New To IT Tech Training Series - 9 Courses - ITU Online

New To IT Tech Training Series – 9 Courses

New to information technology? Want to get into IT? This bundle is a great starter training bundle designed just for that.

Included In This Course

Quickbooks Online Training
142 Hrs 13 Min
Videos
867 On-demand Videos
Closed Captions

Closed Captions

Course Topics
97  Topics
Question & Answers
1,285 Prep Questions
Certificate of Completion

Certificate of Completion

Course Description

Embark on Your IT Journey: Mastering the Essentials

Begin your IT career with our “IT Tech Training Series.” Tailored for newcomers and those seeking to enhance their IT knowledge, this bundle includes nine essential courses. From the foundational CompTIA A+ and IT Fundamentals to advanced skills in Network+ and Microsoft courses, like Windows Server 2016 Administration, this series is your comprehensive guide to the IT world. Dive deep into the core concepts and emerge with a robust understanding, ready to tackle the challenges of the IT industry.

Course Benefits

Unleash Your Potential: Comprehensive Learning & Certification

Discover an immersive learning adventure with over 140 hours of expert-led instruction in the “IT Tech Training Series.” Spanning 98 topics, this series is equipped with an extensive video library of 858 tutorials and 1,285 preparatory questions, ensuring a thorough understanding of each subject. Completing this series isn’t just about knowledge gain; it culminates in a prestigious certificate of completion, showcasing your dedication and expertise in IT, an invaluable addition to your professional portfolio.

Who Is The Course For

Ideal for Aspiring IT Professionals: From Novices to Career Advancers

Whether you’re taking your first steps in IT or aiming to broaden your existing skill set, this series is designed with you in mind. It’s particularly beneficial for those aspiring to become help desk analysts and IT generalists. The series lays a solid foundation in IT and builds up to more complex concepts, preparing you for a successful career in the ever-evolving IT landscape.

This bundle includes the following courses:

Frequently Asked Questions About New To IT Tech Training Series

What does the “New To IT Tech Training Series” online course include?

This IT Training course bundle includes nine different courses aimed at those new to the IT field or looking to enhance their IT knowledge. Courses include CompTIA A+, IT Fundamentals, Network+, and several Microsoft courses including Windows Server 2016 Administration, Networking Fundamentals, and Security Fundamentals.

What type of content can I expect in the online course bundle?

The bundle comes loaded with on-demand videos and prep questions. It covers 98 topics with 858 videos and 1,285 prep questions for comprehensive learning. You can access the course content at your convenience.

How long does it take to complete the “New To IT Tech Training Series”?

The course bundle provides around 140 hours of training. The duration to complete the course may vary based on your learning pace.

What do I get after completing the “New To IT Tech Training Series”?

Upon completion, you’ll receive a certificate of completion which can be a valuable addition to your professional profile.

Is the “New To IT Tech Training Series” suitable for me?

If you’re new to information technology or looking to expand your existing IT knowledge, this course is designed for you. It’s particularly beneficial for help desk analysts and IT generalists.

Can I try the “New To IT Tech Training Series” before purchasing?

Yes, you can start a 7-day free trial, giving you access to over 2,500 hours of on-demand IT training.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

CompTIA A+ 220-1101 (Core 1) Course Content

Module 1 - Devices, Setups, and Installs

  •    1.1 Introduction to the Course, Meet the Instructor
  •    1.2 Appropriate Safety Procedures
  •    1.3 PC Components
  •    1.4 Guidlines for PC Disassembly
  •    1.5 Motherboards
  •    1.6 CPU Sockets
  •    1.7 PCI Bus
  •    1.8 Storage Bus (SATA and IDE)
  •    1.9 Discussing PC Components
  •    1.10 Common Connection Interfaces
  •    1.11 Wired and Wireless Connection Standards
  •    1.12 Install Peripheral Devices
  •    1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices

  •    2.1 Displays and Multimedia
  •    2.2 Display Device Connections and Cables
  •    2.3 Discussing Display Device Installation and Configuration
  •    2.4 Troubleshoot Display Devices
  •    2.5 Guidelines for Troubleshooting Display Devices
  •    2.6 Discussing Display Device Troubleshooting
  •    2.7 Install and Configure Multimedia Devices
  •    2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types

  •    3.1 Supporting Multiple Drive Types and Memory
  •    3.2 Memory Types
  •    3.3 RAM Types
  •    3.4 Memory Modules
  •    3.5 DIMM and SO-DIMM Technologies
  •    3.6 Parity and ECC RAM
  •    3.7 Memory Compatibility Issues
  •    3.8 Discussing System Memory Installation
  •    3.9 Install and Configure Mass Storage Devices
  •    3.10 Storage Adapters and Cables
  •    3.11 Solid State Drives
  •    3.12 Guidlines for Installing Mass Storage Devices
  •    3.13 Discussing Mass Storage Device Installation and Configuration
  •    3.14 Install and Configure Removable Storage
  •    3.15 Discussing Removable Storage Device Istallation and Configuration
  •    3.16 Configure RAID
  •    3.17 RAID Configuration Options
  •    3.18 Discussing RAID Configuration
  •    3.19 Troubleshoot Storage Devices
  •    3.20 Boot Failures
  •    3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components

  •    4.1 Install Upgrade CPUs
  •    4.2 Multiprocessing and Multicore Processors
  •    4.3 Discussing CPU Upgrades
  •    4.4 Configure and Update BIOS UEFI
  •    4.5 Discussing BOIS-UEFI Configuration and Updates
  •    4.6 Install Power Supplies
  •    4.7 Discussing Power Supply Installation
  •    4.8 Troubleshoot Internal System Components
  •    4.9 POST and Boot Problems
  •    4.10 Boot Troubleshooting and Log Entries
  •    4.11 Motherboard Component Problems
  •    4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories

