搜索
Google IT Support Professional Certificate (Coursera)
磁力链接/BT种子名称
Google IT Support Professional Certificate (Coursera)
磁力链接/BT种子简介
种子哈希:
03da21d46ab39b4700068268149ba5c833588891
文件大小:
2.54G
已经下载:
1436
次
下载速度:
极快
收录时间:
2021-03-14
最近下载:
2024-12-03
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:03DA21D46AB39B4700068268149BA5C833588891
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
attack on titan
toy.story.2.1999
二货虎豹骑
uncensored美女
あきのそら
战女狼
新奴兔兔之少女劳改屋
初中妹
婷姐
巨乳肥臀
个人云盘泄密可爱的幼师小美女和男友啪啪啪视频被曝光
2024 mkv ita
italian
有力的行动
浴室对话
juq-9810
尤妮丝+蝴蝶
周晓琳
heydouga 4037 355
jack the giant slayer
roxy
法国模特
ghmt-06
[babes]+siterip
暑假作业
熟女探花双飞
03年他骂我了
前后怼
nhvr-153
포터남 계단 11층 검은후드 원본
文件列表
1 - Technical Support Fundamentals/07 - Starting It Up/03 - Putting it All Together.mp4
51.0 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/09 - Group Policy Troubleshooting.mp4
26.6 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/02 - Multifactor Authentication.mp4
24.7 MB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/02 - Let's Get Rid of WEP! WPA-WPA2.mp4
22.8 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/07 - Group Policy Creation and Editing.mp4
21.7 MB
1 - Technical Support Fundamentals/02 - History of Computing/02 - The Path to Modern Computers.mp4
20.3 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/03 - Managing Active Directory Users and Groups.mp4
19.7 MB
1 - Technical Support Fundamentals/16 - Customer Service/03 - How to Deal with Difficult Situations.mp4
18.5 MB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/03 - Symmetric Encryption Algorithms.mp4
17.3 MB
1 - Technical Support Fundamentals/16 - Customer Service/01 - Intro to Soft Skills.mp4
15.6 MB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/01 - Public Key Infrastructure.mp4
14.9 MB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/01 - Security Goals.mp4
14.8 MB
1 - Technical Support Fundamentals/05 - The Modern Computer/03 - Programs and Hardware.mp4
14.3 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/06 - Kerberos.mp4
13.9 MB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/02 - Cryptography in Action.mp4
13.7 MB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/01 - Cryptography.mp4
13.5 MB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/01 - Network Hardening Best Practices.mp4
13.5 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/08 - Group Policy Inheritance and Precedence.mp4
12.8 MB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/01 - Resource Record Types.mp4
12.8 MB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/04 - Cryptographic Hardware.mp4
12.6 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/04 - Logging and Auditing.mp4
12.5 MB
4 - System Administration and IT Infrastructure Services/23 - Disaster Recovery Plans/02 - Designing a Disaster Recovery Plan.mp4
12.5 MB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/01 - Incident Reporting and Analysis.mp4
12.4 MB
1 - Technical Support Fundamentals/16 - Customer Service/02 - Anatomy of an Interaction.mp4
12.4 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/05 - Antimalware Protection.mp4
12.4 MB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/01 - WEP Encryption and Why You Shouldn't Use It.mp4
12.3 MB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/02 - Network Hardware Hardening.mp4
12.2 MB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/02 - Incident Response and Recovery.mp4
12.1 MB
1 - Technical Support Fundamentals/02 - History of Computing/01 - From Abacus to Analytical Engine.mp4
11.9 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/01 - What is Active Directory.mp4
11.6 MB
1 - Technical Support Fundamentals/10 - What is Networking/02 - Basics of Networking.mp4
11.6 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/06 - Types of Backup.mp4
11.6 MB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/01 - IPv6 Addressing and Subnetting.mp4
11.6 MB
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/02 - Linux - Package Manager Apt.mp4
11.5 MB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/04 - Interview Role Play - Operating Systems.mp4
11.4 MB
4 - System Administration and IT Infrastructure Services/10 - Configuring Network Services/02 - Configuring DHCP with Dnsmasq.mp4
11.4 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/01 - Authentication Best Practices.mp4
11.3 MB
5 - IT Security - Defense against the digital dark arts/16 - Application Hardening/01 - Software Patch Management.mp4
11.1 MB
5 - IT Security - Defense against the digital dark arts/18 - Users/01 - User Habits.mp4
10.9 MB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/02 - Access Control.mp4
10.6 MB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/02 - The Many Steps of Name Resolution.mp4
10.6 MB
5 - IT Security - Defense against the digital dark arts/01 - Introduction to IT Security/01 - Course Introduction.mp4
10.5 MB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/02 - Hashing Algorithms.mp4
10.5 MB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/03 - Types of IT Infrastructure Services.mp4
10.5 MB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/03 - Intrusion Detection-Prevention Systems.mp4
10.5 MB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/01 - Program Introduction.mp4
10.3 MB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/03 - Hashing Algorithms (continued).mp4
10.3 MB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/03 - All the Layers Working in Unison.mp4
10.3 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/06 - Disk Encryption.mp4
10.2 MB
1 - Technical Support Fundamentals/05 - The Modern Computer/02 - Introduction to Computer Hardware.mp4
10.0 MB
3 - Operating Systems and You - Becoming a Power User/01 - Introduction to Operating Systems and Becoming a Power User/01 - Course Introduction.mp4
10.0 MB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/01 - Ethernet and MAC Addresses.mp4
10.0 MB
4 - System Administration and IT Infrastructure Services/01 - Introduction to System Administration and IT Infrastructure Services/01 - Course Introduction.mp4
9.8 MB
2 - The Bits and Bytes of Computer Networking/01 - Introduction to Computer Networking/01 - Course Introduction.mp4
9.8 MB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/04 - Interview Role Play - Networking.mp4
9.7 MB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/02 - Wireshark and tcpdump.mp4
9.7 MB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/03 - Securing Network Traffic.mp4
9.7 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/04 - Components of an Operating System.mp4
9.6 MB
2 - The Bits and Bytes of Computer Networking/09 - Routing/01 - Basic Routing Concepts.mp4
9.6 MB
4 - System Administration and IT Infrastructure Services/23 - Disaster Recovery Plans/01 - What's a Disaster Recovery Plan.mp4
9.6 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/07 - Windows - Package Dependencies.mp4
9.5 MB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/02 - Subnet Masks.mp4
9.5 MB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/03 - Basic Binary Math.mp4
9.5 MB
1 - Technical Support Fundamentals/11 - Limitations of the Internet/01 - History of the Internet.mp4
9.4 MB
4 - System Administration and IT Infrastructure Services/18 - Centralized Management/01 - What is centralized management.mp4
9.4 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/09 - Windows - Input, Output, and the Pipeline.mp4
9.3 MB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/01 - What is The Cloud.mp4
9.3 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/02 - Windows - Software Packages.mp4
9.2 MB
4 - System Administration and IT Infrastructure Services/10 - Configuring Network Services/01 - Configuring DNS with Dnsmasq.mp4
9.1 MB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/02 - Symmetric Cryptography.mp4
9.1 MB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/06 - Inteview Role Play - Security.mp4
9.0 MB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/03 - Linux Logs.mp4
8.9 MB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/02 - Measuring and Assessing Risk.mp4
8.9 MB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/02 - What is IT.mp4
8.8 MB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/02 - Linux - Devices and Drivers.mp4
8.8 MB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/03 - Malicious Software.mp4
8.8 MB
1 - Technical Support Fundamentals/06 - Components/01 - CPU.mp4
8.7 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/04 - Linux - List Directories.mp4
8.7 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/04 - Managing Active Directory User Passwords.mp4
8.6 MB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/03 - Windows - Modifying Permissions.mp4
8.5 MB
1 - Technical Support Fundamentals/11 - Limitations of the Internet/02 - Limitations of the Internet.mp4
8.5 MB
1 - Technical Support Fundamentals/12 - Impact of the Internet/04 - Privacy and Security.mp4
8.2 MB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/01 - Introduction to Wireless Networking Technologies.mp4
8.1 MB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/01 - Sniffing the Network.mp4
8.1 MB
1 - Technical Support Fundamentals/12 - Impact of the Internet/01 - Impact.mp4
8.0 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/03 - Certificates.mp4
8.0 MB
4 - System Administration and IT Infrastructure Services/11 - Software Services/05 - Configuring Security Services.mp4
8.0 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/19 - Learner Story - Chelsea.mp4
8.0 MB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/02 - Servers Revisited.mp4
8.0 MB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/01 - Ping - Internet Control Message Protocol.mp4
8.0 MB
5 - IT Security - Defense against the digital dark arts/18 - Users/02 - Third-Party Security.mp4
7.9 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/06 - Linux - Disk Partitioning and Formatting a Filesystem.mp4
7.9 MB
1 - Technical Support Fundamentals/06 - Components/03 - Motherboards.mp4
7.9 MB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/03 - IP Datagrams and Encapsulation.mp4
7.9 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/02 - Remote Connection and SSH.mp4
7.9 MB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/02 - Remote Connection and SSH.mp4
7.9 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/06 - What is Group Policy.mp4
7.8 MB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/05 - Connection-oriented and Connectionless Protocols.mp4
7.8 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/03 - User and Hardware Provisioning.mp4
7.8 MB
1 - Technical Support Fundamentals/06 - Components/04 - Storage.mp4
7.8 MB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/01 - With Great Power Comes Great Responsibility.mp4
7.8 MB
4 - System Administration and IT Infrastructure Services/11 - Software Services/03 - Configuring Email Services.mp4
7.8 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/02 - Disabling Unnecessary Components.mp4
7.8 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/06 - Windows - Searching within Files.mp4
7.7 MB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/03 - The Cloud.mp4
7.7 MB
4 - System Administration and IT Infrastructure Services/12 - File Services/02 - Network File Storage.mp4
7.7 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/10 - Windows - Files.mp4
7.6 MB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/02 - Writing a Post-Mortem.mp4
7.5 MB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/03 - DNS and UDP.mp4
7.5 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/02 - Ask Questions!.mp4
7.4 MB
2 - The Bits and Bytes of Computer Networking/20 - POTS and Dial-up/02 - Dial-up, Modems, and Point-to-Point Protocols.mp4
7.4 MB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/04 - Working with Logs.mp4
7.4 MB
2 - The Bits and Bytes of Computer Networking/09 - Routing/03 - Interior Gateway Protocols.mp4
7.4 MB
2 - The Bits and Bytes of Computer Networking/16 - Dynamic Host Configuration Protocol/01 - Overview of DHCP.mp4
7.4 MB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/03 - Network Software Hardening.mp4
7.4 MB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/04 - Configuring Services in Linux.mp4
7.4 MB
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/01 - Windows - Package Manager.mp4
7.4 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/07 - Windows - Adding and Removing Users.mp4
7.3 MB
1 - Technical Support Fundamentals/07 - Starting It Up/01 - BIOS.mp4
7.3 MB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/03 - TCP Control Flags and the Three-way Handshake.mp4
7.2 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/04 - LDAP.mp4
7.2 MB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/03 - Privacy Policy.mp4
7.1 MB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/02 - What is a directory server.mp4
7.1 MB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/03 - Remote Access Revisited.mp4
7.1 MB
1 - Technical Support Fundamentals/06 - Components/05 - Power Supplies.mp4
7.1 MB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/01 - Windows - File Permissions.mp4
7.0 MB
2 - The Bits and Bytes of Computer Networking/16 - Dynamic Host Configuration Protocol/02 - DHCP in Action.mp4
7.0 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/05 - Windows - Passwords.mp4
7.0 MB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/02 - Essential Security Terms.mp4
6.9 MB
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/01 - The TCPIP Five-Layer Network Model.mp4
6.9 MB
4 - System Administration and IT Infrastructure Services/14 - Platform Services/01 - Web Servers Revisited.mp4
6.9 MB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/03 - Dissecting an Ethernet Frame.mp4
6.9 MB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/02 - Managing Services in Linux.mp4
6.9 MB
5 - IT Security - Defense against the digital dark arts/16 - Application Hardening/02 - Application Policies.mp4
6.9 MB
1 - Technical Support Fundamentals/13 - Introduction to Software/05 - Recipe for Computing.mp4
6.8 MB
4 - System Administration and IT Infrastructure Services/11 - Software Services/02 - Configuring Communication Services.mp4
6.7 MB
5 - IT Security - Defense against the digital dark arts/18 - Users/03 - Security Training.mp4
6.7 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/04 - Windows - Disk Partitioning and Formatting a Filesystem.mp4
6.7 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/04 - Installing Linux.mp4
6.7 MB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/01 - Why do we need DNS.mp4
6.7 MB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/06 - Linux - SetUID, SetGID, Sticky Bit.mp4
6.6 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/08 - Single Sign-On.mp4
6.6 MB
1 - Technical Support Fundamentals/13 - Introduction to Software/03 - Types of Software.mp4
6.6 MB
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/02 - Managing OpenLDAP.mp4
6.6 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/14 - Windows - Filesystem Repair.mp4
6.6 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/02 - List Directories in a GUI.mp4
6.5 MB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/06 - Interview Role Play - Customer Service.mp4
6.5 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/03 - Host-Based Firewall.mp4
6.5 MB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02 - Standing Out from the Crowd.mp4
6.5 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/02 - Managing Active Directory.mp4
6.5 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/06 - Linux - Managing Processes.mp4
6.5 MB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/03 - Interview Role Play - Sys Admin.mp4
6.5 MB
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/01 - Network Attacks.mp4
6.5 MB
1 - Technical Support Fundamentals/06 - Components/08 - Peripherals.mp4
6.5 MB
2 - The Bits and Bytes of Computer Networking/18 - VPNs and Proxies/02 - Proxy Services.mp4
6.4 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/04 - Linux - Users, Superuser and Beyond.mp4
6.4 MB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/04 - Learner Story - Daniel.mp4
6.4 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/06 - Troubleshooting and Managing Issues.mp4
6.4 MB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/02 - Public DNS Servers.mp4
6.3 MB
1 - Technical Support Fundamentals/06 - Components/07 - Batteries and Charging Systems.mp4
6.3 MB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/03 - Digital Subscriber Lines.mp4
6.3 MB
1 - Technical Support Fundamentals/10 - What is Networking/03 - Networking Hardware.mp4
6.3 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/04 - Backup Solutions.mp4
6.2 MB
2 - The Bits and Bytes of Computer Networking/18 - VPNs and Proxies/01 - Virtual Private Networks.mp4
6.2 MB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/03 - DNS Zones.mp4
6.2 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/05 - Files and File Systems.mp4
6.2 MB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/04 - CIDR.mp4
6.2 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/07 - Mobile App Management.mp4
6.2 MB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/02 - Dissection of a TCP Segment.mp4
6.2 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/02 - Linux - Reading Process Information.mp4
6.2 MB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/04 - Cable Broadband.mp4
6.2 MB
4 - System Administration and IT Infrastructure Services/15 - Troubleshooting Platform Services/01 - Is the website down.mp4
6.2 MB
4 - System Administration and IT Infrastructure Services/13 - Print Services/01 - Configuring Print Services.mp4
6.2 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/02 - What is Data Recovery.mp4
6.2 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/03 - Isolating the Problem.mp4
6.1 MB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/02 - Virtualization.mp4
6.1 MB
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/01 - Windows - Underneath the Hood.mp4
6.1 MB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/03 - Wireless Channels.mp4
6.1 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/05 - Joining an Active Directory Domain.mp4
6.1 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/06 - DNS for Internal Networks.mp4
6.0 MB
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/01 - What is OpenLDAP.mp4
6.0 MB
1 - Technical Support Fundamentals/10 - What is Networking/05 - The Web.mp4
6.0 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/04 - Follow the Cookie Crumbs.mp4
6.0 MB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/04 - Hosts Files.mp4
5.9 MB
1 - Technical Support Fundamentals/10 - What is Networking/01 - Module Introduction.mp4
5.9 MB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/03 - NAT, Non-Routable Address Space and the Limits of IPv4.mp4
