00 -
Assess the Impact of Reconnaissance Incidents
00:11:00 -
Performing Reconnaissance on a Network
00:07:00 -
Examining Reconnaissance Incidents
00:08:00 -
Assess the Impact of Social Engineering
00:11:00 -
Assessing the impact of Social Engineering
00:08:00 -
Assessing the Impact of Phishing
00:03:00 -
Types of Wireless Attacks
00:30:00 -
Intrusion Monitoring
00:08:00 -
Wireless Security Risks
00:22:00 -
Authentication Attacks
00:21:00 -
Rogue Devices
00:04:00 -
Public Hotspots
00:07:00 -
Wireless Security Monitoring
00:21:00 -
Device Tracking
00:18:00 -
WLAN Security Infrastructure
00:38:00 -
Management Protocols
00:23:00 -
Other RADIUS Solutions
00:16:00
-
Introduction
00:30:00 -
Child Safety Online
01:00:00 -
Secure Payment Sites
01:00:00 -
Online Banking
00:30:00 -
How To Keep Your Password Safe
00:30:00 -
Common Scams
01:00:00 -
How I Got Pharmed
01:00:00 -
Virus Protection
01:00:00 -
Self Maintenance
00:30:00 -
Personal Information Online
01:00:00 -
Is The Internet Safe?
00:30:00 -
Importance of Cyber Security
00:30:00 -
Spyware Can Destroy
00:30:00 -
How Does Spyware Spread?
01:00:00 -
How To Remove Spyware
01:00:00 -
Anti Spyware Program
01:00:00 -
The Anti Anti-Spyware Programs
00:30:00 -
Research And Learn More
00:30:00 -
Choosing The Best Anti Spyware Tool
01:00:00 -
Computer Security And Spyware
01:00:00 -
The Programs To Avoid
00:15:00 -
Is It Legal?
00:30:00 -
Checklist Of Protection
00:15:00 -
The Information Security Cycle
00:37:00 -
Information Security Controls
00:36:00 -
Authentication Methods
00:09:00 -
Cryptography Fundamentals
00:56:00 -
Security Policy Fundamentals
00:11:00 -
Social Engineering
00:32:00 -
Malware
00:25:00 -
Software-Based Threats
00:22:00 -
Based Threats
00:39:00 -
Wireless Threats and Vulnerabilities
00:43:00 -
Physical Threats and Vulnerabilities
00:09:00 -
Manage Data Security
00:47:00 -
Manage Application Security
00:55:00 -
Manage Device and Host Security
01:08:00 -
Manage Mobile Security
00:10:00 -
A Risk Analysis
00:17:00 -
Implement Vulnerability Assessment Tools and Techniques
00:05:00 -
Scan for Vulnerabilities
00:27:00 -
Mitigation and Deterrent Techniques
00:19:00 -
Respond to Security Incidents
00:00:00 -
Recover from a Security Incident
00:10:00
-
OSI Layers
00:44:00 -
LANs and WANs
00:14:00 -
Network Types
00:07:00 -
Transmissions
00:36:00 -
Cables
00:41:00 -
Fiber Optics
00:17:00 -
Converters and Connectors
00:27:00 -
Wireless Security
00:15:00 -
Authentication.prproj
00:21:00 -
Wireless Security Threats
00:30:00 -
TACACS
00:10:00 -
Keys
00:26:00 -
RADIUS
00:07:00 -
VPN Technologies
00:16:00 -
Tunneling Protocols.prproj
00:05:00 -
Acceptable Use
01:00:00 -
Common Problems
00:32:00 -
Troubleshooting
00:28:00 -
Network Technician Tools
00:46:00 -
Physical and Logical Issues
00:19:00 -
Open or Closed Ports
00:09:00 -
ARP Issues
00:13:00
-
Core Concepts in Healthcare IT
00:06:00 -
EMR EHR Issues
00:05:00 -
Regulations, Standards, and Stakeholders
00:14:00 -
HIPAA Controls and Compliance
00:08:00 -
Roles and Responsibilities
00:10:00 -
Manage Communication and Ethics Issues
00:15:00 -
Legal Best Practices, Requirements, and Documentation
00:09:00 -
Medical Document Imaging
00:04:00 -
Sanitation Management
00:03:00 -
Computing Essentials
00:05:00 -
Networking
00:33:00 -
Manage Servers and Software
00:27:00 -
Hardware Support
00:14:00 -
Set Up a Workstation
00:08:00 -
Troubleshoot Basic IT Issues
00:15:00 -
Troubleshoot Medical IT Issues
00:20:00 -
Implementation of an EMR EHR System
00:34:00 -
Change Control
00:08:00 -
Manage Physical and Logical Security
00:36:00 -
Implement Security Best Practices and Threat Mitigation Techniques
00:13:00 -
Manage Remote Access
00:06:00 -
Manage Wireless Security
00:15:00 -
Perform Backups and Disaster Recovery
00:16:00