  •    5.1 Wired Networks
  •    5.2 Common Ethernet Network Implementations
  •    5.3 Taps and Mirrors
  •    5.4 Discussing Wired Networks
  •    5.5 Network Hardware Devices
  •    5.6 Switches
  •    5.7 Power Over Ethernet
  •    5.8 Discussing Network Hardware Devices
  •    5.9 Wireless Networks
  •    5.10 Access Points and Wireless Network Modes
  •    5.11 Discussing Wireless Networks
  •    5.12 Internet Connection Types
  •    5.13 Wireless Internet Service Providers WISP
  •    5.14 Discussing Internet Connection Types
  •    5.15 Network Configuration Concepts
  •    5.16 The TCIP-IP Protocol Suite
  •    5.17 Internet Protocol and IP Addressing
  •    5.18 Public and Private IP Addresses
  •    5.19 IPv6
  •    5.20 Discussing Network Configuration Concepts
  •    5.21 Network Services
  •    5.22 DNS
  •    5.23 Dynamic and Static IP Configurations
  •    5.24 DNS Records MX and A
  •    5.25 Web Servers and HTTP-HTTPS
  •    5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics

  •    6.1 Configuring and Troubleshooting Networks
  •    6.2 Network Connections in Windows
  •    6.3 Install and Configure SOHO Networks
  •    6.4 Configure SOHO Network Security
  •    6.5 Firewalls
  •    6.6 Port Fowarding and Port Triggering
  •    6.7 Windows Firewall
  •    6.8 Network Security and Embedded Appliances
  •    6.9 Configure Remote Access
  •    6.10 Discussing Remote Access Configuration
  •    6.11 Troubleshoot Network Connections
  •    6.12 IP Configuration Issues
  •    6.13 Routing Issues
  •    6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing

  •    7.1 Configure Client-Side Virtulaization
  •    7.2 Hypervisors
  •    7.3 Processor Support and Resource Requirements
  •    7.4 Virtual Networks
  •    7.5 Client-Side Virtualization
  •    7.6 Cloud Computing Concepts
  •    7.7 Internal and External Shared Resources
  •    7.8 Cloud Service Options
  •    7.9 Virtual Desktops
  •    7.10 Software-Defined Networking (SDN)
  •    7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting

  •    8.1 Use Laptop Features
  •    8.2 Expansion Options
  •    8.3 Discussing Laptop Features
  •    8.4 Install and Configure Laptop Hardware
  •    8.5 Discussing Laptop Hardware Installation and Configuration
  •    8.6 Troubleshoot Common Laptop Issues
  •    8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices

  •    9.1 Syncing and Setup of Mobile Devices
  •    9.2 Connect and Configure Mobile Devices
  •    9.3 Configure Mobile Device Network Connectivity
  •    9.4 Mobile VPN Configuration
  •    9.5 Email Configuration Options
  •    9.6 Discussing Mobile Device Network Connectivity Configuration
  •    9.7 Support Mobile Apps
  •    9.8 Discussing Mobile App Support

Module 10 - All Things Printing

  •    10.1 All Things Printing
  •    10.2 Discussing Laser Printer Maintenance
  •    10.3 Maintain Inkjet Printers
  •    10.4 Discussing Inkjet Printer Maintenance
  •    10.5 Maintain Impact, Thermal, and 3D Printers
  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
  •    10.7 Install and Configure Printers
  •    10.8 Discussing Printer Installation and Configuration
  •    10.9 Troubleshoot Print Device Issues
  •    10.10 Install and Configure Imaging Devices
  •    10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing
  •    11.2 Resources and Testing
  •    11.3 Joining a Domain with Windows 10
  •    11.4 Boot Order and BIOS
  •    11.5 Virtual Machine Install & Configure
  •    11.6 PC Teardown
  •    11.7 Exploring the Laptop
  •    11.8 Install Windows 10 Demonstration

CompTIA A+ 220-1102 (Core 2) Course Content

Module 1 - Operating System Management

  •    1.1 Introduction to the Course, Meet the Instructor
  •    1.2 Identify Common Operating Systems
  •    1.3 Microsoft Windows
  •    1.4 Work and Education Features
  •    1.5 Windows System Limits
  •    1.6 Apple Operating Systems
  •    1.7 Linux Disk and File Management
  •    1.8 Discussing OS Types
  •    1.9 Use Windows Features and Tools
  •    1.10 Administrative Tools
  •    1.11 Manage Files in Windows
  •    1.12 System Hierarchies
  •    1.13 File Attributes
  •    1.14 Discussing Windows Features and Tools
  •    1.15 Manage Disks in Windows
  •    1.16 Discussing File Management in Windows
  •    1.17 The Windows Disk Management Console
  •    1.18 Discussing Windows Disk Management
  •    1.19 Manage Devices in Windows
  •    1.20 Device Manager
  •    1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS

  •    2.1 Configuring and Installing the OS
  •    2.2 Installation Boot Methods
  •    2.3 Disk Formatting and Partitioning
  •    2.4 Networking Considerations
  •    2.5 Post Installation Tasks
  •    2.6 OS Installation Types
  •    2.7 Unattended Installations
  •    2.8 Maintain OSs
  •    2.9 OS Updates
  •    2.10 Anti-Malware Updates
  •    2.11 Scheduled Backups
  •    2.12 Task Schedulers part 1
  •    2.13 Task Schedulers part 2
  •    2.14 Install Windows 10 Demonstration
  •    2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS

  •    3.1 Install and Manage Windows Applications
  •    3.2 Windows OS Tools
  •    3.3 Application and Print Services
  •    3.4 Task Manager
  •    3.5 Manage Windows Performance
  •    3.6 Windows Performance Management Tools
  •    3.7 Troubleshoot Windows
  •    3.8 Event Viewer
  •    3.9 The System Configuration Utility
  •    3.10 Troubleshooting Tips Boot Process
  •    3.11 Troubleshooting Tips for Windows System Issues
  •    3.12 Blue Screens and Spontaneous Shutdowns
  •    3.13 Troubleshooting Tips for File and Memory Corruption
  •    3.14 Safe Boot
  •    3.15 System Repair Disc
  •    3.16 System Restore
  •    3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools

