|
- Certified Information Security Manager (CISM) (Voucher Included)
-
Fee: $1,395.00
Dates: 7/1/2024 - 8/30/2024
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
CISM is one of the most valued certifications in the IT security industry. This online course will prepare you to sit for the CISM certification exam, and the exam cost is included. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- Management of Information Security
In the InfoSec world, security managers are the driving force behind an organization's cybersecurity policies. These key individuals typically started their IT careers in hands-on roles before earning their CISM certification and taking on managerial duties. If you're ready to earn your next IT certification, this online training course will fully prepare you for the ISACA Certified Information Security Manager (CISM) certification exam.
This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply, which are not included.
- Information Security
- Governance and Policy
- Risk Management
- Security Management
- Protection and Maintenance
What you will learn
- Recognize the security role to manage and improve information security governance processes that support an information security strategy
- Interpret the methods to ensure the information security program provides benefits while supporting business operations
- Analyze the methods and strategies in classifying information assets to confirm protective measures are proportional to their business value
- Demonstrate the ability in accurately classifying and categorizing information security incidents to guarantee effective reactions
How you will benefit
- Build confidence toward successfully completing the certification exam
- Become recognized by ISACA, a global leader in certification, training, and career development
- Prove comprehensive information security knowledge to employers
Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners.Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients.
Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.
|
|
|
- Certified Information Security Manager (CISM) (Voucher Included)
-
Fee: $1,395.00
Dates: 8/31/2024 - 12/13/2024
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
CISM is one of the most valued certifications in the IT security industry. This online course will prepare you to sit for the CISM certification exam, and the exam cost is included. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- Management of Information Security
In the InfoSec world, security managers are the driving force behind an organization's cybersecurity policies. These key individuals typically started their IT careers in hands-on roles before earning their CISM certification and taking on managerial duties. If you're ready to earn your next IT certification, this online training course will fully prepare you for the ISACA Certified Information Security Manager (CISM) certification exam.
This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply, which are not included.
- Information Security
- Governance and Policy
- Risk Management
- Security Management
- Protection and Maintenance
What you will learn
- Recognize the security role to manage and improve information security governance processes that support an information security strategy
- Interpret the methods to ensure the information security program provides benefits while supporting business operations
- Analyze the methods and strategies in classifying information assets to confirm protective measures are proportional to their business value
- Demonstrate the ability in accurately classifying and categorizing information security incidents to guarantee effective reactions
How you will benefit
- Build confidence toward successfully completing the certification exam
- Become recognized by ISACA, a global leader in certification, training, and career development
- Prove comprehensive information security knowledge to employers
Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners.Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients.
Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.
|
|
|
- Certified Information Systems Security Professional (CISSP)
-
Fee: $1,995.00
Dates: 7/1/2024 - 8/30/2024
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
This engaging, hands-on course covers the key areas of information security and will prepare you for the CISSP exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
- Mac users are encouraged to have access to a Windows environment on their device.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- (ISC)² Certified Information Systems Security Professional (CISSP) Official Study Guide
In today's online world, information security has become a critical part of virtually every organization—no matter the industry. The demand for information security professionals is expected to surge, as the forces of "good" and "bad" continue to battle for control and use of online information. You can join the side for "good" when you earn your Certified Information Systems Security Professional (CISSP) certification. Earning your CISSP is a must for cyber security professionals who want to get ahead in this important field.
This Certified Information Systems Security Professional (CISSP) course is an engaging, fully online course that provides in-depth instruction in key areas related to information/cyber security.
- Security and Risk Management
- Security Governance
- Security Policies
- Confidentiality
- Business Continuity
- Legal and Regulatory
- Professional Ethic
- Risk Management
- Asset Security
- Information Classification
- Handling Requirements
- Ownership
- Data Security Controls
- Protect Privacy
- Retention
- Security Engineering
- Security Models
- Security Designs
- Engineering Processes
- Vulnerabilities
- Cryptography
- Embedded Devices
- Site Design and Security
- Communication and Network Security
- Network Architecture Design
- Network Components
- Communication Channels
- Network Attacks
- Identity and Access Management
- Physical and Logical Assets Control
- Identification and Authentication
- Third-Party Identity Services
- Identity as a Service
- Provisioning Lifecycle
- Authorization Mechanisms
- Security Assessment and Testing
- Assessment and Test Strategies
- Test Outputs
- Security Control Testing
- Security Process Data
- Security Architectures
- Security Operations
- Foundational Security Operations Concepts
- Logging, Monitoring and Investigating Activities
- Provisioning of Resources
- Management Processes
- Physical Security
- Preventative Measures
- Business Continuity
- Software Development Security
- Security in the Software Development Lifecycle
- Development Environment Security Controls
- Software Security Effectiveness
- Software Security Impact
What you will learn
- Learn how to handle security and risk management
- Understand asset security
- Know how to implement security engineering
- Realize best practices for communications and network security
- Master identity and access management
How you will benefit
- Become prepared to work as a Certified Information Systems Security Professional (CISSP)
- Gain hands-on experience in the information/cyber security industry
- Begin a career in information security or broaden your skills if you're already working
- Become more efficient on the job and better able to identify risks
Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners. Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients. Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.