5.9 MB
1 - Technical Support Fundamentals/14 - Interacting with Software/01 - Managing Software.mp4
5.9 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/05 - Windows - Managing Processes.mp4
5.8 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/03 - Windows - List Directories in CLI.mp4
5.8 MB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/06 - Mobile Device Networks.mp4
5.8 MB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/03 - Deceptive Attacks.mp4
5.8 MB
2 - The Bits and Bytes of Computer Networking/09 - Routing/05 - Non-Routable Address Space.mp4
5.8 MB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/03 - Mobile Security and Privacy.mp4
5.8 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/01 - Choosing an Operating System.mp4
5.8 MB
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/02 - Linux - Resource Monitoring.mp4
5.8 MB
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/01 - Windows - Resource Monitoring.mp4
5.8 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/02 - Windows - View User and Group Information.mp4
5.7 MB
4 - System Administration and IT Infrastructure Services/08 - Troubleshooting Network Services/01 - Unable to Resolve a Hostname or Domain Name.mp4
5.7 MB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/02 - The Windows Event Viewer.mp4
5.7 MB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/01 - Cloud Concepts.mp4
5.7 MB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/04 - Linux - Modifying Permissions.mp4
5.7 MB
5 - IT Security - Defense against the digital dark arts/11 - Accounting/01 - Tracking Usage and Access.mp4
5.7 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/03 - Remote Connections on Windows.mp4
5.7 MB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/03 - Remote Connections on Windows.mp4
5.7 MB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/04 - Linux - Operating System Updates.mp4
5.7 MB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/01 - The Transport Layer.mp4
5.7 MB
2 - The Bits and Bytes of Computer Networking/09 - Routing/02 - Routing Tables.mp4
5.7 MB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/01 - Cables.mp4
5.6 MB
4 - System Administration and IT Infrastructure Services/19 - LDAP/02 - What is LDAP Authentication.mp4
5.6 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/12 - Windows - Copying Files & Directories.mp4
5.6 MB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/01 - Hashing.mp4
5.6 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/09 - Interacting with the OS - User Space.mp4
5.6 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/01 - FTP, SFTP, and TFTP.mp4
5.6 MB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/03 - Window - Operating System Updates.mp4
5.5 MB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/03 - IPv6 and IPv4 Harmony.mp4
5.5 MB
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/02 - Denial-of-Service.mp4
5.5 MB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/01 - Basics of NAT.mp4
5.5 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/16 - Windows - Removing Files & Directories.mp4
5.5 MB
1 - Technical Support Fundamentals/06 - Components/06 - Mobile Devices.mp4
5.5 MB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/01 - What's a post-mortem.mp4
5.4 MB
1 - Technical Support Fundamentals/06 - Components/02 - RAM.mp4
5.4 MB
1 - Technical Support Fundamentals/13 - Introduction to Software/02 - What is Software.mp4
5.4 MB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/03 - Getting Ready for the Interview.mp4
5.4 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/05 - What is Chrome OS.mp4
5.4 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/03 - Backing Up Your Data.mp4
5.3 MB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/05 - Remote Connection File Transfer on Windows.mp4
5.3 MB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/01 - What is broadband.mp4
5.3 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/03 - Installing Windows.mp4
5.3 MB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/02 - Operating Systems Deployment Methods.mp4
5.3 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/12 - Windows - Disk Usage.mp4
5.3 MB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/03 - Implementing Directory Services.mp4
5.3 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/01 - Organizational Policies.mp4
5.3 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/09 - Mobile Users and Accounts.mp4
5.2 MB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/03 - Windows - Process Creation and Termination.mp4
5.2 MB
2 - The Bits and Bytes of Computer Networking/09 - Routing/04 - Exterior Gateway Protocols.mp4
5.2 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/04 - Mobile App Packages.mp4
5.2 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/06 - Installing Mac OS X.mp4
5.2 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/10 - Linux - Input, Output and Pipeline.mp4
5.2 MB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/02 - Never Test in Production.mp4
5.2 MB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/03 - When and How to Choose Cloud.mp4
5.2 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/01 - Windows - Display File Contents.mp4
5.2 MB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/05 - Windows - Special Permissions.mp4
5.2 MB
1 - Technical Support Fundamentals/13 - Introduction to Software/01 - Module Introduction.mp4
5.2 MB
4 - System Administration and IT Infrastructure Services/12 - File Services/03 - Mobile Synchronization.mp4
5.1 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/06 - Windows - Changing Directories in the CLI.mp4
5.1 MB
4 - System Administration and IT Infrastructure Services/25 - Final Project/01 - Final Project Introduction.mp4
5.1 MB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/02 - Everything as a Service.mp4
5.1 MB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/02 - Computer Architecture Overview.mp4
5.0 MB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/04 - What to Expect During the Technical Interview.mp4
5.0 MB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/01 - What is Systems Administration.mp4
4.9 MB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/02 - NAT and the Transport Layer.mp4
4.9 MB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/05 - Configuring Services in Windows.mp4
4.9 MB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/03 - DNS Registration and Expiration.mp4
4.9 MB
1 - Technical Support Fundamentals/19 - Course Wrap Up/01 - Course Wrap Up.mp4
4.9 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/01 - Module Introduction.mp4
4.8 MB
1 - Technical Support Fundamentals/05 - The Modern Computer/01 - Module Introduction.mp4
4.8 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/01 - Users, Administrators, and Groups, Oh My!.mp4
4.8 MB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/03 - Cloud Storage.mp4
4.8 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/01 - Windows - Reading Process Information.mp4
4.8 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/08 - Windows - Swap.mp4
4.7 MB
2 - The Bits and Bytes of Computer Networking/22 - WANs/01 - Wide Area Network Technologies.mp4
4.7 MB
1 - Technical Support Fundamentals/03 - Digital Logic/02 - Character Encoding.mp4
4.7 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/05 - Windows - Archives.mp4
4.7 MB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/02 - Anatomy of a Domain Name.mp4
4.6 MB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/03 - Wireless Hardening.mp4
4.6 MB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/03 - What does an IT Support Specialist do.mp4
4.6 MB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/04 - TCP Socket States.mp4
4.6 MB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/04 - Wireless Security.mp4
4.6 MB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/01 - Windows - Devices and Drivers.mp4
4.6 MB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/01 - The Application Layer.mp4
4.6 MB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/02 - Traceroute.mp4
4.5 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/07 - Linux - Mounting and Unmounting a Filesystem.mp4
4.5 MB
3 - Operating Systems and You - Becoming a Power User/15 - Virtualization/01 - Virtual Machines.mp4
4.5 MB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/03 - Mobile Device Resetting and Imaging.mp4
4.5 MB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/04 - IP Address Classes.mp4
4.5 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/03 - Linux - Software Packages.mp4
4.5 MB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/04 - Malware Continued.mp4
4.5 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/03 - Windows - View User and Group Information using CLI.mp4
4.5 MB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/04 - Fixing Things the Right Way.mp4
4.4 MB
4 - System Administration and IT Infrastructure Services/11 - Software Services/04 - Configuring User Productivity Services.mp4
4.4 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/05 - Windows Powershell.mp4
4.4 MB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/01 - The CIA Triad.mp4
4.4 MB
1 - Technical Support Fundamentals/03 - Digital Logic/04 - How to Count in Binary.mp4
4.4 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/07 - Tri Ngo Obstacles & How to be successful in IT.mp4
4.4 MB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/03 - Testing Port Connectivity.mp4
4.4 MB
1 - Technical Support Fundamentals/03 - Digital Logic/01 - Computer Language.mp4
4.3 MB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/05 - Fiber Connections.mp4
4.3 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/02 - NTP.mp4
4.3 MB
1 - Technical Support Fundamentals/03 - Digital Logic/03 - Binary.mp4
4.2 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/05 - Start with the Quickest Step First.mp4
4.2 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/07 - DHCP.mp4
4.2 MB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/02 - T-Carrier Technologies.mp4
4.2 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/03 - Disk Anatomy.mp4
4.1 MB
1 - Technical Support Fundamentals/17 - Documentation/01 - Ticketing Systems and Documenting Your Work.mp4
4.1 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/06 - Process Management.mp4
4.1 MB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/04 - Course Introduction.mp4
4.1 MB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/02 - Programs vs Processes Revisited.mp4
4.1 MB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/03 - Assessing Risk.mp4
4.1 MB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/01 - Course Wrap Up.mp4
4.0 MB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/01 - What do Services Look Like in Action.mp4
4.0 MB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/02 - Password Attacks.mp4
4.0 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/08 - Dion Michelle Obama Story.mp4
4.0 MB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/03 - Managing Services in Windows.mp4
4.0 MB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/02 - Wireless Network Configurations.mp4
3.9 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/05 - Testing Backups.mp4
3.9 MB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/05 - Jess Passions.mp4
3.8 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/18 - Cindy Why OS is Important.mp4
3.8 MB
1 - Technical Support Fundamentals/14 - Interacting with Software/02 - Installing, Updating, and Removing Software on Windows.mp4
3.8 MB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/04 - Sergio IT Great Field.mp4
3.8 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/10 - Logs.mp4
3.8 MB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/01 - Client-Side Attacks.mp4
3.7 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/01 - Module Introduction.mp4
3.7 MB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/01 - Name Resolution Tools.mp4
3.7 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/01 - Lesson Overview & Practice Tips.mp4
3.7 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/03 - Network Support Services Revisited.mp4
3.7 MB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/02 - IP Addresses.mp4
3.7 MB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/03 - Network Ports and Patch Panels.mp4
3.7 MB
5 - IT Security - Defense against the digital dark arts/18 - Users/04 - Alex Grit Story.mp4
3.6 MB
4 - System Administration and IT Infrastructure Services/14 - Platform Services/02 - What is a database server.mp4
3.6 MB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/05 - Showing Your Best Self During the Interview.mp4
3.6 MB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/01 - Your Opportunity for Success.mp4
3.6 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/02 - Linux - Display File Contents.mp4
3.6 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/05 - Vendors.mp4
3.6 MB
2 - The Bits and Bytes of Computer Networking/24 - Introduction to Troubleshooting and the Future of Networking/01 - Introduction to Troubleshooting and the Future of Networking.mp4
3.5 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/02 - Virtual Machines.mp4
3.5 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/05 - RADIUS.mp4
3.5 MB
1 - Technical Support Fundamentals/12 - Impact of the Internet/02 - Internet of Things.mp4
3.5 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/02 - Review of Filesystems.mp4
3.5 MB
5 - IT Security - Defense against the digital dark arts/11 - Accounting/02 - Rob Important Skills in Security.mp4
3.5 MB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/02 - Hubs and Switches.mp4
3.5 MB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/02 - Typical Cloud Infrastructure Setups.mp4
3.4 MB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/01 - Subnetting.mp4
3.4 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/10 - Windows - Command History.mp4
3.4 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/13 - Cindy Drive & Career Path.mp4
3.4 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/11 - The Boot Process.mp4
3.4 MB
1 - Technical Support Fundamentals/10 - What is Networking/04 - Language of the Internet.mp4
3.3 MB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/01 - Moving Bits Across the Wire.mp4
3.3 MB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/01 - Abstraction.mp4
3.3 MB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/02 - The Application Layer and the OSI Model.mp4
3.3 MB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/04 - Servers and Clients.mp4
3.3 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/04 - DNS.mp4
3.3 MB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/05 - Ari Interview.mp4
3.3 MB
1 - Technical Support Fundamentals/07 - Starting It Up/04 - Mobile Device Repair.mp4
3.3 MB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/06 - Sergio Path.mp4
3.3 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/11 - Linux - Files.mp4
3.3 MB
1 - Technical Support Fundamentals/17 - Documentation/02 - Process Documentation.mp4
3.3 MB
1 - Technical Support Fundamentals/12 - Impact of the Internet/05 - Heather Adkins Keeping Hackers Out.mp4
3.3 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/07 - Memory Management.mp4
3.2 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/13 - Linux - Disk Usage.mp4
3.2 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/07 - User Backups.mp4
3.2 MB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/05 - Sergio Being A Network Engineer.mp4
3.2 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/06 - Troubleshooting Pitfalls to Avoid.mp4
3.2 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/08 - Linux - Package Dependencies.mp4
3.2 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/08 - IO Management.mp4
3.1 MB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/06 - Firewalls.mp4
3.1 MB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/02 - IPv6 Headers.mp4
3.1 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/09 - Rob Path to IT.mp4
3.1 MB
2 - The Bits and Bytes of Computer Networking/09 - Routing/06 - Alex Good Story.mp4
3.1 MB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/03 - Routers.mp4
3.0 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/08 - Windows - Make Directories in the GUI & CLI.mp4
3.0 MB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/07 - TACACS+.mp4
3.0 MB
2 - The Bits and Bytes of Computer Networking/22 - WANs/02 - Point-to-Point VPNs.mp4
3.0 MB
1 - Technical Support Fundamentals/14 - Interacting with Software/04 - Software Automation.mp4
3.0 MB
4 - System Administration and IT Infrastructure Services/19 - LDAP/01 - What is LDAP.mp4
2.9 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/10 - Ben Life as a CIO.mp4
2.9 MB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/01 - Authorization and Access Control Methods.mp4
2.9 MB
4 - System Administration and IT Infrastructure Services/07 - Network Services/05 - DNS for Web Servers.mp4
2.9 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/03 - Windows - Modifying Text Files.mp4
2.9 MB
2 - The Bits and Bytes of Computer Networking/13 - Introduction to Network Services/01 - Introduction to Network Services.mp4
2.9 MB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/02 - Alex Career Path.mp4
2.9 MB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/05 - Address Resolution Protocol.mp4
2.8 MB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/04 - Victor Escobedo - Practical Experience in IT.mp4
2.8 MB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/04 - Rob What a Security Engineer Does.mp4
2.8 MB
4 - System Administration and IT Infrastructure Services/12 - File Services/01 - What are file services.mp4
2.8 MB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/05 - Cellular Networking.mp4
2.8 MB
1 - Technical Support Fundamentals/08 - What's an Operating System/12 - Mobile Operating Systems.mp4
2.8 MB
1 - Technical Support Fundamentals/10 - What is Networking/06 - Victor First Job.mp4
2.8 MB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/01 - Course Wrap Up.mp4
2.7 MB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/02 - Heather Early Career Advice.mp4
2.7 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/16 - Ben Passion.mp4
2.7 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/14 - Windows - Moving and Renaming Files, Directories.mp4
2.7 MB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/03 - Access Control List.mp4
2.7 MB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/05 - Heather First Tech Job.mp4
2.7 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/12 - Ben First Tech Job.mp4
2.7 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/07 - In Case of Fire, Break Glass.mp4