  •    4.1 Network Management Tools
  •    4.2 Network Connectivity
  •    4.3 IP Addressing and Connection Types
  •    4.4 Proxy Settings
  •    4.5 Windows Client Configuration
  •    4.6 Location Services
  •    4.7 Firewalls
  •    4.8 Network Troubleshooting
  •    4.9 Remote Desktop Tools
  •    4.10 Desktop Management and Remote Monitoring Tools
  •    4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management

  •    5.1 Sharing Resources and Wrights Management
  •    5.2 User Group Accounts
  •    5.3 Local Secutity Policy
  •    5.4 SSO and Credential Manager
  •    5.5 Workgroups and Homegroups
  •    5.6 Network and Sharing Center
  •    5.7 Network Share Configuration
  •    5.8 NTSF File and Folder Permissions
  •    5.9 Configure Active Directory Accounts and Policies
  •    5.10 Domain Membership and Group Policy Objects
  •    5.11 Basic AD Functions
  •    5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures

  •    6.1 Threats and Security Measures
  •    6.2 Logical Security Concepts
  •    6.3 Encryption
  •    6.4 PKI and Certificates
  •    6.5 Execution Control
  •    6.6 NAC
  •    6.7 Discussing Logical Decurity Concepts
  •    6.8 Threats and Vulnerablilities
  •    6.9 Types of Password Attacks
  •    6.10 Discussing Threats and Vulnerabilities
  •    6.11 Physical Security Controls
  •    6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data

  •    7.1 Policies to Protect Data
  •    7.2 Implement Security Best Practices
  •    7.3 Guidlines for Implementing Security Best Practices
  •    7.4 Discussing Security Best Practices Implementation
  •    7.5 Implement Data Protection Policies
  •    7.6 ACLs and Directory Permissions
  •    7.7 Full Disk Encryption
  •    7.8 Guildlines for Implementing Data Protection Policies
  •    7.9 Discussing Data Protection Policies
  •    7.10 Protect Data During Incident Response
  •    7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats

  •    8.1 Prevent Malware and Security Threats
  •    8.2 Detect, Remove, and Prevent Malware
  •    8.3 Trojan Horses and Spyware
  •    8.4 Sources of Malware Infection
  •    8.5 Best Practices for Malware Removal
  •    8.6 Discussing Detecting, Removing, and Preventing Malware Infections
  •    8.7 Troubleshoot Common Workstation Security Issues
  •    8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices

  •    9.1 Supporting and Troubleshooting Mobile Devices
  •    9.2 Secure Mobile Devices
  •    9.3 IOT Internet of Things
  •    9.4 Discussing Mobile Device Security
  •    9.5 Troubleshoot Mobile Device Issues
  •    9.6 Mobile Device Security Troubleshooting
  •    9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures

  •    10.1 Implementing Operational Procedures
  •    10.2 Environmental Impacts and Controls
  •    10.3 Discussing Environmental Impact and Controls
  •    10.4 Create and Maintain Documentation
  •    10.5 Discussing Documentation Creation and Maintenance
  •    10.6 Use Basic Change Management Best Practices
  •    10.7 Discussing Change Management Best Practices
  •    10.8 Implement Disaster Prevention and Recovery Methods
  •    10.9 Discussing Implement Disaster Prevention and Recovery Methods
  •    10.10 Basic Scripting Concepts
  •    10.11 Discussing Scripting
  •    10.12 Professionalism and Communication
  •    10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing
  •    11.2 Resources and Testing
  •    11.3 Joining a Domain with Windows 10
  •    11.4 Boot Order and BIOS
  •    11.5 Virtual Machine Install & Configure
  •    11.6 PC Teardown
  •    11.7 Exploring the Laptop
  •    11.8 Install Windows 10 Demonstration

CompTIA Network+ N10-008 Course Content

Module 0 - Course introduction

  •    0.1 Instructor Intro
  •    0.2 Course Overview

Module 1 - Networking Fundamentals

  •    1.1 Intro to Networking
  •    1.1.1 Activity: Creating a Network
  •    1.2 Common Terminology
  •    1.2.1 Activity: Examining Ports and Sockets
  •    1.3 OSI Model
  •    1.4 DoD Model
  •    1.4.1 Activity: Examining Network Layers
  •    1.5 TCP, UDP, IP
  •    1.5.1 Activity: Examining TCP
  •    1.5.2 Activity: Examining UDP
  •    1.5.3 Activity: Examining IP
  •    1.6 ICMP, IGMP, ARP
  •    1.6.1 Activity: Examining ICMP
  •    1.6.2 Activity: Examining ARP
  •    1.6.3 Activity: Examining IGMP
  •    1.7 Network Topologies
  •    1.8 Network Types
  •    1.9 Part 1: Network Characteristics
  •    1.9 Part 2: Network Characteristics
  •    1.10 Module 1 outro

Module 2 - Cables and Connectors

  •    2.1 Ethernet Standards
  •    2.2 Copper Cable Types
  •    2.3 Fiber Optic Cable Types
  •    2.4 Connector Types
  •    2.4.1 Activity: Selecting the Right Cable
  •    2.5 Media Converters and Transceivers
  •    2.6 Cable Management
  •    2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)

  •    3.1 IPv4 Basics
  •    3.2 IP Packet and Interface Types
  •    3.2.1 Activity: Configuring Client IP Settings
  •    3.3 Binary Numbering System
  •    3.4 Classful and Classless Addressing
  •    3.5 Understanding CIDR Notation
  •    3.6 IPv4 Subnetting Method
  •    3.7 Verifying with Binary
  •    3.8 Finding Subnet IDs
  •    3.8.1 Activity: Subnetting a Class C Network
  •    3.9 The Delta in Action
  •    3.9.1 Activity: Subnetting With the Delta
  •    3.10 Subnetting Based on Hosts
  •    3.11 Subnetting in Other Octets
  •    3.12 Supernetting
  •    3.12.1 Activity: Supernetting
  •    3.13 IPv6
  •    3.14 IPv4 - IPv6 Transition Mechanisms
  •    3.15 Module 3 Outro

