PLU | Computer Fundamentals: Operational Procedures (2019 EN)

Discussion in 'Information Technology' started by Kanka, Jul 27, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Daniel Lachance
    Full Title: Computer Fundamentals: Operational Procedures
    Year: 2019
    Language: English
    Genre: Educational: Information Technology
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Exercise Files, Slides .PDF)
    Time: 01:41:04
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 180 kbps
    Audio: AAC at 96 Kbps, 2 channels, 44.1 KHz



    Through this course you will learn how to create and use various types of IT-related documentation, how to keep private data safe, and how to secure mobile devices. You'll also learn about centralized change management and malware mitigation.

    Organizations use standard sets of policies and procedures for the consistent application of best practices to ensure IT systems and data are functional and protected. In this course, Computer Fundamentals: Operational Procedures, you will first learn about IT documentation and how to conduct yourself in a professional manner. Next, you'll explore environmental factors, software licensing, how to follow safety guidelines when at work, options that enable centralized change management, and disaster recovery. Finally, you'll examine remote access protocols and the basics of script automation using PowerShell and Bash. By the end of this course you'll have a foundational understanding of best practices to protect and manage IT systems and data.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Documentation, Professionalism, and Environmental Factors
    02. Module Introduction
    03. Documentation
    04. Demo: Generate a Network Topology Map
    05. Demo: View Hardware Inventory Using SCCM
    06. Professionalism
    07. Environmental Factors
    08. Module Summary
    3. Licensing, Privacy, and Playing It Safe
    09. Module Introduction
    10. Licensing
    11. Privacy
    12. Demo: Encrypt a File Using Third-party Tools
    13. Playing It Safe
    14. Module Summary

    4. Change Management and Disaster Recovery
    15. Module Introduction
    16. Change Management
    17. Demo: Microsoft System Center Configuration Manager Configuration Baselines
    18. Disaster Recovery
    19. Redundancy
    20. Demo: Create a Windows Recovery Disk
    21. Module Summary
    5. Scripting and Remote Access
    22. Module Introduction
    23. Scripting Basics
    24. Demo: Create a Microsoft PowerShell Script
    25. Demo: Create a Linux Bash Shell Script
    26. Remote Access
    27. Demo: Use RDP for Remote Access to a Windows Server
    28. Demo: Use SSH for Remote Access to a Linux Server
    29. Module Summary


    -------------