2.6 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/11 - Windows and Linux Advanced Navigation.mp4
2.6 MB
1 - Technical Support Fundamentals/19 - Course Wrap Up/02 - Sabrina No Degree.mp4
2.6 MB
1 - Technical Support Fundamentals/13 - Introduction to Software/06 - Phelan Navy.mp4
2.6 MB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/04 - Amir Interview.mp4
2.6 MB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/01 - System Monitoring.mp4
2.6 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/09 - Linux - Swap.mp4
2.6 MB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/02 - Linux - File Permissions.mp4
2.6 MB
1 - Technical Support Fundamentals/09 - Installing an Operating System/08 - Introduction to Qwiklabs.mp4
2.6 MB
1 - Technical Support Fundamentals/14 - Interacting with Software/03 - Installing, Updating, and Removing Software on Linux.mp4
2.5 MB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/10 - Mobile Device Management (MDM).mp4
2.5 MB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/04 - How do Qwiklabs Work.mp4
2.5 MB
4 - System Administration and IT Infrastructure Services/11 - Software Services/06 - Heather Managing Self Doubt.mp4
2.5 MB
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/02 - Linux - Underneath the Hood.mp4
2.5 MB
2 - The Bits and Bytes of Computer Networking/19 - Introduction to Connecting to the Internet/01 - Introduction to Connecting to the Internet.mp4
2.5 MB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/03 - Kevin Advice.mp4
2.5 MB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/02 - Unicast, Multicast, and Broadcast.mp4
2.5 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/03 - Windows - Signals.mp4
2.4 MB
1 - Technical Support Fundamentals/12 - Impact of the Internet/03 - Gian What he does in Android Security.mp4
2.4 MB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/02 - Twisted Pair Cabling and Duplexing.mp4
2.4 MB
1 - Technical Support Fundamentals/02 - History of Computing/03 - Kevin Career.mp4
2.4 MB
4 - System Administration and IT Infrastructure Services/25 - Final Project/02 - Alex passion & success.mp4
2.4 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/02 - IT Infrastructure Services.mp4
2.4 MB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/02 - The Role of IT Infrastructure Services in SysAdmin.mp4
2.3 MB
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/02 - Alex Why Networking.mp4
2.3 MB
4 - System Administration and IT Infrastructure Services/11 - Software Services/01 - Module Introduction.mp4
2.3 MB
1 - Technical Support Fundamentals/05 - The Modern Computer/04 - Joe Diversity.mp4
2.3 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/13 - Linux - Copying Files and Directories.mp4
2.3 MB
1 - Technical Support Fundamentals/17 - Documentation/03 - Documenting in Ticketing Systems.mp4
2.3 MB
1 - Technical Support Fundamentals/07 - Starting It Up/02 - Ben's Advice.mp4
2.3 MB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/04 - Routine Maintenance.mp4
2.3 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/07 - Heather Self Learning.mp4
2.3 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/15 - Linux - Filesystem Repair.mp4
2.3 MB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/07 - Amir Attributes.mp4
2.2 MB
1 - Technical Support Fundamentals/13 - Introduction to Software/04 - Revisiting Abstraction.mp4
2.2 MB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/01 - Server Operating Systems.mp4
2.2 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/07 - Linux - Changing Directories in Bash.mp4
2.1 MB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/01 - Intro to Defense in Depth.mp4
2.1 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/04 - Linux - Modifying Text Files.mp4
2.1 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/06 - Linux - Archives.mp4
2.1 MB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/01 - The Network Layer.mp4
2.1 MB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/04 - Heather Social Engineering.mp4
2.1 MB
2 - The Bits and Bytes of Computer Networking/10 - Introduction to the Transport and Application Layers/01 - Introduction to the Transport and Application Layers.mp4
2.1 MB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/01 - What are IT Infrastructure Services.mp4
2.0 MB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/04 - Remote Connection File Transfer.mp4
2.0 MB
4 - System Administration and IT Infrastructure Services/19 - LDAP/03 - Heather Overcoming Obstacles.mp4
2.0 MB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/04 - Linux - Process Creation and Termination.mp4
2.0 MB
2 - The Bits and Bytes of Computer Networking/06 - Introduction/01 - Introduction to The Network Layer.mp4
1.9 MB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/01 - Congratulations!.mp4
1.8 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/17 - Linux - Removing Files & Directories.mp4
1.8 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/09 - Linux - Make Directories in Bash.mp4
1.8 MB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/01 - Module Introduction.mp4
1.8 MB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/04 - Joe Personal Obstacle.mp4
1.7 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/05 - Windows - Changing Directories in the GUI.mp4
1.7 MB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/01 - Module Introduction.mp4
1.7 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/06 - Linux - Passwords.mp4
1.7 MB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/01 - Imaging Software.mp4
1.6 MB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/15 - Linux - Moving and Renaming Files, Directories.mp4
1.5 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/07 - Windows - Searching within Directories.mp4
1.5 MB
1 - Technical Support Fundamentals/12 - Impact of the Internet/06 - Learner Story - Melinda.mp4
1.5 MB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/04 - Linux - Signals.mp4
1.5 MB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/01 - Module Introduction.mp4
1.4 MB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/01 - Introduction.mp4
1.4 MB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/08 - Linux - Searching within Files.mp4
1.4 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/01 - Module Introduction.mp4
1.4 MB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/05 - Windows - Mounting and Unmounting a Filesystem.mp4
1.2 MB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/01 - Module Introduction.mp4
1.2 MB
5 - IT Security - Defense against the digital dark arts/20 - Graded Assessments/01 - Final Assessment.mp4
1.1 MB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/08 - Linux - Adding and Removing Users.mp4
911.0 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/11 - Linux - Command History.mp4
874.9 kB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/03 - Congratulations!.mp4
681.2 kB
4 - System Administration and IT Infrastructure Services/26 - Course Wrap Up/01 - Congratulations!.mp4
492.2 kB
1 - Technical Support Fundamentals/19 - Course Wrap Up/03 - Congratulations!.mp4
438.3 kB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/03 - Congratulations!.mp4
321.7 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02a - Resume Example 3.pdf
74.5 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/Resume Example 3.pdf
74.5 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02a - Resume Example 1.pdf
68.9 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/Resume Example 1.pdf
68.9 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02a - Resume Example 2.pdf
64.7 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/Resume Example 2.pdf
64.7 kB
1 - Technical Support Fundamentals/07 - Starting It Up/03 - Putting it All Together.vtt
24.2 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/09 - Group Policy Troubleshooting.vtt
20.8 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/07 - Group Policy Creation and Editing.vtt
20.7 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/02 - Multifactor Authentication.vtt
19.7 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/02 - Let's Get Rid of WEP! WPA-WPA2.vtt
19.5 kB
1 - Technical Support Fundamentals/02 - History of Computing/02 - The Path to Modern Computers.vtt
18.4 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/03 - Managing Active Directory Users and Groups.vtt
18.2 kB
1 - Technical Support Fundamentals/16 - Customer Service/03 - How to Deal with Difficult Situations.vtt
15.5 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/03 - All the Layers Working in Unison.vtt
14.8 kB
1 - Technical Support Fundamentals/07 - Starting It Up/03 - Putting it All Together.txt
14.6 kB
1 - Technical Support Fundamentals/16 - Customer Service/01 - Intro to Soft Skills.vtt
14.3 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/01 - Network Hardening Best Practices.vtt
13.8 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/03 - Symmetric Encryption Algorithms.vtt
13.6 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/01 - Public Key Infrastructure.vtt
13.6 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/03 - Programs and Hardware.vtt
12.8 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/09 - Group Policy Troubleshooting.txt
12.8 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/02 - Network Hardware Hardening.vtt
12.7 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/08 - Group Policy Inheritance and Precedence.vtt
12.6 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/07 - Group Policy Creation and Editing.txt
12.6 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/02 - Cryptography in Action.vtt
12.6 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/02 - The Many Steps of Name Resolution.vtt
12.4 kB
1 - Technical Support Fundamentals/10 - What is Networking/02 - Basics of Networking.vtt
12.3 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/01 - WEP Encryption and Why You Shouldn't Use It.vtt
12.2 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/02 - Let's Get Rid of WEP! WPA-WPA2.txt
12.2 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/01 - Cryptography.vtt
12.1 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/02 - Multifactor Authentication.txt
12.1 kB
1 - Technical Support Fundamentals/16 - Customer Service/02 - Anatomy of an Interaction.vtt
11.8 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/05 - Antimalware Protection.vtt
11.5 kB
1 - Technical Support Fundamentals/02 - History of Computing/02 - The Path to Modern Computers.txt
11.5 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/04 - Logging and Auditing.vtt
11.2 kB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/01 - Security Goals.vtt
11.1 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/03 - Managing Active Directory Users and Groups.txt
10.9 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/06 - Kerberos.vtt
10.9 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/04 - Components of an Operating System.vtt
10.8 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/01 - Incident Reporting and Analysis.vtt
10.8 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/01 - Basic Routing Concepts.vtt
10.6 kB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/01 - Resource Record Types.vtt
10.4 kB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/03 - Intrusion Detection-Prevention Systems.vtt
10.4 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/04 - Cryptographic Hardware.vtt
10.4 kB
3 - Operating Systems and You - Becoming a Power User/01 - Introduction to Operating Systems and Becoming a Power User/01 - Course Introduction.vtt
10.2 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/03 - Types of IT Infrastructure Services.vtt
10.1 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/01 - Authentication Best Practices.vtt
10.1 kB
4 - System Administration and IT Infrastructure Services/10 - Configuring Network Services/02 - Configuring DHCP with Dnsmasq.vtt
10.0 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/02 - Remote Connection and SSH.vtt
10.0 kB
4 - System Administration and IT Infrastructure Services/23 - Disaster Recovery Plans/02 - Designing a Disaster Recovery Plan.vtt
10.0 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/06 - Disk Encryption.vtt
9.9 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/02 - Remote Connection and SSH.vtt
9.9 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/01 - Ethernet and MAC Addresses.vtt
9.9 kB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/01 - What is The Cloud.vtt
9.8 kB
1 - Technical Support Fundamentals/02 - History of Computing/01 - From Abacus to Analytical Engine.vtt
9.8 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/07 - Windows - Package Dependencies.vtt
9.8 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/02 - Windows - Software Packages.vtt
9.8 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/02 - Subnet Masks.vtt
9.7 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/03 - Basic Binary Math.vtt
9.7 kB
5 - IT Security - Defense against the digital dark arts/16 - Application Hardening/01 - Software Patch Management.vtt
9.7 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/03 - IP Datagrams and Encapsulation.vtt
9.7 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/01 - What is Active Directory.vtt
9.7 kB
5 - IT Security - Defense against the digital dark arts/01 - Introduction to IT Security/01 - Course Introduction.vtt
9.6 kB
4 - System Administration and IT Infrastructure Services/13 - Print Services/01a - Supplemental Reading for Print Services.txt
9.6 kB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/02 - Wireshark and tcpdump.vtt
9.6 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/01 - User Habits.vtt
9.5 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/04 - Windows - Disk Partitioning and Formatting a Filesystem.vtt
9.5 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/02 - Incident Response and Recovery.vtt
9.4 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/03 - All the Layers Working in Unison.txt
9.4 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/09 - Windows - Input, Output, and the Pipeline.vtt
9.4 kB
2 - The Bits and Bytes of Computer Networking/01 - Introduction to Computer Networking/01 - Course Introduction.vtt
9.2 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/04 - Interview Role Play - Operating Systems.vtt
9.2 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/04 - Installing Linux.vtt
9.1 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/01 - Program Introduction.vtt
9.1 kB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/03 - Hashing Algorithms (continued).vtt
9.1 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/06 - Types of Backup.vtt
9.1 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/03 - Securing Network Traffic.vtt
8.9 kB
1 - Technical Support Fundamentals/16 - Customer Service/01 - Intro to Soft Skills.txt
8.9 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/01 - IPv6 Addressing and Subnetting.vtt
8.9 kB
1 - Technical Support Fundamentals/16 - Customer Service/03 - How to Deal with Difficult Situations.txt
8.8 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/03 - Symmetric Encryption Algorithms.txt
8.6 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/03 - DNS and UDP.vtt
8.6 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/01 - Public Key Infrastructure.txt
8.6 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/03 - TCP Control Flags and the Three-way Handshake.vtt
8.5 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/03 - Interior Gateway Protocols.vtt
8.5 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/01 - Network Hardening Best Practices.txt
8.5 kB
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/01 - The TCPIP Five-Layer Network Model.vtt
8.4 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/04 - Linux - List Directories.vtt
8.4 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/01 - Introduction to Wireless Networking Technologies.vtt
8.3 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/02 - Symmetric Cryptography.vtt
8.2 kB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/02 - Measuring and Assessing Risk.vtt
8.2 kB
4 - System Administration and IT Infrastructure Services/01 - Introduction to System Administration and IT Infrastructure Services/01 - Course Introduction.vtt
8.2 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/02 - Windows - View User and Group Information.vtt
8.1 kB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/01 - Sniffing the Network.vtt
8.1 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/02 - Cryptography in Action.txt
8.0 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/03 - Dissecting an Ethernet Frame.vtt
8.0 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/04 - Linux - Users, Superuser and Beyond.vtt
8.0 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/02 - Network Hardware Hardening.txt
8.0 kB
4 - System Administration and IT Infrastructure Services/23 - Disaster Recovery Plans/01 - What's a Disaster Recovery Plan.vtt
7.8 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/02 - The Many Steps of Name Resolution.txt
7.8 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/03 - Programs and Hardware.txt
7.8 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/03 - Malicious Software.vtt
7.7 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/06 - Mobile Device Networks.vtt
7.7 kB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/02 - Hashing Algorithms.vtt
7.7 kB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/02 - Access Control.vtt
7.7 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/08 - Group Policy Inheritance and Precedence.txt
7.7 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/01 - Cryptography.txt
7.7 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/01 - WEP Encryption and Why You Shouldn't Use It.txt
7.7 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/03 - Windows - Modifying Permissions.vtt
7.7 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/06 - Windows - Searching within Files.vtt
7.7 kB
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/02 - Linux - Package Manager Apt.vtt
7.6 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/06 - Linux - Disk Partitioning and Formatting a Filesystem.vtt
7.6 kB
1 - Technical Support Fundamentals/06 - Components/07 - Batteries and Charging Systems.vtt
7.6 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/02 - What is IT.vtt
7.6 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/01 - Ping - Internet Control Message Protocol.vtt
7.6 kB
4 - System Administration and IT Infrastructure Services/10 - Configuring Network Services/01 - Configuring DNS with Dnsmasq.vtt
7.6 kB
4 - System Administration and IT Infrastructure Services/18 - Centralized Management/01 - What is centralized management.vtt