Module 4 - Layer 7 Protocols

  •    4.1 Remote Control Protocols
  •    4.2 File Sharing Protocols
  •    4.3 Web Protcols
  •    4.4 Email Protocols
  •    4.5 Database Protocols
  •    4.6 Voice Protocols
  •    4.7 Security Protocols
  •    4.8 Management Protocols
  •    4.9 Module 4 Outro

Module 5 - Network Services

  •    5.1 DHCP
  •    5.1.1 Activity: Configuring DHCP
  •    5.1.2 Activity: Configuring a DHCP Relay Agent
  •    5.2 DNS
  •    5.2.1 Activity: Configuring DNS - Part 1
  •    5.2.2 Activity: Configuring DNS - Part 2
  •    5.3 NTP
  •    5.4 Corporate and Datacenter Network Architecture
  •    5.5 Cloud Concepts and Connectivity Options
  •    5.6 Module 5 Outro

Module 6 - Networking Devices

  •    6.1 Introductory Concepts
  •    6.2 Repeaters and Hubs
  •    6.2.1 Activity: Connecting Devices with a Hub
  •    6.3 Bridges and Switches
  •    6.3.1 Activity: Connecting Devices with a Switch
  •    6.4 Routers and Multilayer Switches
  •    6.5 Security Devices
  •    6.6 Modems
  •    6.7 Module 6 Outro

Module 7 - Networked Devices

  •    7.1 IP Devices
  •    7.2 IoT
  •    7.2.1 Activity - Programming IoT Devices
  •    7.3 ICS/SCADA
  •    7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management

  •    8.1 Routing Basics
  •    8.1.1 Activity: Configuring Static Routes
  •    8.2 Packet Delivery on the Same Network
  •    8.3 IP Routing Across a Single Router
  •    8.4 IP Routing Across Multiple Hops
  •    8.4.1 Activity: Static Routes - CHALLENGE
  •    8.5 Route Selection
  •    8.6 RIP
  •    8.6.1 Activity: Configuring RIP - CHALLENGE
  •    8.7 OSPF
  •    8.8 EIGRP
  •    8.9 BGP
  •    8.10 NAT/PAT
  •    8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching

  •    9.1 Ethernet Basics
  •    9.2 Switching Overview
  •    9.2.1 Activity: Examining a MAC Table
  •    9.3 VLANs
  •    9.3.1 Activity: Creating VLANs
  •    9.4 VLAN Trunking
  •    9.4.1 Activity: Configuring VLAN Trunking
  •    9.5 VLAN Routing
  •    9.5.1 Activity: Configuring VLAN Routing
  •    9.6 Contention Management
  •    9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies

  •    10.1 Wireless Overview
  •    10.2 Radio Basics
  •    10.3 Modulation
  •    10.4 Wi-Fi Standards
  •    10.5 Antennas
  •    10.6 Wi-Fi Service Sets
  •    10.7 Wi-Fi Security
  •    10.8 Cellular

Module 11 Network Performance

  •    11.1 Monitoring Performance
  •    11.2 Common Metrics
  •    11.2.1 Activity: Examining Interface Statistics
  •    11.3 SNMP
  •    11.4 Netflow
  •    11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery

  •    12.1 HA and DR Concepts
  •    12.2 High Availability Mechanisms
  •    12.3 Disaster Recovery Mechanisms
  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents

  •    13.1 Plans and Procedures
  •    13.2 Security Policies
  •    13.3 Loss Prevention
  •    13.4 Common Agreements
  •    13.5 Common Documentation
  •    13.6 Structured Cabling - MDF and IDF
  •    13.7 Horizontal and Vertical Cabling
  •    13.7.1 Activity - Implementing Cable Management
  •    13.8 Labeling
  •    13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security

  •    14.1 Common Security Concepts
  •    14.2 Common Attack Types
  •    14.3 Spoofing-based Attacks
  •    14.4 Hijacking and MITM
  •    14.5 Social Engineering
  •    14.6 Network Segmentation
  •    14.7 Private VLANs
  •    14.8 Single Organization Authentication
  •    14.9 Extending Authentication
  •    14.10 Authorization
  •    14.11 Network Device Hardening
  •    14.12 Wireless Security
  •    14.13 Remote Access Security
  •    14.14 IoT Security
  •    14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting

  •    15.1 Troubleshooting Methodology
  •    15.2 Physical Connectivity Issues
  •    15.3 Hardware Testing Tools
  •    15.3.1 Activity - Testing an Ethernet Cable
  •    15.3.2 Activity - Crimping on an RJ-45 Connector
  •    15.3.3 Activity - Punching Down Twisted Pair
  •    15.3.4 Activity - Using a Telephone Toner
  •    15.4 Understanding Electricity
  •    15.4.1 Activity - Checking Cable Continuity
  •    15.4.2 Activity - Testing DC Voltage
  •    15.4.3 Activity - Testing AC Voltage
  •    15.5 Twisted Pair Pinout Problems
  •    15.6 Twisted Pair Termination Problems
  •    15.7 Repairing Damaged Twisted Pair Cable
  •    15.8 Fiber Optic Connectivity Issues
  •    15.8.1 Activity - Testing a Fiber Optic Cable
  •    15.9 Common Port Problems
  •    15.9.1 Working with Ports and Their Devices
  •    15.10 Common Software Testing Tools
  •    15.10.1 Activity - Scanning for Open Ports
  •    15.11 Common Command Line Utilities
  •    15.12 Troubleshooting Basic IP Networking Issues
  •    15.13 Common Switching Issues
  •    15.14 Switching Test Tools and Techniques
  •    15.15 Common IP Routing Issues
  •    15.16 Wi-Fi Access Point Issues
  •    15.17 Wirelss Interference
  •    15.17.1 Activity - Using a Spectrum Analyzer
  •    15.18 Wireless Antenna Issues
  •    15.18.1 Activity - Configuring a Wi-Fi Router
  •    15.19 WAP Placement Strategies
  •    15.20 Infrastructure Service Issues (DHCP)
  •    15.21 Infrastructure Service Issues (DNS)
  •    15.22 Infrastructure Service Issues (NTP)
  •    15.23 Fireall / ACL Issues
  •    15.24 VPN Issues
  •    15.25 Additional Network Security Troubleshooting and Tips
  •    15.26 Advanced Networking Issues
  •    15.27 Troubleshooting Server Services (with Module 15 Outro)
  •    CompTIA Network+ N10-008 Course Outro