|
|
|
- Certified Information Systems Security Professional (CISSP)
-
Fee: $1,995.00
Dates: 8/31/2024 - 12/13/2024
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
This engaging, hands-on course covers the key areas of information security and will prepare you for the CISSP exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
- Mac users are encouraged to have access to a Windows environment on their device.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- (ISC)² Certified Information Systems Security Professional (CISSP) Official Study Guide
In today's online world, information security has become a critical part of virtually every organization—no matter the industry. The demand for information security professionals is expected to surge, as the forces of "good" and "bad" continue to battle for control and use of online information. You can join the side for "good" when you earn your Certified Information Systems Security Professional (CISSP) certification. Earning your CISSP is a must for cyber security professionals who want to get ahead in this important field.
This Certified Information Systems Security Professional (CISSP) course is an engaging, fully online course that provides in-depth instruction in key areas related to information/cyber security.
- Security and Risk Management
- Security Governance
- Security Policies
- Confidentiality
- Business Continuity
- Legal and Regulatory
- Professional Ethic
- Risk Management
- Asset Security
- Information Classification
- Handling Requirements
- Ownership
- Data Security Controls
- Protect Privacy
- Retention
- Security Engineering
- Security Models
- Security Designs
- Engineering Processes
- Vulnerabilities
- Cryptography
- Embedded Devices
- Site Design and Security
- Communication and Network Security
- Network Architecture Design
- Network Components
- Communication Channels
- Network Attacks
- Identity and Access Management
- Physical and Logical Assets Control
- Identification and Authentication
- Third-Party Identity Services
- Identity as a Service
- Provisioning Lifecycle
- Authorization Mechanisms
- Security Assessment and Testing
- Assessment and Test Strategies
- Test Outputs
- Security Control Testing
- Security Process Data
- Security Architectures
- Security Operations
- Foundational Security Operations Concepts
- Logging, Monitoring and Investigating Activities
- Provisioning of Resources
- Management Processes
- Physical Security
- Preventative Measures
- Business Continuity
- Software Development Security
- Security in the Software Development Lifecycle
- Development Environment Security Controls
- Software Security Effectiveness
- Software Security Impact
What you will learn
- Learn how to handle security and risk management
- Understand asset security
- Know how to implement security engineering
- Realize best practices for communications and network security
- Master identity and access management
How you will benefit
- Become prepared to work as a Certified Information Systems Security Professional (CISSP)
- Gain hands-on experience in the information/cyber security industry
- Begin a career in information security or broaden your skills if you're already working
- Become more efficient on the job and better able to identify risks
Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners. Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients. Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.
|
|
|
- Introduction to Cybersecurity
-
Fee: $129.00
Dates: 7/1/2024 - 8/30/2024
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry.This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.
You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices.
Requirements:
Hardware Requirements:
This course can be taken on either a PC, Mac, or Chromebook device.
Software Requirements:
- PC: Windows 8 or later operating systems.
- Mac: OS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
- Other: Email capabilities and access to a personal email account.
This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
- Cybersecurity Foundations
- Operating Systems
- Windows Command Line Foundations
- Network Fundamentals
- Cloud Computing Fundamentals
- Cybersecurity Policy, Framework, and Guidelines
- Cybersecurity Audit Foundations
- Risk Management
- Penetration Testing - Demonstration
What you will learn
- Understand what cybersecurity entails
- Identify the three most common operating systems
- Execute simple commands
- Learn about cloud computing and networking
- Learn about cybersecurity policies, frameworks, audits, and risk management
How you will benefit
- Learn if a career in cybersecurity could be right for you
- Increase your baseline knowledge of foundational cybersecurity concepts
- Learn tips and tricks from a working cybersecurity professional
- Follow along with hands-on demonstrations to develop and practice your foundational skills
- Finish in three months or less
Self-Study
|
|
|
- Introduction to Cybersecurity
-
Fee: $129.00
Dates: 8/31/2024 - 12/13/2024
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry.This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.
You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices.
Requirements:
Hardware Requirements:
This course can be taken on either a PC, Mac, or Chromebook device.
Software Requirements:
- PC: Windows 8 or later operating systems.
- Mac: OS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
- Other: Email capabilities and access to a personal email account.
This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
- Cybersecurity Foundations
- Operating Systems
- Windows Command Line Foundations
- Network Fundamentals
- Cloud Computing Fundamentals
- Cybersecurity Policy, Framework, and Guidelines
- Cybersecurity Audit Foundations
- Risk Management
- Penetration Testing - Demonstration
What you will learn
- Understand what cybersecurity entails
- Identify the three most common operating systems
- Execute simple commands
- Learn about cloud computing and networking
- Learn about cybersecurity policies, frameworks, audits, and risk management
How you will benefit
- Learn if a career in cybersecurity could be right for you
- Increase your baseline knowledge of foundational cybersecurity concepts
- Learn tips and tricks from a working cybersecurity professional
- Follow along with hands-on demonstrations to develop and practice your foundational skills
- Finish in three months or less
Self-Study
|
|
|
- Introduction to Networking
-
Fee: $129.00
Dates: 7/17/2024 - 9/7/2024
Times: 7:00 AM - 7:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.
Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience. History of NetworkingHave you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.
How Networks OperateIn this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!
Peer-To-Peer Versus Client/ServerHave you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.
Network Types and TopologiesMany people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!
Segmentation and RoutingIn this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.
ProtocolsWhen people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!
TCP/IPIn this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.
Name Resolution and ServicesHave you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.
Wide Area Networks (WANs)We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.
Remote AccessIf you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.
Making Internet ConnectionsIn this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.
Review and ConclusionIn our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking! What you will learn
- Learn how and why networks work rather than focusing on memorization of terms and numbers
- Be capable of performing basic computer networking tasks
- Understand the difference between client/server and peer-to peer networks
- Learn how routers operate
- Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
- Be well prepared to apply your newfound knowledge to future changes in networks and networking
How you will benefit
- Easily understand how and why computer networking works
- Have access to an instructor who completely understands networking and can convey that understanding to others
- Prove helpful in your day to day dealings with computer networks and the Internet
- Be well prepared for a lifetime of continued learning about networks and networking
David Iseminger
David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies.
David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.
|
|
|
- Introduction to Networking
-
Fee: $129.00
Dates: 8/14/2024 - 10/5/2024
Times: 7:00 AM - 7:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.
Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience. History of NetworkingHave you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.
How Networks OperateIn this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!
Peer-To-Peer Versus Client/ServerHave you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.
Network Types and TopologiesMany people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!
Segmentation and RoutingIn this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.
ProtocolsWhen people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!
TCP/IPIn this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.
Name Resolution and ServicesHave you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.
Wide Area Networks (WANs)We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.
Remote AccessIf you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.
Making Internet ConnectionsIn this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.
Review and ConclusionIn our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking! What you will learn
- Learn how and why networks work rather than focusing on memorization of terms and numbers
- Be capable of performing basic computer networking tasks
- Understand the difference between client/server and peer-to peer networks
- Learn how routers operate
- Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
- Be well prepared to apply your newfound knowledge to future changes in networks and networking
How you will benefit
- Easily understand how and why computer networking works
- Have access to an instructor who completely understands networking and can convey that understanding to others
- Prove helpful in your day to day dealings with computer networks and the Internet
- Be well prepared for a lifetime of continued learning about networks and networking
David Iseminger
David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies.
David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.
|
|
|
- Introduction to Networking
-
Fee: $129.00
Dates: 9/11/2024 - 11/2/2024
Times: 7:00 AM - 7:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.
Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience. History of NetworkingHave you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.
How Networks OperateIn this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!
Peer-To-Peer Versus Client/ServerHave you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.
Network Types and TopologiesMany people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!
Segmentation and RoutingIn this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.
ProtocolsWhen people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!
TCP/IPIn this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.
Name Resolution and ServicesHave you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.
Wide Area Networks (WANs)We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.
Remote AccessIf you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.
Making Internet ConnectionsIn this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.
Review and ConclusionIn our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking! What you will learn
- Learn how and why networks work rather than focusing on memorization of terms and numbers
- Be capable of performing basic computer networking tasks
- Understand the difference between client/server and peer-to peer networks
- Learn how routers operate
- Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
- Be well prepared to apply your newfound knowledge to future changes in networks and networking
How you will benefit
- Easily understand how and why computer networking works
- Have access to an instructor who completely understands networking and can convey that understanding to others
- Prove helpful in your day to day dealings with computer networks and the Internet
- Be well prepared for a lifetime of continued learning about networks and networking
David Iseminger
David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies.
David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.
|
|
|
- Introduction to Networking
-
Fee: $129.00
Dates: 10/16/2024 - 12/7/2024
Times: 7:00 AM - 7:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.
Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience. History of NetworkingHave you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.
How Networks OperateIn this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!
Peer-To-Peer Versus Client/ServerHave you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.
Network Types and TopologiesMany people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!
Segmentation and RoutingIn this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.
ProtocolsWhen people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!
TCP/IPIn this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.
Name Resolution and ServicesHave you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.
Wide Area Networks (WANs)We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.
Remote AccessIf you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.
Making Internet ConnectionsIn this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.
Review and ConclusionIn our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking! What you will learn
- Learn how and why networks work rather than focusing on memorization of terms and numbers
- Be capable of performing basic computer networking tasks
- Understand the difference between client/server and peer-to peer networks
- Learn how routers operate
- Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
- Be well prepared to apply your newfound knowledge to future changes in networks and networking
How you will benefit
- Easily understand how and why computer networking works
- Have access to an instructor who completely understands networking and can convey that understanding to others
- Prove helpful in your day to day dealings with computer networks and the Internet
- Be well prepared for a lifetime of continued learning about networks and networking
David Iseminger
David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies.
David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.
|
|
|