7.5 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/06 - Inteview Role Play - Security.vtt
7.5 kB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/02 - Writing a Post-Mortem.vtt
7.5 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/01 - Windows - File Permissions.vtt
7.4 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/10 - Windows - Files.vtt
7.4 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/04 - Interview Role Play - Networking.vtt
7.4 kB
1 - Technical Support Fundamentals/10 - What is Networking/02 - Basics of Networking.txt
7.3 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/03 - Network Software Hardening.vtt
7.3 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/02 - Dissection of a TCP Segment.vtt
7.3 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/05 - Antimalware Protection.txt
7.3 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/04 - Managing Active Directory User Passwords.vtt
7.2 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/06 - What is Group Policy.vtt
7.2 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/02 - List Directories in a GUI.vtt
7.2 kB
1 - Technical Support Fundamentals/16 - Customer Service/02 - Anatomy of an Interaction.txt
7.1 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/02 - Disabling Unnecessary Components.vtt
7.1 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/07 - Mobile App Management.vtt
7.1 kB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/01 - Security Goals.txt
7.0 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/02 - Essential Security Terms.vtt
7.0 kB
1 - Technical Support Fundamentals/06 - Components/01 - CPU.vtt
6.9 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/09 - Mobile Users and Accounts.vtt
6.9 kB
1 - Technical Support Fundamentals/07 - Starting It Up/01 - BIOS.vtt
6.9 kB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/02 - Servers Revisited.vtt
6.9 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/04 - Logging and Auditing.txt
6.9 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/03 - Wireless Channels.vtt
6.9 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/03 - Remote Connections on Windows.vtt
6.8 kB
2 - The Bits and Bytes of Computer Networking/16 - Dynamic Host Configuration Protocol/01 - Overview of DHCP.vtt
6.8 kB
1 - Technical Support Fundamentals/06 - Components/06 - Mobile Devices.vtt
6.8 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/03 - Remote Connections on Windows.vtt
6.8 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/06 - Kerberos.txt
6.8 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/04 - Mobile App Packages.vtt
6.8 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/07 - Windows - Adding and Removing Users.vtt
6.8 kB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/02 - What is a directory server.vtt
6.8 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/03 - Linux Logs.vtt
6.7 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/01 - Incident Reporting and Analysis.txt
6.7 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/02 - Introduction to Computer Hardware.vtt
6.7 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/04 - Components of an Operating System.txt
6.7 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/02 - Third-Party Security.vtt
6.7 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/05 - Joining an Active Directory Domain.vtt
6.6 kB
2 - The Bits and Bytes of Computer Networking/18 - VPNs and Proxies/02 - Proxy Services.vtt
6.6 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/06 - Linux - SetUID, SetGID, Sticky Bit.vtt
6.6 kB
4 - System Administration and IT Infrastructure Services/12 - File Services/03 - Mobile Synchronization.vtt
6.6 kB
1 - Technical Support Fundamentals/11 - Limitations of the Internet/01 - History of the Internet.vtt
6.6 kB
4 - System Administration and IT Infrastructure Services/15 - Troubleshooting Platform Services/01 - Is the website down.vtt
6.6 kB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/01 - Resource Record Types.txt
6.5 kB
1 - Technical Support Fundamentals/06 - Components/04 - Storage.vtt
6.5 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/01 - Basic Routing Concepts.txt
6.5 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/05 - Connection-oriented and Connectionless Protocols.vtt
6.5 kB
2 - The Bits and Bytes of Computer Networking/16 - Dynamic Host Configuration Protocol/02 - DHCP in Action.vtt
6.5 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/02 - Ask Questions!.vtt
6.4 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/03 - Window - Operating System Updates.vtt
6.4 kB
1 - Technical Support Fundamentals/06 - Components/05 - Power Supplies.vtt
6.4 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/05 - Files and File Systems.vtt
6.4 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/04 - Privacy and Security.vtt
6.4 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/04 - Cryptographic Hardware.txt
6.4 kB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/03 - Deceptive Attacks.vtt
6.4 kB
3 - Operating Systems and You - Becoming a Power User/01 - Introduction to Operating Systems and Becoming a Power User/01 - Course Introduction.txt
6.4 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/01 - Impact.vtt
6.3 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02 - Standing Out from the Crowd.vtt
6.3 kB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/03 - Intrusion Detection-Prevention Systems.txt
6.3 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/02 - The Windows Event Viewer.vtt
6.3 kB
4 - System Administration and IT Infrastructure Services/23 - Disaster Recovery Plans/02 - Designing a Disaster Recovery Plan.txt
6.3 kB
5 - IT Security - Defense against the digital dark arts/16 - Application Hardening/02 - Application Policies.vtt
6.3 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/04 - Configuring Services in Linux.vtt
6.3 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/14 - Windows - Filesystem Repair.vtt
6.3 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/01 - With Great Power Comes Great Responsibility.vtt
6.2 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/05 - Windows - Managing Processes.vtt
6.2 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/01 - Authentication Best Practices.txt
6.2 kB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/03 - DNS Zones.vtt
6.2 kB
2 - The Bits and Bytes of Computer Networking/18 - VPNs and Proxies/01 - Virtual Private Networks.vtt
6.2 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/06 - Disk Encryption.txt
6.2 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/03 - Mobile Security and Privacy.vtt
6.2 kB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/03 - The Cloud.vtt
6.2 kB
4 - System Administration and IT Infrastructure Services/10 - Configuring Network Services/02 - Configuring DHCP with Dnsmasq.txt
6.2 kB
5 - IT Security - Defense against the digital dark arts/16 - Application Hardening/01 - Software Patch Management.txt
6.2 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/01 - Ethernet and MAC Addresses.txt
6.1 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/03 - User and Hardware Provisioning.vtt
6.1 kB
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/01 - Windows - Package Manager.vtt
6.1 kB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/01 - What is The Cloud.txt
6.1 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/01 - What is Active Directory.txt
6.1 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/03 - Host-Based Firewall.vtt
6.1 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/01 - Cables.vtt
6.1 kB
1 - Technical Support Fundamentals/10 - What is Networking/03 - Networking Hardware.vtt
6.1 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/03 - Types of IT Infrastructure Services.txt
6.1 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/04 - Working with Logs.vtt
6.0 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/02 - Incident Response and Recovery.txt
6.0 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/07 - Windows - Package Dependencies.txt
6.0 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/04 - CIDR.vtt
6.0 kB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/02 - Wireshark and tcpdump.txt
6.0 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/02 - Subnet Masks.txt
6.0 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/03 - Basic Binary Math.txt
6.0 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/02 - Windows - Software Packages.txt
6.0 kB
5 - IT Security - Defense against the digital dark arts/20 - Graded Assessments/01b - Final Project - Sample Submission.txt
6.0 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/04 - Windows - Disk Partitioning and Formatting a Filesystem.txt
6.0 kB
1 - Technical Support Fundamentals/02 - History of Computing/01 - From Abacus to Analytical Engine.txt
6.0 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/01 - User Habits.txt
5.9 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/03 - IP Datagrams and Encapsulation.txt
5.9 kB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/03 - Privacy Policy.vtt
5.9 kB
5 - IT Security - Defense against the digital dark arts/01 - Introduction to IT Security/01 - Course Introduction.txt
5.9 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/05 - Windows - Special Permissions.vtt
5.9 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/04 - Cable Broadband.vtt
5.8 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/09 - Interacting with the OS - User Space.vtt
5.8 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/02 - Linux - Devices and Drivers.vtt
5.8 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/01 - Program Introduction.txt
5.7 kB
2 - The Bits and Bytes of Computer Networking/01 - Introduction to Computer Networking/01 - Course Introduction.txt
5.7 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/02 - Managing Services in Linux.vtt
5.7 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/06 - Types of Backup.txt
5.7 kB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/03 - Hashing Algorithms (continued).txt
5.7 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/01 - Why do we need DNS.vtt
5.7 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/01 - Choosing an Operating System.vtt
5.7 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/03 - Digital Subscriber Lines.vtt
5.6 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/03 - Installing Windows.vtt
5.6 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/02 - NAT and the Transport Layer.vtt
5.6 kB
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/03 - Securing Network Traffic.txt
5.6 kB
4 - System Administration and IT Infrastructure Services/08 - Troubleshooting Network Services/01 - Unable to Resolve a Hostname or Domain Name.vtt
5.6 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/19 - Learner Story - Chelsea.vtt
5.6 kB
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/01 - Windows - Underneath the Hood.vtt
5.6 kB
2 - The Bits and Bytes of Computer Networking/20 - POTS and Dial-up/02 - Dial-up, Modems, and Point-to-Point Protocols.vtt
5.6 kB
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/01 - Network Attacks.vtt
5.6 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/02 - What is Data Recovery.vtt
5.6 kB
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/02 - Linux - Resource Monitoring.vtt
5.6 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/01 - IPv6 Addressing and Subnetting.txt
5.6 kB
1 - Technical Support Fundamentals/10 - What is Networking/01 - Module Introduction.vtt
5.6 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/05 - Windows - Passwords.vtt
5.5 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/03 - Security Training.vtt
5.5 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/09 - Windows - Input, Output, and the Pipeline.txt
5.5 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/06 - Windows - Changing Directories in the CLI.vtt
5.5 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/04 - Interview Role Play - Operating Systems.txt
5.5 kB
4 - System Administration and IT Infrastructure Services/14 - Platform Services/01 - Web Servers Revisited.vtt
5.5 kB
1 - Technical Support Fundamentals/06 - Components/08 - Peripherals.vtt
5.5 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/04 - IP Address Classes.vtt
5.5 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/05 - Configuring Services in Windows.vtt
5.5 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/03 - Windows - List Directories in CLI.vtt
5.5 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/03 - Configuring Email Services.vtt
5.5 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/01 - Basics of NAT.vtt
5.5 kB
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/02 - Managing OpenLDAP.vtt
5.5 kB
1 - Technical Support Fundamentals/06 - Components/03 - Motherboards.vtt
5.4 kB
1 - Technical Support Fundamentals/11 - Limitations of the Internet/02 - Limitations of the Internet.vtt
5.4 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/03 - Backing Up Your Data.vtt
5.4 kB
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/01 - Windows - Resource Monitoring.vtt
5.4 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/03 - Interior Gateway Protocols.txt
5.4 kB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/01 - Hashing.vtt
5.4 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/02 - Linux - Reading Process Information.vtt
5.4 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/06 - Interview Role Play - Customer Service.vtt
5.4 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/02 - Managing Active Directory.vtt
5.4 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/12 - Windows - Copying Files & Directories.vtt
5.4 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/03 - DNS and UDP.txt
5.3 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02a - Crafting Your Resume.txt
5.3 kB
5 - IT Security - Defense against the digital dark arts/20 - Graded Assessments/01a - Creating a Company Culture for Security - Design Document.txt
5.3 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/04 - Installing Linux.txt
5.3 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/02 - Public DNS Servers.vtt
5.3 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/08 - Single Sign-On.vtt
5.3 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/02 - Operating Systems Deployment Methods.vtt
5.3 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/01a - Information and FAQs about badges.txt
5.3 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/01 - Windows - Devices and Drivers.vtt
5.3 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/02 - Routing Tables.vtt
5.3 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/03 - Certificates.vtt
5.3 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/01 - Users, Administrators, and Groups, Oh My!.vtt
5.3 kB
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/01 - What is OpenLDAP.vtt
5.2 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/04 - What to Expect During the Technical Interview.vtt
5.2 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/05 - Recipe for Computing.vtt
5.2 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/04 - Backup Solutions.vtt
5.2 kB
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/01 - The TCPIP Five-Layer Network Model.txt
5.2 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/08 - Windows - Swap.vtt
5.2 kB
4 - System Administration and IT Infrastructure Services/12 - File Services/02 - Network File Storage.vtt
5.2 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/01 - Cloud Concepts.vtt
5.2 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/02 - Symmetric Cryptography.txt
5.2 kB
1 - Technical Support Fundamentals/10 - What is Networking/05 - The Web.vtt
5.1 kB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/02 - Measuring and Assessing Risk.txt
5.1 kB
1 - Technical Support Fundamentals/06 - Components/02 - RAM.vtt
5.1 kB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/03 - Interview Role Play - Sys Admin.vtt
5.1 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/06 - Troubleshooting and Managing Issues.vtt
5.1 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/04 - Linux - List Directories.txt
5.1 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/01 - Introduction to Wireless Networking Technologies.txt
5.1 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/03 - Mobile Device Resetting and Imaging.vtt
5.1 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/02 - Remote Connection and SSH.txt
5.1 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/03 - Types of Software.vtt
5.1 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/05 - Configuring Security Services.vtt
5.1 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/02 - Remote Connection and SSH.txt
5.1 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/03 - Getting Ready for the Interview.vtt
5.1 kB
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/01 - Sniffing the Network.txt
5.1 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/12 - Windows - Disk Usage.vtt
5.0 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/03 - TCP Control Flags and the Three-way Handshake.txt
5.0 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/03 - Dissecting an Ethernet Frame.txt
5.0 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/04 - Linux - Modifying Permissions.vtt
5.0 kB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/03 - Remote Access Revisited.vtt
5.0 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/04 - LDAP.vtt
5.0 kB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/02 - Computer Architecture Overview.vtt
5.0 kB
4 - System Administration and IT Infrastructure Services/01 - Introduction to System Administration and IT Infrastructure Services/01 - Course Introduction.txt
5.0 kB
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/02 - Denial-of-Service.vtt
5.0 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/05 - What is Chrome OS.vtt
5.0 kB
4 - System Administration and IT Infrastructure Services/23 - Disaster Recovery Plans/01 - What's a Disaster Recovery Plan.txt
5.0 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/01 - Windows - Reading Process Information.vtt
4.9 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/02 - Windows - View User and Group Information.txt
4.9 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/03 - Malicious Software.txt
4.9 kB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/02 - Access Control.txt
4.9 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/01 - Module Introduction.vtt
4.9 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/06 - Linux - Managing Processes.vtt
4.9 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/06 - DNS for Internal Networks.vtt
4.9 kB
1 - Technical Support Fundamentals/03 - Digital Logic/02 - Character Encoding.vtt