CompTIA FC0-U61: IT Fundamentals Course Content

Module 1 - IT Concepts and Terminology

  •    Module 1 Notes
  •    0.1 Instructor Intro
  •    1.1 Compare and Contrast Notational Systems
  •    1.1 Compare and Contrast Notational Systems Demo
  •    1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
  •    1.3 Illustrate the Basics of Computing and Processing
  •    1.4 Explain the Value of Data and Information
  •    1.5 Compare and Contrast Common Units of Measures
  •    1.5 Compare and Contrast Common Units of Measures Demo
  •    1.6 Explain the Troubleshooting Methodology

Module 2 - Infrastructure

  •    Module 2 Notes
  •    2.1 Classify Common Types of Input-Output Device Interfaces
  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  •    2.3 Explain the Purpose of Common Internal Computing Components
  •    2.4 Compare & Contrast Common Internet Service Types-
  •    2.5 Compare & Contrast Storage Types
  •    2.6 Compare & Contrast Common Computing Devices & Their Purposes
  •    2.7 Explain Basic Networking Concepts
  •    2.7 Explain Basic Networking Concepts Demo
  •    2.7 Explain Basic Networking Concepts Part 2
  •    2.7 Explain Basic Networking Concepts Part 3
  •    2.7 Explain Basic Networking Concepts Part 4
  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

Module 3 - Applications and Software

  •    Module 3 Notes
  •    3.1 Explain the Purpose of Operating Systems
  •    3.1 Explain the Purpose of Operating Systems Demo
  •    3.2 Compare & Contrast Components of an Operating System
  •    3.2 Compare & Contrast Components of an Operating System Demo
  •    3.3 Explain the Purpose & Proper Use of Software
  •    3.4 Explain Methods of Application Architecture & Delivery Models
  •    3.5 Given a Scenario Configure & Use Web Browsers
  •    3.5 Given a Scenario Configure & Use Web Browsers FireFox
  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
  •    3.6 Compare & Contrast General Application Concepts & Uses

Module 4 - Software Development

  •    Module 4 Notes
  •    4.1 Compare & Contrast Programming Language Categories-
  •    4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
  •    4.3 Explain the Purpose & Use of Programming Concepts-
  •    4.3 HTML Demo

Module 5 - Database Fundamentals

  •    Module 5 Notes
  •    5.1 Explain Database Concepts and the Purpose of Databases
  •    5.2 Compare and Contrast Various Database Structures
  •    5.3 Summarize Methods Used to Interface with Databases
  •    5.3 Summarize Methods Used to Interface with Databases Demo

Module 6 - Security

  •    Module 6 Notes
  •    6.1 Summarize Confidentiality, Integrity, and Availability Concerns
  •    6.2 Explain Methods to Secure Devices and Best Practices
  •    6.3 Summarize Behavioral Security Concepts
  •    6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
  •    6.5 Explain Password Best Practices
  •    6.6 Explain Common Uses of Encryption
  •    6.7 Explain Business Continuity Concepts
  •    6.8 Takeaways-
  •    6.9 ITF Fundamentals Conclusion

Microsoft 98-365 MTA Windows Server 2016 Administration Course Content

Module 1 Introducing Windows Server 2016

  •    Module 1 Notes
  •    1. Windows Server 2016 Fundamentals Intro
  •    2. Mod 1 Introducing Windows Server 2016
  •    3. Mod 1a Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

  •    Module 2 Notes
  •    4. Mod 2 Managing Windows Server 2016
  •    5. Mod 2a Managing Windows Server 2016

Module 3 Managing Storage

  •    Module 3 Notes
  •    6. Mod 3 Managing Storage
  •    7. Mod 3a Managing Storage

Module 4 Monitoring and Troubleshooting Servers

  •    Module 4 Notes
  •    8. Mod 4 Monitoring and Troubleshooting Servers
  •    9. Mod 4a Monitoring and Troubleshooting Servers

Module 5 Essential Services

  •    Module 5 Notes
  •    10. Mod 5 Essential Services
  •    11. Mod 5a Essential Services

Module 6 Understanding File and Print Services

  •    Module 6 Notes
  •    12. Mod 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

  •    Module 7 Notes
  •    13. Mod 7 Windows Network Services and Applications-
  •    14. Mod 7a Windows Network Services and Applications-

Mod 8 Key Takeaways

  •    Key Takeaway Notes
  •    15. Key takeaways Intro
  •    16. Key takeaways - Module 1 Introducing Windows Server 2016
  •    17. Key takeaways - Module 2 Managing Windows Server 2016
  •    18 Key takeaways - Module 3 Storing Data in Windows Server 2016
  •    19. Key takeaways - Module 4 Monitoring and Troubleshooting Servers
  •    20. Key takeaways - Module 5 Essential Services
  •    21. Key takeaways - Module 6 Understanding File and Print Services
  •    22. Key takeaways - Module 7 Windows Network Services and Applications

Mod 9 Terms to Know

  •    Terms to Know Notes
  •    23. Terms to Know Intro
  •    24. Terms to Know - Module 1 Introducing Windows Server 2016
  •    25. Terms to Know - Module 2 Managing Windows Server 2016
  •    26 Terms to Know - Module 3 Storing Data in Windows Server 2016
  •    27. Terms to Know - Module 4 Monitoring and Troubleshooting Servers
  •    28. Terms to Know - Module 5 Essential Services
  •    29. Terms to Know - Module 6 Understanding File and Print Services
  •    30. Terms to Know - Module 7 Windows Network Services and Applications

