Skip to content

IT Support and Specialist Course

CPD & IAO approved training with tutor support I 120+ Modules I Lifetime Access


St. Pauls College

Summary

Price
£309 inc VAT
Or £51.50/mo. for 6 months...
Study method
Online
Duration
Self-paced
Qualification
No formal qualification
Additional info
  • Tutor is available to students

Overview

Benefits of taking this IT Support and Specialist Course:

Certification: Internationally recognised certification upon successful completion
Flexible Study:
High-quality e-learning study materials, access from any device anytime anywhere
Instant Result:
Instant result through multiple choice assessments
Lifetime Access:
24/7 access to the course for the lifetime
Comprehensive Training:
Delivered by instructors with industry experience, video lessons and texts.
Support:
Premium support through live chat, email and phone

Nowadays, the computer changes our life. We access information and news and avail many opportunities to do any work at an instant and easily with the help of a computer. With the increasing demand for the computer in offices, home, organization, and even for personal uses, the demand of specialists grows inevitably.

Considering the demand, anyone can kick-start his career in the role of an IT specialist. Before doing that, he needs to know some basic practical and technical supports how to serve the clients, analyze their computers’ problems, give solution over phone or presence, and many other relevant issues.

To teach these aforesaid aspects you can look at our IT Support and Specialist Course course. the precise contents assist you to pursue the best position as an IT specialist.

Course media

Description

What will you learn:

The IT Support and Specialist Course of 125 mandatory modules, covering

Software:

  • What is an Operating System
  • Configuring the Operating System
  • What is an Application
  • Using the Control Panel
  • Software and Concepts
  • Licensing
  • Using Software
  • Software Tools
  • Software
  • Hardware, Devices, and Peripherals

Hardware:

  • Hardware and Peripherals
  • Storage
  • Connectivity Devices
  • Network Components
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering9
  • Assessing the Impact of Phishing
  • Types of Wireless Attacks
  • Intrusion Monitoring
  • Wireless Security Risks
  • Authentication Attacks
  • Rogue Devices
  • Public Hotspots
  • Wireless Security Monitoring
  • Device Tracking
  • WLAN Security Infrastructure
  • Management Protocols
  • Other RADIUS Solutions

Security:

  • Introduction9
  • Child Safety Online
  • Secure Payment Sites
  • Online Banking
  • How To Keep Your Password Safe
  • Common Scams
  • How I Got Pharmed
  • Virus Protection
  • Self Maintenance
  • Personal Information Online
  • Is The Internet Safe?
  • Importance of Cyber Security
  • Spyware Can Destroy
  • How Does Spyware Spread?
  • How To Remove Spyware
  • Anti Spyware Program
  • The Anti Anti-Spyware Programs
  • Research And Learn More
  • Choosing The Best Anti-Spyware Tool
  • Computer Security And Spyware
  • The Programs To Avoid
  • Is It Legal?
  • Checklist Of Protection
  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals
  • Malware
  • Software-Based Threats
  • Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities
  • Manage Data Security
  • Manage Application Security
  • Manage Mobile Security
  • A Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques
  • Respond to Security Incidents
  • Recover from a Security Incident

Networking:

  • OSI Layers
  • LANs and WANs
  • Network Types
  • Transmissions
  • Fibre Optics
  • Converters and Connectors
  • Wireless Security
  • Authentication.prproj
  • Wireless Security Threats
  • TACACS
  • Keys
  • RADIUS
  • VPN Technologies
  • Tunnelling Protocols.prproj
  • Acceptable Use
  • Common Problems
  • Troubleshooting
  • Network Technician Tools
  • Physical and Logical Issues
  • Open or Closed Ports
  • ARP Issues

Basic IT Literacy:

  • Core Concepts in Healthcare IT
  • EMR EHR Issues
  • Regulations, Standards, and Stakeholders
  • HIPAA Controls and Compliance
  • Team Roles and Responsibilities
  • Manage Communication and Ethics Issues
  • Legal Best Practices, Requirements, and Documentation
  • Medical Document Imaging
  • Sanitation Management
  • Computing Essentials
  • Networking
  • Manage Servers and Software
  • Hardware Support
  • Set Up a Workstation
  • Troubleshoot Basic IT Issues
  • Troubleshoot Medical IT Issues
  • Implementation of an EMR EHR System
  • Change Control
  • Manage Physical and Logical Security
  • Implement Security Best Practices and Threat Mitigation Techniques
  • Manage Remote Access
  • Manage Wireless Security
  • Perform Backups and Disaster Recovery

Method of Assessment:

Upon conclusion of the course, there's an online multiple-choice quiz assessment, which will determine whether you have passed the course. The test is marked immediately and results are published instantly (60% pass mark).

Certification:

Certificates can be obtained at an additional cost in PDF or in Printed Hardcopy form

Requirements

There are no academic entry requirements for this course, and it is open to students of all academic backgrounds.

Questions and answers


No questions or answers found containing ''.


Nuno asked:

Is this available for Portugal? Thankx

Answer:

Hello Nuno, Thanks for your query. Yes, you can do the course from Portugal. As the course is online. Many thanks and Regards, Help Desk

This was helpful. Thank you for your feedback.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.