4.9 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/07 - Linux - Mounting and Unmounting a Filesystem.vtt
4.8 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/06 - Installing Mac OS X.vtt
4.8 kB
3 - Operating Systems and You - Becoming a Power User/15 - Virtualization/01 - Virtual Machines.vtt
4.8 kB
4 - System Administration and IT Infrastructure Services/19 - LDAP/02 - What is LDAP Authentication.vtt
4.8 kB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/02 - Hashing Algorithms.txt
4.8 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/03 - Isolating the Problem.vtt
4.8 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/01 - FTP, SFTP, and TFTP.vtt
4.8 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/02 - Never Test in Production.vtt
4.8 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/01 - What is broadband.vtt
4.8 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/00a - How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile.txt
4.8 kB
4 - System Administration and IT Infrastructure Services/18 - Centralized Management/01 - What is centralized management.txt
4.8 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/02 - What is IT.txt
4.7 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/06 - Windows - Searching within Files.txt
4.7 kB
1 - Technical Support Fundamentals/03 - Digital Logic/04 - How to Count in Binary.vtt
4.7 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/06 - Linux - Disk Partitioning and Formatting a Filesystem.txt
4.7 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/01 - The Application Layer.vtt
4.7 kB
4 - System Administration and IT Infrastructure Services/13 - Print Services/01 - Configuring Print Services.vtt
4.7 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/10 - Linux - Input, Output and Pipeline.vtt
4.7 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/03 - Windows - Modifying Permissions.txt
4.7 kB
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/02 - Linux - Package Manager Apt.txt
4.7 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/03 - IPv6 and IPv4 Harmony.vtt
4.6 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/05 - Windows - Archives.vtt
4.6 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/04 - Hosts Files.vtt
4.6 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/04 - Follow the Cookie Crumbs.vtt
4.6 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/01 - Module Introduction.vtt
4.6 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/03 - When and How to Choose Cloud.vtt
4.6 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/01 - Ping - Internet Control Message Protocol.txt
4.6 kB
4 - System Administration and IT Infrastructure Services/10 - Configuring Network Services/01 - Configuring DNS with Dnsmasq.txt
4.6 kB
1 - Technical Support Fundamentals/07 - Starting It Up/04 - Mobile Device Repair.vtt
4.6 kB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/02 - Writing a Post-Mortem.txt
4.6 kB
1 - Technical Support Fundamentals/03 - Digital Logic/01 - Computer Language.vtt
4.6 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/03 - NAT, Non-Routable Address Space and the Limits of IPv4.vtt
4.6 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/03 - Disk Anatomy.vtt
4.6 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/06 - Inteview Role Play - Security.txt
4.5 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/03 - Network Software Hardening.txt
4.5 kB
1 - Technical Support Fundamentals/03 - Digital Logic/03 - Binary.vtt
4.5 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/06 - What is Group Policy.txt
4.5 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/01 - Windows - Display File Contents.vtt
4.5 kB
1 - Technical Support Fundamentals/19 - Course Wrap Up/01 - Course Wrap Up.vtt
4.5 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/04 - Managing Active Directory User Passwords.txt
4.5 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/02 - Dissection of a TCP Segment.txt
4.5 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/01 - Managing Software.vtt
4.5 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/07 - Mobile App Management.txt
4.5 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/05 - Remote Connection File Transfer on Windows.vtt
4.5 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/02 - Configuring Communication Services.vtt
4.5 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/04 - Interview Role Play - Networking.txt
4.4 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/05 - Non-Routable Address Space.vtt
4.4 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/16 - Windows - Removing Files & Directories.vtt
4.4 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/01 - The Transport Layer.vtt
4.4 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/01 - Windows - File Permissions.txt
4.4 kB
2 - The Bits and Bytes of Computer Networking/22 - WANs/01 - Wide Area Network Technologies.vtt
4.4 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/10 - Windows - Files.txt
4.4 kB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/02 - Virtualization.vtt
4.4 kB
5 - IT Security - Defense against the digital dark arts/11 - Accounting/01 - Tracking Usage and Access.vtt
4.4 kB
1 - Technical Support Fundamentals/07 - Starting It Up/01 - BIOS.txt
4.4 kB
2 - The Bits and Bytes of Computer Networking/16 - Dynamic Host Configuration Protocol/01 - Overview of DHCP.txt
4.4 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/02 - Disabling Unnecessary Components.txt
4.4 kB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/02 - Anatomy of a Domain Name.vtt
4.4 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/03 - Linux - Software Packages.vtt
4.4 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/02 - Programs vs Processes Revisited.vtt
4.4 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/04 - Malware Continued.vtt
4.3 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/02 - Essential Security Terms.txt
4.3 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/03 - Windows - Process Creation and Termination.vtt
4.3 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/02 - What is Software.vtt
4.3 kB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/02 - What is a directory server.txt
4.3 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/02 - List Directories in a GUI.txt
4.3 kB
2 - The Bits and Bytes of Computer Networking/18 - VPNs and Proxies/02 - Proxy Services.txt
4.3 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/04 - Linux - Users, Superuser and Beyond.txt
4.3 kB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/02 - Servers Revisited.txt
4.2 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/03 - Wireless Channels.txt
4.2 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/04 - Exterior Gateway Protocols.vtt
4.2 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/06 - Process Management.vtt
4.2 kB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/01 - What is Systems Administration.vtt
4.2 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/03 - Wireless Hardening.vtt
4.2 kB
1 - Technical Support Fundamentals/06 - Components/01 - CPU.txt
4.2 kB
1 - Technical Support Fundamentals/11 - Limitations of the Internet/01 - History of the Internet.txt
4.2 kB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/02 - Everything as a Service.vtt
4.2 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/03 - Window - Operating System Updates.txt
4.1 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/02 - Third-Party Security.txt
4.1 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/06 - Mobile Device Networks.txt
4.1 kB
1 - Technical Support Fundamentals/06 - Components/07 - Batteries and Charging Systems.txt
4.1 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/01 - Organizational Policies.vtt
4.1 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/03 - Linux Logs.txt
4.1 kB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/01 - What's a post-mortem.vtt
4.1 kB
4 - System Administration and IT Infrastructure Services/25 - Final Project/01 - Final Project Introduction.vtt
4.1 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/03 - Managing Services in Windows.vtt
4.1 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/05 - Windows Powershell.vtt
4.1 kB
4 - System Administration and IT Infrastructure Services/15 - Troubleshooting Platform Services/01 - Is the website down.txt
4.1 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/05 - Joining an Active Directory Domain.txt
4.1 kB
1 - Technical Support Fundamentals/06 - Components/05 - Power Supplies.txt
4.1 kB
5 - IT Security - Defense against the digital dark arts/16 - Application Hardening/02 - Application Policies.txt
4.1 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/05 - Connection-oriented and Connectionless Protocols.txt
4.1 kB
2 - The Bits and Bytes of Computer Networking/16 - Dynamic Host Configuration Protocol/02 - DHCP in Action.txt
4.1 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/02 - Wireless Network Configurations.vtt
4.1 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/02 - Traceroute.vtt
4.0 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/01 - The CIA Triad.vtt
4.0 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/03 - Windows - View User and Group Information using CLI.vtt
4.0 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/14 - Windows - Filesystem Repair.txt
4.0 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/06 - Linux - SetUID, SetGID, Sticky Bit.txt
4.0 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/02 - Introduction to Computer Hardware.txt
4.0 kB
1 - Technical Support Fundamentals/06 - Components/04 - Storage.txt
4.0 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/02 - Standing Out from the Crowd.txt
4.0 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/03 - What does an IT Support Specialist do.vtt
4.0 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/03 - Host-Based Firewall.txt
4.0 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/04 - TCP Socket States.vtt
4.0 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/05 - Files and File Systems.txt
4.0 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/01 - Impact.txt
3.9 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/04 - Privacy and Security.txt
3.9 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/02 - The Windows Event Viewer.txt
3.9 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/07 - Windows - Adding and Removing Users.txt
3.9 kB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/03 - Deceptive Attacks.txt
3.9 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/05 - Fiber Connections.vtt
3.9 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/01 - Module Introduction.vtt
3.9 kB
2 - The Bits and Bytes of Computer Networking/18 - VPNs and Proxies/01 - Virtual Private Networks.txt
3.9 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/03 - User and Hardware Provisioning.txt
3.9 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/11 - Linux - Files.vtt
3.9 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/01 - Cables.txt
3.9 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/01 - Lesson Overview & Practice Tips.vtt
3.9 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/03 - Mobile Security and Privacy.txt
3.9 kB
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/01 - Windows - Package Manager.txt
3.8 kB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/03 - DNS Zones.txt
3.8 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/04 - Configuring Services in Linux.txt
3.8 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/02 - IPv6 Headers.vtt
3.8 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/05 - Windows - Managing Processes.txt
3.8 kB
1 - Technical Support Fundamentals/17 - Documentation/01 - Ticketing Systems and Documenting Your Work.vtt
3.8 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/01 - With Great Power Comes Great Responsibility.txt
3.8 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/04 - Working with Logs.txt
3.8 kB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/03 - The Cloud.txt
3.8 kB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/03 - Implementing Directory Services.vtt
3.8 kB
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/03 - Privacy Policy.txt
3.7 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/11 - The Boot Process.vtt
3.7 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/04 - CIDR.txt
3.7 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/04 - Cable Broadband.txt
3.7 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/02 - Linux - File Permissions.vtt
3.7 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/04 - Course Introduction.vtt
3.7 kB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/01 - Client-Side Attacks.vtt
3.7 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/09 - Mobile Users and Accounts.txt
3.7 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/02 - Installing, Updating, and Removing Software on Windows.vtt
3.7 kB
1 - Technical Support Fundamentals/10 - What is Networking/03 - Networking Hardware.txt
3.7 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/01 - Why do we need DNS.txt
3.7 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/05 - Windows - Special Permissions.txt
3.7 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/03 - Remote Connections on Windows.txt
3.7 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/02 - Ask Questions!.txt
3.7 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/02 - Review of Filesystems.vtt
3.7 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/03 - DNS Registration and Expiration.vtt
3.7 kB
1 - Technical Support Fundamentals/06 - Components/06 - Mobile Devices.txt
3.7 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/03 - Remote Connections on Windows.txt
3.7 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/02 - IP Addresses.vtt
3.6 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/04 - Mobile App Packages.txt
3.6 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/02 - NTP.vtt
3.6 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/03 - Testing Port Connectivity.vtt
3.6 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/10 - Logs.vtt
3.6 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/04 - Fixing Things the Right Way.vtt
3.6 kB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/01 - Abstraction.vtt
3.6 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/07 - DHCP.vtt
3.6 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/02 - Virtual Machines.vtt
3.6 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/02 - Hubs and Switches.vtt
3.6 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/04 - Wireless Security.vtt
3.6 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/01 - Choosing an Operating System.txt
3.6 kB
1 - Technical Support Fundamentals/10 - What is Networking/01 - Module Introduction.txt
3.6 kB
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/01 - Network Attacks.txt
3.5 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/03 - Security Training.txt
3.5 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/05 - Showing Your Best Self During the Interview.vtt
3.5 kB
2 - The Bits and Bytes of Computer Networking/20 - POTS and Dial-up/02 - Dial-up, Modems, and Point-to-Point Protocols.txt
3.5 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/02 - NAT and the Transport Layer.txt
3.5 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/03 - Windows - List Directories in CLI.txt
3.5 kB
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/01 - Windows - Underneath the Hood.txt
3.5 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/02 - Linux - Devices and Drivers.txt
3.5 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/04 - Linux - Operating System Updates.vtt
3.5 kB
4 - System Administration and IT Infrastructure Services/12 - File Services/03 - Mobile Synchronization.txt
3.5 kB
5 - IT Security - Defense against the digital dark arts/07 - Hashing/01 - Hashing.txt
3.5 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/02 - What is Data Recovery.txt
3.5 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/03 - Digital Subscriber Lines.txt
3.5 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/03 - Configuring Email Services.txt
3.5 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/09 - Interacting with the OS - User Space.txt
3.5 kB
4 - System Administration and IT Infrastructure Services/08 - Troubleshooting Network Services/01 - Unable to Resolve a Hostname or Domain Name.txt
3.4 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/03 - Certificates.txt
3.4 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/02 - Managing Services in Linux.txt
3.4 kB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/03 - Network Ports and Patch Panels.vtt
3.4 kB
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/02 - Managing OpenLDAP.txt
3.4 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/04 - Alex Grit Story.vtt
3.4 kB
1 - Technical Support Fundamentals/06 - Components/03 - Motherboards.txt
3.4 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/08 - IO Management.vtt
3.4 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/02 - Linux - Reading Process Information.txt
3.4 kB
4 - System Administration and IT Infrastructure Services/14 - Platform Services/01 - Web Servers Revisited.txt
3.4 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/02 - Managing Active Directory.txt
3.4 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/01 - Name Resolution Tools.vtt
3.4 kB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/03 - Cloud Storage.vtt
3.3 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/05 - Configuring Services in Windows.txt
3.3 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/02 - Routing Tables.txt
3.3 kB
1 - Technical Support Fundamentals/11 - Limitations of the Internet/02 - Limitations of the Internet.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/10 - Windows - Command History.vtt
3.3 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/12 - Mobile Operating Systems.vtt
3.3 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/01 - Basics of NAT.txt
3.3 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/03 - Backing Up Your Data.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/06 - Windows - Changing Directories in the CLI.txt
3.3 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/02 - Public DNS Servers.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/01 - Windows - Devices and Drivers.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/02 - Linux - Resource Monitoring.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/05 - Windows - Passwords.txt
3.3 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/06 - Interview Role Play - Customer Service.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/02 - Operating Systems Deployment Methods.txt
3.3 kB