Mod 10 Hands on Labs

  •    Hands on Labs Setup Notes
  •    01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
  •    02 Step by Step Install VMware Player 15 in Windows 10 1
  •    03 Installing and Configuring DC1 Virtual Machine
  •    04 Installing and Configuring SRV-1 Virtual Machine
  •    05 Installing and Configuring Client 1 Virtual Machine
  •    06 Installing and Configuring the Router Virtual Machine
  •    07 Creating and Configuring SRV-2 Virtual Machine
  •    08 Working with Windows Server 2016 Desktop Experience
  •    09 Managing Organizational Units and Groups in AD DS

Microsoft 98-367 MTA Security Fundamentals Course Content

Module 1 Understanding Security Layers

  •    Module 1 Notes
  •    1.0 Security Fundamentals Instructor
  •    1.1 Security Fundamentals Intro
  •    1.2 Understanding Security Layers Part1
  •    1.3 Understanding Security Layers Part2

Module 2 Authentication, Authorization, and Accounting

  •    Module 2 Notes
  •    2.0 Authentication, Authorization & Accounting Part1
  •    2.1 Authentication, Authorization & Accounting Part2
  •    2.2 Authentication, Authorization & Accounting Demo

Module 3 Understanding Security Policies

  •    Module 3 Notes
  •    3.0 Understanding Security Policies

Module 4 Understanding Network Security

  •    Module 4 Notes
  •    4.0 Understanding Network Security Part1
  •    4.1 Understanding Network Security Part2

Module 5 Locking Down Server and Client

  •    Module 5 Notes
  •    5.0 Locking Down the Server and Client
  •    5.1 Locking Down the Server and Client Part2

Module 6 Key Takeaways

  •    Key Takeaway Notes
  •    6.0 Key Take Aways Intro
  •    6.1 Understanding Security Layers
  •    6.2 Authentication Authorization and Accounting
  •    6.3 Understanding Security Policies
  •    6.4 Understanding Network Security
  •    6.5 Security Fundamentals Part 2

Module 7 Terms to Know

  •    Terms to Know Notes
  •    7.0 Terms to Know Intro
  •    7.1 Understanding Security Layers Terms
  •    7.2 Authentication Authorization and Accounting Terms
  •    7.3 Understanding Security Policies Terms
  •    7.4 Understanding Network Security Terms
  •    7.5 Locking Down Server and Client Terms

Microsoft 98-366 MTA Networking Fundamentals Course Content

Module 1 Understanding Local Area Networking

  •    Module 1 Notes
  •    1.0 Intro to Networking Fundamentals
  •    1.1 Exam Overview
  •    1.1 Examining Local Network Devices and Data Transfers 1a
  •    1.1 Examining Local Network Devices and Data Transfers 1b
  •    1.1 Examining Local Network Devices and Data Transfers 1c
  •    1.1 Examining Local Network Devices and Data Transfers 1d
  •    1.1 Examining Local Network Devices and Data Transfers 1e
  •    1.1 Examining Local Network Devices and Data Transfers 1f
  •    1.2 Examining Local Network Devices and Data Transfers Part 2a
  •    1.2 Examining Local Network Devices and Data Transfers Part 2b

Module 2 Defining Networks with the OSI Model

  •    Module 2 Notes
  •    2.1 Defining Networks with OSI Model Part 1a
  •    2.2 Defining Networks with OSI Model Part 1b
  •    2.3 Defining Networks with OSI Model Part 1c
  •    2.4 Defining Networks with OSI Model Part 1d
  •    2.5 Defining Networks with OSI Model Part 1e
  •    2.6 Defining Networks with OSI Model Part 1f
  •    2.7 Defining Networks with OSI Model Part 1g
  •    2.8 Defining Networks with OSI Model Part 1h

Module 3 Understanding Wired and Wireless Networks

  •    Module 3 Notes
  •    3.1 Understand Wired and Wireless Networks Part1
  •    3.2 Understand Wired and Wireless Networks Part2

Module 4 Understanding Internet Protocol

  •    Module 4 Notes
  •    4.1 Understanding Internet Protocol Part1
  •    4.2 Understanding Internet Protocol Part2

Module 5 Implementing TCP-IP in the command line

  •    Module 5 Notes
  •    5.1 Implementing TCPIP in the Command Line

Module 6 Working with Networking Services

  •    Module 6 Notes
  •    6.1 Working with Networking Services

Module 7 Understanding Wide Area Networks

  •    Module 7 Notes
  •    7.1 Understanding Wide Area Network Part1
  •    7.2 Understanding Wide Area Network Part2

Module 8 Defining Network Infrastructure and Security

  •    Module 8 Notes
  •    8.1 Defining Network Infrastructure & Network Security Part1
  •    8.2 Defining Network Infrastructure & Network Security Part2

Module 9 Key Takeaways

  •    Key Takeaway Notes
  •    1. Key Take Aways of Networking Fundamentals
  •    2. Key Take Aways Mod1
  •    3. Key Take Aways Mod2
  •    4. Key Take Aways Mod3
  •    5. Key Take Aways Mod4
  •    6. Key Take Aways Mod5
  •    7. Key Take Aways Mod6
  •    8. Key Take Aways Mod7

Module 10 Terms to Know

  •    Terms to Know Notes
  •    1. Terms to Know Networking Fundamentals
  •    2. Terms to Know Mod1
  •    3. Terms to Know Mod2
  •    4. Terms to Know Mod3
  •    5. Terms to Know Mod4
  •    6. Terms to Know Mod5
  •    7. Terms to Know Mod6
  •    8. Terms to Know Mod7
  •    9. Terms to Know Mod8

Microsoft 70-698: Installing and Configuring Windows 10 Course Content

Module 1 : Prepare for installation requirements

  •    Module 1 Workbook
  •    Prep for Installation Windows 10
  •    Clean Install or Upgrade Windows 10
  •    Editions of Windows 10
  •    What Features Do You Want
  •    Installation Media
  •    Looking at MS Application Compatibility Toolkit (ACT)

