Computer & Network Administration: II

Download Training Calendar

Free WiFi Available

  • Start Date

    27 May, 2020

  • End Date

    29 May, 2020

  • Price

    ₦250,000

  • WiFi

    Free wifi available

Event Details

This workshop Computer & Network Administration: II workshop provides participants with the necessary skills for an intermediate-level IT professional. Participants will gain knowledge beyond the basics required to assemble components based on customer requirements, install, configure, and maintain PCs, mobile devices, and software for end users, understand the basics of networking and security forensics, properly and safely diagnose, resolve, and document common hardware and software issues, apply troubleshooting skills, provide appropriate customer support and understand the basics of scripting, virtualization, desktop imaging, and deployment.

CONTENT

 

Operating Systems

  • Compare and contrast common operating system types and their purposes
  • Compare and contrast features of Microsoft Windows versions
  • Summarize general OS installation considerations and upgrade methods
  • Use appropriate Microsoft command line tools
  • Use Microsoft operating system features and tools
  • Use Microsoft Windows Control Panel utilities
  • Summarize application installation and configuration concepts
  • Configure Microsoft Windows networking on a client/desktop
  • Use features and tools of the Mac OS and Linux client/desktop operating systems

Security

  • Summarize the importance of physical security measures
  • Explain logical security concepts
  • Compare and contrast wireless security protocols and authentication methods
  • detect, remove, and prevent malware using appropriate tools and methods
  • Compare and contrast social engineering, threats, and vulnerabilities
  • Compare and contrast the differences of basic Microsoft Windows OS security settings
  • Implement security best practices to secure a workstation
  • Implement methods for securing mobile devices
  • Implement appropriate data destruction and disposal methods
  • Configure security on SOHO wireless and wired networks

Software Troubleshooting

  • Troubleshoot Microsoft Windows OS problems
  • Troubleshoot and resolve PC security issues
  • Use best practice procedures for malware removal
  • Troubleshoot mobile OS and application issues
  • Troubleshoot mobile OS and application security issues

Operational Procedures

  • Compare and contrast best practices associated with types of documentation
  • Implement basic change management best practices
  • Implement basic disaster prevention and recovery methods
  • Explain common safety procedures
  • Explain environmental impacts and appropriate controls
  • Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.
  • Use proper communication techniques and professionalism
  • Identify the basics of scripting
  • Use remote access technologies

 

FOR WHOM: Auditors, Computer Executives, Internal Control Officers, CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals,  and Security department managers who form part of the contingency planning or review team.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

 

1ST BATCH: 27th – 29th May, 2020

2ND BATCH: 17th – 20th November, 2020

Other Dates

Start Date End Date
27 May, 2020 29 May, 2020
Start Date End Date
17 Nov, 2020 20 Nov, 2020
  • Venue

    Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.

Share this course