1 - Technical Support Fundamentals/06 - Components/08 - Peripherals.txt
3.3 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/03 - Installing Windows.txt
3.3 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/08 - Single Sign-On.txt
3.3 kB
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/01 - Windows - Resource Monitoring.txt
3.3 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/04 - Backup Solutions.txt
3.3 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/01 - What do Services Look Like in Action.vtt
3.3 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/04 - LDAP.txt
3.3 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/04 - What to Expect During the Technical Interview.txt
3.3 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/01 - Your Opportunity for Success.vtt
3.2 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/04 - IP Address Classes.txt
3.2 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/04 - Sergio IT Great Field.vtt
3.2 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/07 - Memory Management.vtt
3.2 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/06 - Troubleshooting and Managing Issues.txt
3.2 kB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/01 - Moving Bits Across the Wire.vtt
3.2 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/08 - Windows - Swap.txt
3.2 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/05 - Configuring Security Services.txt
3.2 kB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/02 - Computer Architecture Overview.txt
3.2 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/05 - Recipe for Computing.txt
3.2 kB
1 - Technical Support Fundamentals/10 - What is Networking/05 - The Web.txt
3.2 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/05 - Testing Backups.vtt
3.2 kB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/02 - Password Attacks.vtt
3.2 kB
4 - System Administration and IT Infrastructure Services/12 - File Services/02 - Network File Storage.txt
3.2 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/01 - Cloud Concepts.txt
3.2 kB
1 - Technical Support Fundamentals/06 - Components/08b - Supplemental Reading for Projectors.txt
3.2 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/12 - Windows - Copying Files & Directories.txt
3.2 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/01 - Users, Administrators, and Groups, Oh My!.txt
3.2 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/03 - Types of Software.txt
3.1 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/02 - The Application Layer and the OSI Model.vtt
3.1 kB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/03 - Interview Role Play - Sys Admin.txt
3.1 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/01 - Module Introduction.vtt
3.1 kB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/03 - Remote Access Revisited.txt
3.1 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/06 - Sergio Path.vtt
3.1 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/12 - Windows - Disk Usage.txt
3.1 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/03 - Assessing Risk.vtt
3.1 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/05 - DNS for Web Servers.vtt
3.1 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/05 - What is Chrome OS.txt
3.1 kB
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/02 - Denial-of-Service.txt
3.1 kB
5 - IT Security - Defense against the digital dark arts/11 - Accounting/02 - Rob Important Skills in Security.vtt
3.1 kB
4 - System Administration and IT Infrastructure Services/19 - LDAP/02 - What is LDAP Authentication.txt
3.1 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/03 - Routers.vtt
3.1 kB
1 - Technical Support Fundamentals/06 - Components/02 - RAM.txt
3.1 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/05 - Heather Adkins Keeping Hackers Out.vtt
3.1 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/06 - Installing Mac OS X.txt
3.1 kB
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/01 - What is OpenLDAP.txt
3.1 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/05 - Vendors.vtt
3.1 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/06 - Firewalls.vtt
3.0 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/01 - Windows - Reading Process Information.txt
3.0 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/03 - Getting Ready for the Interview.txt
3.0 kB
4 - System Administration and IT Infrastructure Services/13 - Print Services/01 - Configuring Print Services.txt
3.0 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/01 - Subnetting.vtt
3.0 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/03 - Network Support Services Revisited.vtt
3.0 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/01 - Module Introduction.txt
3.0 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/02 - Typical Cloud Infrastructure Setups.vtt
3.0 kB
3 - Operating Systems and You - Becoming a Power User/15 - Virtualization/01 - Virtual Machines.txt
3.0 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/06 - Linux - Managing Processes.txt
3.0 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/06 - DNS for Internal Networks.txt
3.0 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/07 - Linux - Mounting and Unmounting a Filesystem.txt
3.0 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/04 - Configuring User Productivity Services.vtt
3.0 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/01 - FTP, SFTP, and TFTP.txt
3.0 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/04 - Linux - Modifying Permissions.txt
3.0 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/01 - The Application Layer.txt
3.0 kB
1 - Technical Support Fundamentals/10 - What is Networking/04 - Language of the Internet.vtt
3.0 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/05 - Address Resolution Protocol.vtt
2.9 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/02 - Never Test in Production.txt
2.9 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/10 - Mobile Device Management (MDM).vtt
2.9 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/19 - Learner Story - Chelsea.txt
2.9 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/06 - Troubleshooting Pitfalls to Avoid.vtt
2.9 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/08 - Dion Michelle Obama Story.vtt
2.9 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/03a - Managing Cloud Resources.txt
2.9 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/03 - IPv6 and IPv4 Harmony.txt
2.9 kB
2 - The Bits and Bytes of Computer Networking/22 - WANs/02 - Point-to-Point VPNs.vtt
2.9 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/01 - What is broadband.txt
2.9 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/01 - Module Introduction.txt
2.9 kB
1 - Technical Support Fundamentals/03 - Digital Logic/02 - Character Encoding.txt
2.9 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/02 - T-Carrier Technologies.vtt
2.9 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/03 - NAT, Non-Routable Address Space and the Limits of IPv4.txt
2.9 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/04 - Hosts Files.txt
2.9 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/03 - Disk Anatomy.txt
2.9 kB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/01 - Course Wrap Up.vtt
2.8 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/01 - Managing Software.txt
2.8 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/01 - The Transport Layer.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/09 - Linux - Swap.vtt
2.8 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/05 - Start with the Quickest Step First.vtt
2.8 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/05 - Ari Interview.vtt
2.8 kB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/02 - Virtualization.txt
2.8 kB
1 - Technical Support Fundamentals/03 - Digital Logic/01 - Computer Language.txt
2.8 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/05a - Supplemental Reading for System Ports versus Ephemeral Ports.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/05 - Windows - Archives.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/05 - Jess Passions.vtt
2.8 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/03 - When and How to Choose Cloud.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/03 - Windows - Modifying Text Files.vtt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/05 - Remote Connection File Transfer on Windows.txt
2.8 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/04 - Servers and Clients.vtt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/01 - Windows - Display File Contents.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/02 - Linux - Display File Contents.vtt
2.8 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/02 - Configuring Communication Services.txt
2.8 kB
2 - The Bits and Bytes of Computer Networking/22 - WANs/01 - Wide Area Network Technologies.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/10 - Linux - Input, Output and Pipeline.txt
2.8 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/03 - Windows - Process Creation and Termination.txt
2.7 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/03 - Mobile Device Resetting and Imaging.txt
2.7 kB
5 - IT Security - Defense against the digital dark arts/11 - Accounting/01 - Tracking Usage and Access.txt
2.7 kB
2 - The Bits and Bytes of Computer Networking/15 - Name Resolution in Practice/02 - Anatomy of a Domain Name.txt
2.7 kB
1 - Technical Support Fundamentals/03 - Digital Logic/03 - Binary.txt
2.7 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/03 - Isolating the Problem.txt
2.7 kB
1 - Technical Support Fundamentals/03 - Digital Logic/04 - How to Count in Binary.txt
2.7 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/04 - Follow the Cookie Crumbs.txt
2.7 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/05 - Non-Routable Address Space.txt
2.7 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/16 - Windows - Removing Files & Directories.txt
2.7 kB
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/02 - Linux - Underneath the Hood.vtt
2.7 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/08 - Linux - Package Dependencies.vtt
2.7 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/04 - DNS.vtt
2.7 kB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/02 - Twisted Pair Cabling and Duplexing.vtt
2.7 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/03 - Wireless Hardening.txt
2.7 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/05 - Sergio Being A Network Engineer.vtt
2.7 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/04 - Exterior Gateway Protocols.txt
2.7 kB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/02 - Everything as a Service.txt
2.7 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/04 - Malware Continued.txt
2.7 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/06 - Heather Managing Self Doubt.vtt
2.6 kB
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/01 - What is Systems Administration.txt
2.6 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/03 - Linux - Software Packages.txt
2.6 kB
4 - System Administration and IT Infrastructure Services/19 - LDAP/01 - What is LDAP.vtt
2.6 kB
4 - System Administration and IT Infrastructure Services/14 - Platform Services/02 - What is a database server.vtt
2.6 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/03a - Supplemental Reading for Testing Port Connectivity.txt
2.6 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/03 - Managing Services in Windows.txt
2.6 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/04 - Software Automation.vtt
2.6 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/11 - Windows and Linux Advanced Navigation.vtt
2.6 kB
4 - System Administration and IT Infrastructure Services/25 - Final Project/01 - Final Project Introduction.txt
2.6 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/02 - What is Software.txt
2.6 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/03 - Windows - Signals.vtt
2.6 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/15 - Linux - Filesystem Repair.vtt
2.6 kB
2 - The Bits and Bytes of Computer Networking/24 - Introduction to Troubleshooting and the Future of Networking/01 - Introduction to Troubleshooting and the Future of Networking.vtt
2.6 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/05 - Windows Powershell.txt
2.6 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/04 - Learner Story - Daniel.vtt
2.6 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/06 - Process Management.txt
2.6 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/02 - Programs vs Processes Revisited.txt
2.6 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/07 - User Backups.vtt
2.5 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/08 - Introduction to Qwiklabs.vtt
2.5 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/02 - Wireless Network Configurations.txt
2.5 kB
4 - System Administration and IT Infrastructure Services/24 - Post-Mortems/01 - What's a post-mortem.txt
2.5 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/03 - What does an IT Support Specialist do.txt
2.5 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/03 - Installing, Updating, and Removing Software on Linux.vtt
2.5 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/01 - Organizational Policies.txt
2.5 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/08 - Windows - Make Directories in the GUI & CLI.vtt
2.5 kB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/02 - Heather Early Career Advice.vtt
2.5 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/13 - Cindy Drive & Career Path.vtt
2.5 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/04 - TCP Socket States.txt
2.5 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/18 - Cindy Why OS is Important.vtt
2.5 kB
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/01 - The CIA Triad.txt
2.4 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/01a - Recording Your Actions.txt
2.4 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/01 - Lesson Overview & Practice Tips.txt
2.4 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/02 - Unicast, Multicast, and Broadcast.vtt
2.4 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/11 - Linux - Files.txt
2.4 kB
1 - Technical Support Fundamentals/19 - Course Wrap Up/01 - Course Wrap Up.txt
2.4 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/02 - Traceroute.txt
2.4 kB
1 - Technical Support Fundamentals/07 - Starting It Up/04 - Mobile Device Repair.txt
2.4 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/03 - Windows - View User and Group Information using CLI.txt
2.4 kB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/03 - Implementing Directory Services.txt
2.4 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/05 - Cellular Networking.vtt
2.4 kB
1 - Technical Support Fundamentals/10 - What is Networking/06 - Victor First Job.vtt
2.4 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/07 - In Case of Fire, Break Glass.vtt
2.4 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/01 - Module Introduction.txt
2.4 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/05 - RADIUS.vtt
2.4 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/05 - Heather First Tech Job.vtt
2.4 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/02 - IPv6 Headers.txt
2.4 kB
1 - Technical Support Fundamentals/17 - Documentation/01 - Ticketing Systems and Documenting Your Work.txt
2.4 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/04 - Victor Escobedo - Practical Experience in IT.vtt
2.3 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/05 - Fiber Connections.txt
2.3 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/02 - Review of Filesystems.txt
2.3 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/02 - IP Addresses.txt
2.3 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/01 - System Monitoring.vtt
2.3 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/04 - Linux - Modifying Text Files.vtt
2.3 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/02 - Internet of Things.vtt
2.3 kB
2 - The Bits and Bytes of Computer Networking/13 - Introduction to Network Services/01 - Introduction to Network Services.vtt
2.3 kB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/01 - Authorization and Access Control Methods.vtt
2.3 kB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/01 - Client-Side Attacks.txt
2.3 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/02 - NTP.txt
2.3 kB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/01 - Abstraction.txt
2.3 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/06 - Alex Good Story.vtt
2.3 kB
2 - The Bits and Bytes of Computer Networking/25 - Verifying Connectivity/03 - Testing Port Connectivity.txt
2.3 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/04 - Wireless Security.txt
2.3 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/03 - DNS Registration and Expiration.txt
2.3 kB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/03 - Kevin Advice.vtt
2.3 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/02 - Installing, Updating, and Removing Software on Windows.txt
2.3 kB
2 - The Bits and Bytes of Computer Networking/19 - Introduction to Connecting to the Internet/01 - Introduction to Connecting to the Internet.vtt
2.3 kB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/02 - Alex Career Path.vtt
2.3 kB
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/02 - Linux - File Permissions.txt
2.3 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/10 - Ben Life as a CIO.vtt
2.3 kB
1 - Technical Support Fundamentals/17 - Documentation/02 - Process Documentation.vtt
2.3 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/11 - The Boot Process.txt
2.2 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/10 - Logs.txt
2.2 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/09 - Rob Path to IT.vtt
2.2 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/04 - Fixing Things the Right Way.txt
2.2 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/02 - Hubs and Switches.txt
2.2 kB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/03 - Network Ports and Patch Panels.txt
2.2 kB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/01 - Course Wrap Up.vtt
2.1 kB
2 - The Bits and Bytes of Computer Networking/27 - The Cloud/03 - Cloud Storage.txt
2.1 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/07 - DHCP.txt
2.1 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/13 - Linux - Disk Usage.vtt
2.1 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/04 - Linux - Operating System Updates.txt
2.1 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/04 - How do Qwiklabs Work.vtt
2.1 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/05 - Showing Your Best Self During the Interview.txt
2.1 kB
2 - The Bits and Bytes of Computer Networking/26 - Digging into DNS/01 - Name Resolution Tools.txt
2.1 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/04 - Rob What a Security Engineer Does.vtt