Module 2 : Install Windows

  •    Module 2 Workbook
  •    Installing Windows
  •    Clean installation of Windows 10-Demo
  •    Upgrade using Installation Media
  •    Configure Native Boot and VHD
  •    Migrating to Windows 10
  •    Chp2 Booting from VHD
  •    Creating a VHD-Demo
  •    Installing Windows 10 to a VHD-Demo
  •    Installing on Bootable USB
  •    Using USMT User State Migration Tool-Demo
  •    Additional Windows Features
  •    Create an MBR-Partitioned VHD-Demo
  •    Additional Regional and Language Support
  •    Putting Win 10 on a VHD with DISM-Demo

Module 3 : Configure devices and device drivers

  •    Module 3 Workbook
  •    Configure Devices and Device Drivers
  •    Resolve Driver Issues
  •    Configuring Driver Settings
  •    Manage Driver Packages
  •    Download and Import Driver Packages
  •    Using DISM
  •    Installing o Updating Drivers using Device Manager-Demo
  •    Roll Back Drivers-Demo
  •    Using Sigverif-Demo
  •    More on Device Manager-Demo

Module 4 : Perform post-installation configuration

  •    Module 4 Workbook
  •    Perform Post Installation Configuration
  •    Configure Accessibilty Options
  •    Configure Cortana
  •    Configure Microsoft Edge
  •    Configure Internet Explorer
  •    Configure Client Hyper-V
  •    Configure Power Settings
  •    Customizing the Start Menu-Demo
  •    Start Tiles-Demo
  •    Desktop Customization-Demo
  •    Action Center and Notifications-Demo
  •    Hyper V-Demo
  •    Power Settings-Demo

Module 5 : Implement Windows in an enterprise environment

  •    Module 5 Workbook
  •    Implement Windows in an Enterprise Enviornment
  •    Implementing Active Directory
  •    Implement Volume Activation Using a Key Mgmt Service
  •    Query and Configure Activation State using Command line
  •    Configure Active Directory Including Group Policies
  •    Configure and Optimize User Account Control UAC
  •    Using Software Licensing Manager; slmgr.vbs -dli-Demo
  •    Taking a look at UAC-Demo

Module 6 : Configure networking

  •    Module 6 Workbook
  •    Configuring Networking
  •    Configuring Name Resolution
  •    Connect to a Network
  •    Configure Network Locations
  •    Configure Windows Firewall
  •    Configure Windows Firewall with Advance Security
  •    Configure Network Discovery
  •    Configuring Wi-Fi Settings
  •    Troubleshoot Network Issues
  •    Configure VPNs
  •    Configure IPsec
  •    Configure DirectAccess
  •    Configure IP Addresses Manually-Demo
  •    DNS Settings-Demo
  •    Looking at Network Locations and where to make Chpanges-Demo
  •    Windows Firewall – Basic Settings-Demo
  •    Windows Firewall – Advanced Settings-Demo
  •    Troubleshooting Tools-Demo
  •    Create a VPN Connection-Demo

Module 7 : Configure storage

  •    Configure Storage
  •    Create and Configure VHD
  •    Configure Removable Devices
  •    Create and Configure Storage Spaces
  •    Troubleshoot Storage and Removable Device Issue
  •    Steps to create a simple volume-Demo
  •    Create VHD with Hyper-V Manager-Demo
  •    Create VHD with PowerShell-Demo
  •    Bitlocker to Go-Demo

Module 8 : Configure data access and usage

  •    Module 8 Workbook
  •    Configure Data Access and Usage File-Printer
  •    Configure File System Permissions
  •    Configure File Share Public Folders and OneDrive
  •    Configure OneDrive usage including Files On Demand
  •    Troubleshoot Data Access and Usage
  •    File Sharing-Demo
  •    Printer Sharing-Demo
  •    Set Printer Security-Demo
  •    File system permissions-Demo
  •    Public Folder Sharing-Demo
  •    OneDrive-Demo
  •    Storage Sense-Demo
  •    Disk Quotas-Demo

Module 9 : Implement Apps

  •    Module 9 Workbook
  •    Implement Apps
  •    Configure Startup Options
  •    Configure Windows Features
  •    Configure Windows Stores
  •    Implementing Windows Store Apps
  •    Implement Windows Store for Business and Education
  •    Provison Packages
  •    Create Packages
  •    Chpange Default Apps-Demo
  •    Application Startup Options-Demo
  •    Looking at Windows Features-Demo
  •    Windows Store-Demo
  •    Windows Imaging and Configuration Designer Tool ICD-Demo

Module 10 : Configure remote management

  •    Module 10 Workbook
  •    Configuring Remote Management
  •    Configure Remote Management Settings
  •    Configure Remote Desktop
  •    Configure Remote Assistance
  •    Modifying Using MMC or PS
  •    Configure Remote PowerShell
  •    Remote Management Settings-Demo
  •    Allow through Windows Firewall-Demo
  •    Remote Desktop-Demo
  •    Remote Assistance-Demo
  •    Remote with MMC-Demo
  •    Windows PowerShell Remoting-Demo

Module 11 : Configure Updates

  •    Module 11 Workbook
  •    Configure Update Windows 10
  •    Manage Update History
  •    Roll Back Updates
  •    Implement Insider Preview CB CBB and LTSB
  •    Update Windows Store Apps
  •    Windows Update Options-Demo
  •    Update History-Demo
  •    Rolling Back Updates-Demo
  •    Update Windows Store apps-Demo