2.1 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/08 - IO Management.txt
2.1 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/04 - Remote Connection File Transfer.vtt
2.1 kB
1 - Technical Support Fundamentals/01 - Introduction to IT Support/04 - Course Introduction.txt
2.1 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/16 - Ben Passion.vtt
2.1 kB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/01 - Server Operating Systems.vtt
2.1 kB
2 - The Bits and Bytes of Computer Networking/10 - Introduction to the Transport and Application Layers/01 - Introduction to the Transport and Application Layers.vtt
2.1 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/07 - Tri Ngo Obstacles & How to be successful in IT.vtt
2.1 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/06 - Phelan Navy.vtt
2.1 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/05 - Testing Backups.txt
2.1 kB
2 - The Bits and Bytes of Computer Networking/17 - Network Address Translation/03a - Supplemental Reading for IPv4 Address Exhaustion.txt
2.0 kB
5 - IT Security - Defense against the digital dark arts/18 - Users/04 - Alex Grit Story.txt
2.0 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/10 - Windows - Command History.txt
2.0 kB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/01 - Moving Bits Across the Wire.txt
2.0 kB
1 - Technical Support Fundamentals/07 - Starting It Up/02 - Ben's Advice.vtt
2.0 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/03a - Creating Your Elevator Pitch.txt
2.0 kB
5 - IT Security - Defense against the digital dark arts/04 - Other Attacks/02 - Password Attacks.txt
2.0 kB
4 - System Administration and IT Infrastructure Services/09 - Managing System Services/01 - What do Services Look Like in Action.txt
2.0 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/03 - Routers.txt
2.0 kB
2 - The Bits and Bytes of Computer Networking/11 - The Transport Layer/06 - Firewalls.txt
2.0 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/12 - Ben First Tech Job.vtt
2.0 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/03 - Gian What he does in Android Security.vtt
2.0 kB
2 - The Bits and Bytes of Computer Networking/14 - Name Resolution/04 - Sergio IT Great Field.txt
2.0 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/05 - DNS for Web Servers.txt
2.0 kB
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/02 - Alex Why Networking.vtt
2.0 kB
4 - System Administration and IT Infrastructure Services/04 - Applying Changes/03 - Assessing Risk.txt
2.0 kB
1 - Technical Support Fundamentals/18 - Getting Through a Technical Interview/01 - Your Opportunity for Success.txt
2.0 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/02 - The Application Layer and the OSI Model.txt
2.0 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/02 - Virtual Machines.txt
1.9 kB
4 - System Administration and IT Infrastructure Services/25 - Final Project/02 - Alex passion & success.vtt
1.9 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/01 - Module Introduction.txt
1.9 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/04 - Joe Diversity.vtt
1.9 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/05 - Vendors.txt
1.9 kB
2 - The Bits and Bytes of Computer Networking/08 - Subnetting/01 - Subnetting.txt
1.9 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/04 - Configuring User Productivity Services.txt
1.9 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/05 - Address Resolution Protocol.txt
1.9 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/07 - TACACS+.vtt
1.9 kB
4 - System Administration and IT Infrastructure Services/12 - File Services/01 - What are file services.vtt
1.9 kB
2 - The Bits and Bytes of Computer Networking/22 - WANs/02 - Point-to-Point VPNs.txt
1.9 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/05 - Heather Adkins Keeping Hackers Out.txt
1.9 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/04 - Heather Social Engineering.vtt
1.9 kB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/03 - Access Control List.vtt
1.9 kB
4 - System Administration and IT Infrastructure Services/16 - Managing Cloud Resources/02 - Typical Cloud Infrastructure Setups.txt
1.9 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/07 - Memory Management.txt
1.9 kB
1 - Technical Support Fundamentals/10 - What is Networking/04 - Language of the Internet.txt
1.9 kB
5 - IT Security - Defense against the digital dark arts/11 - Accounting/02 - Rob Important Skills in Security.txt
1.9 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/04 - Amir Interview.vtt
1.9 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/03 - Network Support Services Revisited.txt
1.8 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/06 - Sergio Path.txt
1.8 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/07 - Heather Self Learning.vtt
1.8 kB
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/02 - T-Carrier Technologies.txt
1.8 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/06 - Troubleshooting Pitfalls to Avoid.txt
1.8 kB
1 - Technical Support Fundamentals/02 - History of Computing/03 - Kevin Career.vtt
1.8 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/06 - Linux - Archives.vtt
1.8 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/01 - The Network Layer.vtt
1.8 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/12 - Mobile Operating Systems.txt
1.8 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/08 - Dion Michelle Obama Story.txt
1.8 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/05 - Ari Interview.txt
1.8 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/04 - Routine Maintenance.vtt
1.8 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/09 - Linux - Swap.txt
1.7 kB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/01 - Course Wrap Up.txt
1.7 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/04 - Servers and Clients.txt
1.7 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/05 - Jess Passions.txt
1.7 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/02 - IT Infrastructure Services.vtt
1.7 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/03 - Windows - Modifying Text Files.txt
1.7 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/02 - Linux - Display File Contents.txt
1.7 kB
4 - System Administration and IT Infrastructure Services/19 - LDAP/03 - Heather Overcoming Obstacles.vtt
1.7 kB
4 - System Administration and IT Infrastructure Services/07 - Network Services/04 - DNS.txt
1.7 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/01 - Intro to Defense in Depth.vtt
1.7 kB
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/02 - Twisted Pair Cabling and Duplexing.txt
1.7 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/11 - Windows and Linux Advanced Navigation.txt
1.7 kB
2 - The Bits and Bytes of Computer Networking/03 - The Basics of Networking Devices/05 - Sergio Being A Network Engineer.txt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/02 - Linux - Underneath the Hood.txt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/04 - Linux - Process Creation and Termination.vtt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/08 - Linux - Package Dependencies.txt
1.6 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/05 - Start with the Quickest Step First.txt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/03 - Windows - Signals.txt
1.6 kB
2 - The Bits and Bytes of Computer Networking/06 - Introduction/01 - Introduction to The Network Layer.vtt
1.6 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/01 - Congratulations!.vtt
1.6 kB
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/07 - User Backups.txt
1.6 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/01 - Module Introduction.vtt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/15 - Linux - Filesystem Repair.txt
1.6 kB
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/00b - Common Job Search Terms.txt
1.6 kB
2 - The Bits and Bytes of Computer Networking/24 - Introduction to Troubleshooting and the Future of Networking/01 - Introduction to Troubleshooting and the Future of Networking.txt
1.6 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/02 - Unicast, Multicast, and Broadcast.txt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/18 - Cindy Why OS is Important.txt
1.6 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/10 - Mobile Device Management (MDM).txt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/07 - Linux - Changing Directories in Bash.vtt
1.6 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/14 - Windows - Moving and Renaming Files, Directories.vtt
1.6 kB
4 - System Administration and IT Infrastructure Services/19 - LDAP/01 - What is LDAP.txt
1.6 kB
4 - System Administration and IT Infrastructure Services/14 - Platform Services/02 - What is a database server.txt
1.6 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/05 - Cellular Networking.txt
1.5 kB
1 - Technical Support Fundamentals/17 - Documentation/03 - Documenting in Ticketing Systems.vtt
1.5 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/04 - Software Automation.txt
1.5 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/05 - RADIUS.txt
1.5 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/04 - Revisiting Abstraction.vtt
1.5 kB
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/07 - Amir Attributes.vtt
1.5 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/08 - Windows - Make Directories in the GUI & CLI.txt
1.5 kB
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/04 - Linux - Signals.vtt
1.5 kB
2 - The Bits and Bytes of Computer Networking/13 - Introduction to Network Services/01 - Introduction to Network Services.txt
1.5 kB
4 - System Administration and IT Infrastructure Services/11 - Software Services/06 - Heather Managing Self Doubt.txt
1.5 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/06a - Supplemental Readings for Mobile Device Networks.txt
1.5 kB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/02 - Heather Early Career Advice.txt
1.5 kB
1 - Technical Support Fundamentals/19 - Course Wrap Up/02 - Sabrina No Degree.vtt
1.5 kB
2 - The Bits and Bytes of Computer Networking/12 - The Application Layer/04 - Learner Story - Daniel.txt
1.5 kB
2 - The Bits and Bytes of Computer Networking/05 - The Data Link Layer/04 - Victor Escobedo - Practical Experience in IT.txt
1.5 kB
1 - Technical Support Fundamentals/08 - What's an Operating System/13 - Cindy Drive & Career Path.txt
1.5 kB
1 - Technical Support Fundamentals/14 - Interacting with Software/03 - Installing, Updating, and Removing Software on Linux.txt
1.5 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/02 - Internet of Things.txt
1.5 kB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/01 - Authorization and Access Control Methods.txt
1.5 kB
3 - Operating Systems and You - Becoming a Power User/16 - Logging/01 - System Monitoring.txt
1.4 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/04 - Linux - Modifying Text Files.txt
1.4 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/05 - Heather First Tech Job.txt
1.4 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/09 - Rob Path to IT.txt
1.4 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/10 - Ben Life as a CIO.txt
1.4 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/06 - Alex Good Story.txt
1.4 kB
1 - Technical Support Fundamentals/10 - What is Networking/06 - Victor First Job.txt
1.4 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/13 - Linux - Copying Files and Directories.vtt
1.4 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/04a - Supplemental Reading for Routing Protocol Examples.txt
1.4 kB
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/02 - Alex Career Path.txt
1.4 kB
1 - Technical Support Fundamentals/17 - Documentation/02 - Process Documentation.txt
1.4 kB
2 - The Bits and Bytes of Computer Networking/22 - WANs/01a - Supplemental Reading for WAN Protocols.txt
1.4 kB
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/01 - Course Wrap Up.txt
1.4 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/07 - In Case of Fire, Break Glass.txt
1.4 kB
1 - Technical Support Fundamentals/04 - Computer Architecture Layer/03 - Kevin Advice.txt
1.4 kB
2 - The Bits and Bytes of Computer Networking/19 - Introduction to Connecting to the Internet/01 - Introduction to Connecting to the Internet.txt
1.3 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/01 - What are IT Infrastructure Services.vtt
1.3 kB
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/04 - Joe Personal Obstacle.vtt
1.3 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/13 - Linux - Disk Usage.txt
1.3 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/08 - Introduction to Qwiklabs.txt
1.3 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/02 - The Role of IT Infrastructure Services in SysAdmin.vtt
1.3 kB
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/04 - Rob What a Security Engineer Does.txt
1.3 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/05 - Windows - Changing Directories in the GUI.vtt
1.3 kB
1 - Technical Support Fundamentals/09 - Installing an Operating System/07 - Tri Ngo Obstacles & How to be successful in IT.txt
1.3 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/01 - Module Introduction.vtt
1.3 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/16 - Ben Passion.txt
1.3 kB
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/01 - Server Operating Systems.txt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/04 - Remote Connection File Transfer.txt
1.2 kB
1 - Technical Support Fundamentals/12 - Impact of the Internet/03 - Gian What he does in Android Security.txt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/01 - Imaging Software.vtt
1.2 kB
2 - The Bits and Bytes of Computer Networking/10 - Introduction to the Transport and Application Layers/01 - Introduction to the Transport and Application Layers.txt
1.2 kB
1 - Technical Support Fundamentals/07 - Starting It Up/02 - Ben's Advice.txt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/17 - Linux - Removing Files & Directories.vtt
1.2 kB
4 - System Administration and IT Infrastructure Services/12 - File Services/01 - What are file services.txt
1.2 kB
1 - Technical Support Fundamentals/13 - Introduction to Software/06 - Phelan Navy.txt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/12 - Ben First Tech Job.txt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/05 - Windows - Mounting and Unmounting a Filesystem.vtt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/09 - Linux - Make Directories in Bash.vtt
1.2 kB
2 - The Bits and Bytes of Computer Networking/07 - The Network Layer/01 - The Network Layer.txt
1.2 kB
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/02 - Alex Why Networking.txt
1.2 kB
5 - IT Security - Defense against the digital dark arts/09 - Authentication/07 - TACACS+.txt
1.2 kB
1 - Technical Support Fundamentals/05 - The Modern Computer/04 - Joe Diversity.txt
1.2 kB
5 - IT Security - Defense against the digital dark arts/10 - Authorization/03 - Access Control List.txt
1.2 kB
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/04 - How do Qwiklabs Work.txt
1.2 kB
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/04 - Amir Interview.txt
1.2 kB
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/06 - Linux - Passwords.vtt
1.1 kB
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/01 - Module Introduction.vtt
1.1 kB
4 - System Administration and IT Infrastructure Services/25 - Final Project/02 - Alex passion & success.txt
1.1 kB
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/08 - Linux - Searching within Files.vtt
1.1 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/07 - Heather Self Learning.txt
1.1 kB
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/01 - Introduction.vtt
1.1 kB
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/06 - Linux - Archives.txt
1.1 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/02 - IT Infrastructure Services.txt
1.1 kB
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/04 - Heather Social Engineering.txt
1.1 kB
2 - The Bits and Bytes of Computer Networking/23 - Wireless Networking/01a - Supplemental Reading for Alphabet Soup.txt
1.1 kB
1 - Technical Support Fundamentals/02 - History of Computing/03 - Kevin Career.txt
1.1 kB
4 - System Administration and IT Infrastructure Services/20 - Active Directory/09a - Supplemental Reading for Group Policy Troubleshooting.txt
1.1 kB
4 - System Administration and IT Infrastructure Services/03 - Systems Administration Tasks/04 - Routine Maintenance.txt
1.1 kB
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/04 - Linux - Process Creation and Termination.txt
1.1 kB
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/01 - Intro to Defense in Depth.txt
1.1 kB
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/01a - Supplemental Reading Windows Devices and Drivers.txt
1.0 kB
2 - The Bits and Bytes of Computer Networking/09 - Routing/05a - Supplemental Reading for RFCs and Standards.txt
1.0 kB
4 - System Administration and IT Infrastructure Services/19 - LDAP/03 - Heather Overcoming Obstacles.txt
1.0 kB
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/01 - Module Introduction.vtt
1.0 kB
2 - The Bits and Bytes of Computer Networking/28 - IPv6/03a - Supplemental Reading for IPv6 and IPv4 Harmony.txt
1.0 kB
2 - The Bits and Bytes of Computer Networking/06 - Introduction/01 - Introduction to The Network Layer.txt
1.0 kB
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/07 - Linux - Changing Directories in Bash.txt
995 Bytes
1 - Technical Support Fundamentals/13 - Introduction to Software/04 - Revisiting Abstraction.txt
979 Bytes
4 - System Administration and IT Infrastructure Services/11 - Software Services/01 - Module Introduction.txt
976 Bytes
1 - Technical Support Fundamentals/17 - Documentation/03 - Documenting in Ticketing Systems.txt
954 Bytes
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/07 - Windows - Searching within Directories.vtt
927 Bytes
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/01 - Module Introduction.vtt
926 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/15 - Linux - Moving and Renaming Files, Directories.vtt
918 Bytes
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/04 - Linux - Signals.txt
914 Bytes
1 - Technical Support Fundamentals/15 - Troubleshooting Best Practices/07 - Amir Attributes.txt
911 Bytes
1 - Technical Support Fundamentals/19 - Course Wrap Up/02 - Sabrina No Degree.txt
894 Bytes
1 - Technical Support Fundamentals/12 - Impact of the Internet/06 - Learner Story - Melinda.vtt
864 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/14 - Windows - Moving and Renaming Files, Directories.txt
858 Bytes
2 - The Bits and Bytes of Computer Networking/21 - Broadband Connections/05a - Supplemental Reading for Broadband Protocols.txt
855 Bytes
2 - The Bits and Bytes of Computer Networking/02 - The TCPIP Five-Layer Network Model/01a - Supplementary Reading for The OSI Networking Model.txt
850 Bytes
5 - IT Security - Defense against the digital dark arts/21 - Course Wrap Up/01 - Congratulations!.txt
849 Bytes
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/01a - Supplemental Reading for Network Hardening Best Practices.txt
847 Bytes
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/08 - Linux - Adding and Removing Users.vtt
843 Bytes
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/01 - What are IT Infrastructure Services.txt
838 Bytes
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/02 - The Role of IT Infrastructure Services in SysAdmin.txt
837 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/01 - Module Introduction.vtt
836 Bytes
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/04 - Joe Personal Obstacle.txt
830 Bytes
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/01a - Supplemental Reading for The Future of Cryptanalysis.txt
826 Bytes
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/05a - Supplemental Readings for Antimalware Protection.txt
816 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/13 - Linux - Copying Files and Directories.txt
809 Bytes
5 - IT Security - Defense against the digital dark arts/06 - Public Key or Asymmetric Encryption/02a - Supplemental Reading for Asymmetric Encryption Attack.txt
807 Bytes
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/01 - Module Introduction.txt
790 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/02a - Supplemental Reading for Windows Software Packages.txt
784 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/05 - Windows - Changing Directories in the GUI.txt
772 Bytes
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/06a - Invitation to Sign Up for Big Interview.txt
757 Bytes
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/01 - Imaging Software.txt
750 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/05 - Windows - Mounting and Unmounting a Filesystem.txt
729 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/09 - Linux - Make Directories in Bash.txt
727 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/17 - Linux - Removing Files & Directories.txt
700 Bytes
4 - System Administration and IT Infrastructure Services/05 - Intro to IT Infrastructure Services/03a - Supplemental Reading for IT Infrastructure Services.txt
700 Bytes
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/01 - Introduction.txt
699 Bytes
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/06 - Linux - Passwords.txt
689 Bytes
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/08 - Linux - Searching within Files.txt
675 Bytes
4 - System Administration and IT Infrastructure Services/20 - Active Directory/10a - Supplemental Readings for Mobile Device Management.txt
665 Bytes
1 - Technical Support Fundamentals/06 - Components/07a - Supplemental Reading for Batteries and Charging Systems.txt
660 Bytes
4 - System Administration and IT Infrastructure Services/17 - Introduction to Directory Services/01 - Module Introduction.txt
655 Bytes
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/03a - Supplementary reading on HAProxy, nginx and Apache HTTP Server.txt
654 Bytes
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/06a - Supplemental Reading for Disk Encryption.txt
653 Bytes
5 - IT Security - Defense against the digital dark arts/19 - Incident Handling/03a - Supplemental Readings for Mobile Security and Privacy.txt
625 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/01 - Module Introduction.txt
623 Bytes
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/01 - Module Introduction.txt
588 Bytes
5 - IT Security - Defense against the digital dark arts/20 - Graded Assessments/01 - Final Assessment.vtt
586 Bytes
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/07a - Supplemental Readings for Mobile App Management.txt
581 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/04a - Supplemental Reading for Mobile App Packages.txt
560 Bytes
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/07 - Windows - Searching within Directories.txt
555 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/01 - Module Introduction.txt
532 Bytes
1 - Technical Support Fundamentals/09 - Installing an Operating System/04a - Supplemental Reading for Ubuntu.txt
527 Bytes
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/03a - Supplemental Reading for Windows Update.txt
519 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/15 - Linux - Moving and Renaming Files, Directories.txt
512 Bytes
1 - Technical Support Fundamentals/19 - Course Wrap Up/03 - Congratulations!.vtt
502 Bytes
2 - The Bits and Bytes of Computer Networking/04 - The Physical Layer/02a - Supplemental Reading for Ethernet Over Twisted Pair Technologies.txt
474 Bytes
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/08 - Linux - Adding and Removing Users.txt
471 Bytes
5 - IT Security - Defense against the digital dark arts/15 - System Hardening/04a - Supplemental Reading for Logging and Auditing.txt
468 Bytes
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/03a - Supplemental Reading for Remote Access and SSH.txt
453 Bytes
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/03a - Supplemental Readings for Mobile Device Resetting and Imaging.txt
442 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/11 - Linux - Command History.vtt
425 Bytes
1 - Technical Support Fundamentals/12 - Impact of the Internet/06 - Learner Story - Melinda.txt
424 Bytes
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/02a - Supplemental Reading for Promiscuous Mode.txt
424 Bytes
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/03 - Congratulations!.vtt
417 Bytes
3 - Operating Systems and You - Becoming a Power User/08 - Whats happening in the background/01a - Supplemental Reading for Windows Installers and Process Monitors.txt
414 Bytes
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/04a - Supplemental Reading for Linux Update.txt
414 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/10a - Supplemental Reading on NTFS File System.txt
409 Bytes
1 - Technical Support Fundamentals/08 - What's an Operating System/03a - Supplemental Reading for Remote Connections in Windows.txt
391 Bytes
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/03a - Supplemental reading for Remote Connections in Windows.txt
391 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/07a - Supplemental reading for Windows Package Dependencies.txt
378 Bytes
4 - System Administration and IT Infrastructure Services/18 - Centralized Management/01a - Supplemental Reading for Centralized Management.txt
362 Bytes
5 - IT Security - Defense against the digital dark arts/07 - Hashing/02a - Supplemental Reading for SHA1 Attacks.txt
351 Bytes
4 - System Administration and IT Infrastructure Services/26 - Course Wrap Up/01 - Congratulations!.vtt
349 Bytes
5 - IT Security - Defense against the digital dark arts/20 - Graded Assessments/01 - Final Assessment.txt
348 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/08a - Supplemental Reading for Windows Paging.txt
342 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/05a - Supplemental Reading for 7-Zip and PowerShell Zips.txt
341 Bytes
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/03a - Supplemental Reading for Securing Network Traffic.txt
341 Bytes
3 - Operating Systems and You - Becoming a Power User/15 - Virtualization/01a - Supplemental reading for Virtual Machines.txt
336 Bytes
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/02a - Supplemental Reading for Managing OpenLDAP.txt
334 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/04a - Supplemental Reading for Disk Partitioning and Formatting in Windows.txt
329 Bytes
4 - System Administration and IT Infrastructure Services/21 - OpenLDAP/01a - Supplemental Reading for OpenLDAP.txt
329 Bytes
4 - System Administration and IT Infrastructure Services/14 - Platform Services/02a - Supplemental Reading for Database Admin Jobs.txt
317 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/12a - Supplemental Reading for Windows Disk Usage.txt
310 Bytes
3 - Operating Systems and You - Becoming a Power User/17 - Operating System Deployment/02a - Supplemental Reading for OS Deployment Methods.txt
306 Bytes
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/04a - Supplemental Reading for Backup Solutions.txt
301 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/01a - Supplemental Reading for Windows CLI & Unix Bash.txt
299 Bytes
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/11a - Supplemental Reading for Windows PowerShell.txt
295 Bytes
5 - IT Security - Defense against the digital dark arts/10 - Authorization/02a - Supplemental Reading for Authorization.txt
287 Bytes
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/01a - Supplementary reading for WEP Encryption and Why You Shouldn't Use It.txt
282 Bytes
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/09a - Supplemental Readings for Mobile Users and Accounts.txt
280 Bytes
4 - System Administration and IT Infrastructure Services/11 - Software Services/03a - Supplemental Reading for Email Services.txt
278 Bytes
4 - System Administration and IT Infrastructure Services/20 - Active Directory/03a - Supplemental Reading for Group Security Principles.txt
271 Bytes
1 - Technical Support Fundamentals/19 - Course Wrap Up/03 - Congratulations!.txt
264 Bytes
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/02a - Supplemental Reading for Linux PPAs.txt
255 Bytes
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/01a - Supplemental Reading for Reading Process Information in Windows.txt
255 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/11 - Linux - Command History.txt
253 Bytes
5 - IT Security - Defense against the digital dark arts/09 - Authentication/02a - Supplemental Reading for Authentication.txt
252 Bytes
1 - Technical Support Fundamentals/06 - Components/01a - Supplemental Reading for CPU architecture.txt
250 Bytes
1 - Technical Support Fundamentals/05 - The Modern Computer/03a - Supplemental Reading for CPUs.txt
247 Bytes
5 - IT Security - Defense against the digital dark arts/17 - Risk in the Workplace/02a - Supplemental Reading for Risk in the Workplace.txt
246 Bytes
2 - The Bits and Bytes of Computer Networking/29 - Course Wrap Up/03 - Congratulations!.txt
245 Bytes
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/01a - Supplemental Reading for Windows Package Managers.txt
239 Bytes
5 - IT Security - Defense against the digital dark arts/02 - Malicious Software/04a - Supplemental Reading for Malicious Software.txt
227 Bytes
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/03 - Congratulations!.vtt
224 Bytes
4 - System Administration and IT Infrastructure Services/12 - File Services/02a - Supplemental Reading for Network File Storage.txt
221 Bytes
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/02a - Supplemental Reading for DDoS Attacks.txt
220 Bytes
1 - Technical Support Fundamentals/08 - What's an Operating System/05a - Supplemental Reading for ReFS File System.txt
218 Bytes
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/01a - Supplemental Reading Resource Monitoring in Windows.txt
218 Bytes
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/04a - Supplemental Reading for TPM Attacks.txt
212 Bytes
3 - Operating Systems and You - Becoming a Power User/11 - Life of a Process/03a - Supplemental Reading for Process Creation and Termination in Windows.txt
210 Bytes
4 - System Administration and IT Infrastructure Services/12 - File Services/03a - Supplemental Readings for Mobile Synchronization.txt
208 Bytes
4 - System Administration and IT Infrastructure Services/07 - Network Services/01a - Supplmental Reading for FTP Clients.txt
205 Bytes
4 - System Administration and IT Infrastructure Services/15 - Troubleshooting Platform Services/01a - Supplemental Reading for Troubleshooting with Developer Tools.txt
205 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/09a - Supplemental Reading for Linux Swap.txt
204 Bytes
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/04a - Supplemental Reading for GNU Documentation.txt
203 Bytes
4 - System Administration and IT Infrastructure Services/07 - Network Services/07a - Supplemental Reading for DNS and DHCP.txt
203 Bytes
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/01a - Supplemental Reading for the X.509 Standard.txt
202 Bytes
5 - IT Security - Defense against the digital dark arts/03 - Network Attacks/01a - Supplemental Reading for Network Attacks.txt
196 Bytes
4 - System Administration and IT Infrastructure Services/11 - Software Services/02a - Supplemental Reading for Chat Communication Services.txt
193 Bytes
3 - Operating Systems and You - Becoming a Power User/16 - Logging/03a - Supplemental Reading for Linux Logs.txt
191 Bytes
5 - IT Security - Defense against the digital dark arts/14 - Network Monitoring/03a - Supplemental reading for Intrusion Detection-Prevention System.txt
190 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/08a - Supplemental Reading for Linux Package Dependencies.txt
189 Bytes
4 - System Administration and IT Infrastructure Services/14 - Platform Services/01a - Supplemental Reading for Web Servers (Revisited).txt
183 Bytes
4 - System Administration and IT Infrastructure Services/26 - Course Wrap Up/01 - Congratulations!.txt
177 Bytes
1 - Technical Support Fundamentals/09 - Installing an Operating System/01a - Supplemental Reading for Choosing an OS.txt
174 Bytes
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/01a - Supplemental Reading for Windows ACL.txt
173 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/13a - Supplemental reading for Linux Disk Usage.txt
173 Bytes
5 - IT Security - Defense against the digital dark arts/13 - Wireless Security/02a - Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability.txt
173 Bytes
4 - System Administration and IT Infrastructure Services/20 - Active Directory/05a - Supplemental Reading for DFL & FFL.txt
172 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/02a - Supplemental Reading for FAT32 File System.txt
169 Bytes
1 - Technical Support Fundamentals/08 - What's an Operating System/04a - Supplemental Reading for Chrome OS.txt
163 Bytes
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/02a - Supplemental Reading for GitLabs Data Recovery.txt
162 Bytes
3 - Operating Systems and You - Becoming a Power User/05 - Permissions/05a - Supplemental Reading for Special Permissions in Windows.txt
161 Bytes
3 - Operating Systems and You - Becoming a Power User/02 - Basic Commands/02a - Supplemental Reading for 'Size' vs 'Size of Disk' in Windows.txt
160 Bytes
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/05a - Supplemental Reading for Managing Processes in Windows.txt
160 Bytes
3 - Operating Systems and You - Becoming a Power User/14 - Remote Access/05a - Supplemental Reading for Remote Connection File Transfer in Windows.txt
159 Bytes
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/02a - Supplemental Reading for Reading Process Information in Linux.txt
156 Bytes
3 - Operating Systems and You - Becoming a Power User/09 - Device Software Management/02a - Supplemental reading for Linux Devices and Drivers.txt
155 Bytes
3 - Operating Systems and You - Becoming a Power User/12 - Managing Processes/04a - Supplemental Reading for Windows Signal.txt
154 Bytes
5 - IT Security - Defense against the digital dark arts/18 - Users/02a - Supplemental Reading for Vendor Security Assessment Questionnaires.txt
154 Bytes
5 - IT Security - Defense against the digital dark arts/08 - Cryptography Applications/02a - Supplemental Reading for PGP.txt
149 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/07a - Supplemental reading Mounting and Unmounting a Filesystem in Linux.txt
148 Bytes
4 - System Administration and IT Infrastructure Services/06 - Physical Infrastructure Services/01a - Supplemental Reading for Server Operating Systems.txt
148 Bytes
1 - Technical Support Fundamentals/06 - Components/04a - Supplemental Reading for Data Storage.txt
147 Bytes
4 - System Administration and IT Infrastructure Services/19 - LDAP/01a - Supplemental Reading for LDAP.txt
138 Bytes
3 - Operating Systems and You - Becoming a Power User/10 - Filesystem Types/15a - Supplemental Reading for Linux Filesystem Repair.txt
137 Bytes
4 - System Administration and IT Infrastructure Services/19 - LDAP/02a - Supplemental Reading for Kerberos.txt
135 Bytes
5 - IT Security - Defense against the digital dark arts/12 - Secure Network Architecture/02a - Supplemental Reading on IEEE 802.1X.txt
133 Bytes
1 - Technical Support Fundamentals/12 - Impact of the Internet/02a - Supplemental Reading for Internet of Things.txt
132 Bytes
4 - System Administration and IT Infrastructure Services/20 - Active Directory/01a - Supplemental Reading for Active Directory.txt
130 Bytes
3 - Operating Systems and You - Becoming a Power User/06 - Software Distribution/06a - Supplemental Reading for the Linux Tar Command.txt
124 Bytes
5 - IT Security - Defense against the digital dark arts/18 - Users/01a - Supplemental Reading for User Habits.txt
124 Bytes
3 - Operating Systems and You - Becoming a Power User/04 - Users and Groups/05a - Supplemental Reading for Windows Passwords.txt
123 Bytes
3 - Operating Systems and You - Becoming a Power User/07 - Package Managers/02b - Supplemental Reading on GIMP.txt
123 Bytes
3 - Operating Systems and You - Becoming a Power User/13 - Process Utilization/02a - Supplemental reading for Resource Monitoring in Linux.txt
123 Bytes
1 - Technical Support Fundamentals/06 - Components/08a - Supplemental Reading for USB Peripherals.txt
122 Bytes
3 - Operating Systems and You - Becoming a Power User/18 - Course Wrap Up/03 - Congratulations!.txt
118 Bytes
5 - IT Security - Defense against the digital dark arts/05 - Symmetric Encryption/03a - Supplemental Reading for Symmetric Encryptions.txt
113 Bytes
1 - Technical Support Fundamentals/03 - Digital Logic/03a - Supplemental Reading on Logic Gates.txt
112 Bytes
1 - Technical Support Fundamentals/13 - Introduction to Software/03a - Supplemental Reading for Software Versioning.txt
112 Bytes
4 - System Administration and IT Infrastructure Services/07 - Network Services/06a - Supplemental Reading for BIND-PowerDNS.txt
112 Bytes
4 - System Administration and IT Infrastructure Services/20 - Active Directory/04a - Supplemental Reading for EFS Features.txt
112 Bytes
4 - System Administration and IT Infrastructure Services/12 - File Services/01a - Supplemental Reading for File Services.txt
104 Bytes
4 - System Administration and IT Infrastructure Services/02 - What is System Administration/02a - Supplemental Reading on KVM switch.txt
102 Bytes
4 - System Administration and IT Infrastructure Services/22 - Planning for Data Recovery/06a - Supplemental Reading for RAID Levels.txt
100 Bytes
3 - Operating Systems and You - Becoming a Power User/03 - File and Text Manipulation/03a - Supplemental Reading for Notepad++.txt
96 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>