Module 12 : Monitor Windows

  •    Module 12 Workbook
  •    Monitor Windows
  •    Configure Event Subscriptions
  •    Monitor Performance Using Task Manager
  •    Monitor System
  •    Monitor and Manage Printers
  •    Monitor Performance Using Performance Monitor Data Collectors
  •    Monitor and Manage Printers
  •    Configure Indexing Options
  •    Manage Client Security by Using Windows Defender
  •    Evaluate System Stability by Using Reliaability Monitor
  •    Troubleshoot Performance Issues
  •    Manage Security Using Windows Defender Security Center
  •    Configure Windows Defender Advanced Threat Detection
  •    Event Viewer-Demo
  •    Creating Event Subscriptions-Demo
  •    Task Manager-Demo
  •    Performance Monitor-Demo
  •    Resource Monitor-Demo
  •    Managing the Printers with Print Management-Demo
  •    Indexing-Demo
  •    Windows Defender-Demo
  •    Reliability Monitor-Demo

Module 13 : Configure System and Data Recovery

  •    Module 13 Workbook
  •    Configure System and Data Recovery
  •    Configure System Restore
  •    Configure Restore Points
  •    Peform a Refresh or Recycle
  •    Restore Previous Versions of Files and Folders
  •    Configure File History
  •    Recover Files from OneDrive
  •    Use Windows Backup and Restore
  •    Perform a Backup and Restore with WBAdmin
  •    Perform Recovery Operations Windows Recovery
  •    Configure a Recovery Drive-Demo
  •    Configure System Restore-Demo
  •    Configure Restore Points-Demo
  •    Performing a Refresh or Recycle-Demo
  •    Configure File History-Demo
  •    Use Windows Backup & Restore-Demo

Module 14 : Configure Authorization and Authentication

  •    Module 14 Workbook
  •    Configure Authorization and Authentication
  •    Configure Pictures Passwords and Biometrics
  •    Configure Workgroups
  •    Configure Domain Settings
  •    Configue Homegroup Settings
  •    Configure Credential Manager
  •    Configure Local Accounts
  •    Configure Microsoft Accounts
  •    Configure Device Registration
  •    Configure Windows Hello for Business
  •    Configure Device Guard
  •    Credential Guard
  •    Configure Device Health Attestation
  •    Configure UAC Behavior
  •    Configure Dynamic Look
  •    Picture Passwords-Demo
  •    Workgroups-Demo
  •    Domains-Demo
  •    Credential Manager-Demo
  •    Configure Local Accounts-Demo
  •    Dynamic Lock-Demo

Module 15 : Configure Advanced Management Tools

  •    Module 15 Workbook
  •    Configure Advanced Management Tools
  •    Configure Device Manager
  •    Configure and use the MMC
  •    Configure Task Schedule
  •    Configure Automation of Mgmt Task Using Windows PowerShell
  •    Convert Group Policy Objects to MDM Policies using the MDM
  •    Services-Demo
  •    Using the MMC-Demo
  •    Task Scheduler-Demo
  •    Opening PowerShell and the Integrated Scripting Environment-Demo

Windows 10 Power User (How to use Windows 10) Course Content

Module 1: Getting Started With Windows 10

  •    Introduction
  •    First Steps
  •    Navigating The Desktop
  •    Using Cortana To Search

Module 2: Using File Explorer

  •    File Explorer
  •    Understanding File And Folder Basics
  •    Work With Libraries
  •    Creating A Home Group

Module 3: Using Windows Applications

  •    Opening And Using Applications
  •    Installing New Applications From The Windows Store
  •    Using Default Applications

Module 4: Browsing the Web With Microsoft Edge

  •    Examining The Edge Window
  •    Searching The Web With Edge
  •    Bookmarking Important Sites
  •    Using The Reading List
  •    Marking A Page With Web Notes
  •    Conclusion

Module 5: Customizing Windows

  •    Introduction
  •    Customizing The Display
  •    Customizing File Explorer
  •    Configuring Cortanas Notebook Feature
  •    Customizing Privacy Settings
  •    Customizing Microsoft Edge

Module 6: Connecting Devices And Devices

  •    Connecting Printers
  •    Connecting And Using A Flash Drive
  •    Connect A Phone

Module 7: Managing User Accounts

  •    Create Additional Users
  •    Understanding User Profiles
  •    Sharing Data Between Profiles

Module 8: Backing Up Important Data

  •    Using File History
  •    Using Windows Backup
  •    Using System Restore

Module 9: Maintaining Windows

  •    Windows Updates
  •    Working With The Action Center
  •    Using Disk Defragmenter
  •    Managing Storage And Apps Using Settings
  •    Conclusion

Module 10: Protecting Windows

  •    Introduction
  •    Using Windows Defender
  •    Using Windows Firewall
  •    Using Bit Locker
  •    Windows Hello

Module 11: Monitoring Performance

  •    Using Task Manager
  •    Using Resource Monitor

Module 12: Working With Control Panel And Settings

  •    Control Panel Part 1
  •    Control Panel Part 2
  •    Settings App
  •    Using Device Manager
  •    Using Remote Desktop
  •    Conclusion
Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
1-5 of 81 reviews
  1. SJ

    good

  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Your Training Instructors

David Biggers

David Biggers

IT Instructor

David has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Jr. Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Additionally, David taught part-time during the evening at the college, where he instructed on Active Directory, Introduction to Computers, and Networking. David has 18 years of IT experience, 17 professional IT certifications, and 8 years of teaching experience.

Patrick Loner

Patrick Loner

IT Instructor

Patrick is a skilled presenter with a strong background in IT training and certification covering general information technology, network administration, and consulting. His strong customer service background and skills both in support and presentation situations allow him to effectively communicate course information in an engaging manner. He specializes in areas such as Active Directory, Microsoft Exchange, Windows Network Infrastructure, and Security.

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.

When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.

Chrys lives by, and is fond of repeating, her professional creed:

“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”

New To IT Training Series

Subscribe To All-Access
Lock In $16.99 / Month Forever

Gain access to this training and all our other courses with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.99 $16.99 Monthly

OR

Original price was: $79.00.Current price is: $47.40.

today Only: 1-Year For $79.00!

Get 1-year full access to every course, over 2,600 hours of focused IT training, 20,000+ practice questions at an incredible price of only $79.00

Learn CompTIA, Cisco, Microsoft, AI, Project Management & More...