Networking, PC Security, and PC Troubleshooting - Online Courses

These online courses are 6 weeks long, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week. You are not required to be online at any specific time. You register and pay on our website and instructions on how to access your course will be emailed to you immediately after registration.



Advanced PC Security

Advanced PC Security

$190 + applicable tax

When is hacking legal? When you use it to secure your own network. This new method of hacking, called ethical hacking or white-hat hacking, uses common and readily available hacking tools and techniques to audit your network so you can locate and close security holes. Whether you're running a small home network or you're an enterprise network administrator, this course will teach you how to better protect your system against those who wish to gain unauthorized access.

You'll gain an understanding of the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. You'll follow packets of data from one point to another through an entire network, and find out where the flaws exist for data loss and security breaches. You'll discover the role of the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. And you'll find out how private data can quickly become public knowledge.

Hackers are costing businesses around the globe several billions of dollars every year. Don't become part of that sad statistic. Sooner or later, you know that somebody is going to try and break into your network. Why not learn how hackers think so you can harden your defenses against them?

Week 1 Wednesday - Lesson 1

Introduction to Hacking
If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!

Week 1 Friday - Lesson 2

Social Engineering
This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!

Week 2 Wednesday - Lesson 3

Google Hacking 101
If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.

Week 2 Friday - Lesson 4

Google Hacking 102
In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!

Week 3 Wednesday - Lesson 5

The Network Model
Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model. And I assure you it will be painless!

Week 3 Friday - Lesson 6

The Internet and Packet Spoofing
Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.

Week 4 Wednesday - Lesson 7

Vulnerabilities
Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.

Week 4 Friday - Lesson 8

Port Scanning and Discovery
We all know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, we'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.

Week 5 Wednesday - Lesson 9

Services
While the term necessary evil is a cliché, we do have a few necessary evils in the computing world. In order to make networks function, sometimes we need to run programs that might not be good for our security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.

Week 5 Friday - Lesson 10

More Evil Network Services
Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's both hard to find and hard to get rid of rootkits, so for the sake of your PC's security, get ready to apply this lesson today!

Week 6 Wednesday - Lesson 11

Audit Plan and Risk
Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, we'll talk about what to do once you've found them.

Week 6 Friday - Lesson 12

Computer Forensics
If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.
Completion of Debbie Mahler's online Introduction to PC Security course (or equivalent experience), or completion of David Iseminger's online Introduction to Networking course (or equivalent experience). You must be familiar with PC and networking terminology and have at least a basic knowledge of how networks function. You will also need access to one or more networked computers that do not contain any data you consider sensitive.
Course Details
This course is fully online, you require internet access and an email account. The course duration is 6 weeks, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week, for a total of 12. You are not required to be online at any specific time.

In addition to the specific lesson content, there is a discussion board with each lesson and often there is an optional assignment to apply the learning.

Following each lesson, there is a short multiple choice quiz. Your score on these quizzes does not count towards the final mark but completing these helps solidify your learning as well as prepare you for the final exam.

The final exam is an open-book, multiple choice exam and you need to achieve a minimum of 65% on the final exam to pass the course. There is only one opportunity to pass the exam. A certificate of completion from Ed2Go is available for printing immediately upon successful completion of the course and a certificate from the University of Waterloo will be mailed typically 4-6 weeks later.

Certificates
Many of the Ed2Go courses are eligible towards the various online certificates offered by Professional Development.

Choose your course start date:

Aug 14, 2019Sep 11, 2019Oct 16, 2019Nov 13, 2019Dec 11, 2019Jan 15, 2020
Intermediate Networking

Intermediate Networking

$190 + applicable tax

Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more. You'll gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.

Week 1 Wednesday - Lesson 1

Getting up to Speed
In our first lesson, you'll learn about the concept of a network stack. After a succinct review of essential network and networking terms, we'll compare the theoretical structure of a network stack—commonly called the OSI model—to real-world networking. We'll then trace how data travels through the computer for transmission on the network.

Week 1 Friday - Lesson 2

Path of a Packet
We'll pick up right where the last lesson left off today when we begin our discussion on how a unit of computer data—called a packet—gets from one computer to another. You'll learn all about how packets are formed, how packets are sometimes chopped then reassembled to go across WAN links, and how the receiving computer handles packets upon arrival. You'll also learn why the network's most important device is the router.

Week 2 Wednesday - Lesson 3

Routing
Today's lesson is dedicated to helping you understand how routers operate. You'll learn all about how routers create a virtual map of the entire Internet. You'll also see how routers connect to different network types—an Ethernet segment and an ATM link, for example—transmit data across those different mediums. Then we'll discuss why routers have their own special languages, called routing protocols.

Week 2 Friday - Lesson 4

Routing Protocols Explained
Today you'll learn the language of routers: routing protocols. You'll learn why some routing protocols are appropriate for smaller networks, and why very large networks require specialized routing protocols. You'll also learn about the two most revealing measurements of a router's capability: latency and packets per second (pps).

Week 3 Wednesday - Lesson 5

TCP/IP in Detail
You've heard of TCP/IP, but its details may seem mysterious. After you complete this lesson, those mysteries will be banished forever! You'll learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP. Prepare to demystify TCP/IP!

Week 3 Friday - Lesson 6

Fundamentals of Networking Security
Security is on everyone's mind these days, so in this lesson, you'll learn the fundamentals of how computers enforce security. You'll learn what a security descriptor is and how it can allow some people to only read a document, while others can delete or modify the document as much as they like. You'll also learn the difference between a security implementation and security protocols. Finally, you'll find out how security operates in a Windows environment, including exactly what happens during log on, authentication, and authorization.

Week 4 Wednesday - Lesson 7

Encryption
In today's lesson, we'll explore encryption, a method used to secure data for transmission over the Internet. You'll learn about various encryption schemes, and you'll get firsthand knowledge of how a chunk of data gets encrypted, how it gets decrypted on the receiving end, and how this process can be secure. You'll also learn how Secure Sockets Layer (SSL) makes it safe for you to order merchandise online, and how SSL ensures that your connection to the seller's Web site is secure.

Week 4 Friday - Lesson 8

Virtual Private Networks
The Internet is a great public network, but what if you need it for private communication? For example, what if a salesman needs to make a private connection to her company's network to check on special bulk pricing? In today's lesson, you'll learn how you can create a virtual private network out of your Internet connection. You'll get a hands-on view of how these private connections are made, and why they're so useful.

Week 5 Wednesday - Lesson 9

DNS Names, Concepts, and Components
The Internet, and almost every other network today, uses Domain Name System (DNS) to translate names we understand (like www addresses) into IP addresses that computers can use. It's important to understand how this system works, so in this chapter you'll learn details about how DNS operates. You'll learn how resource records are the building blocks of DNS, and how DNS scales to the entire Internet by being broken into zones.

Week 5 Friday - Lesson 10

DNS Resource Records and Resolution
We'll expand on our discussion of DNS in this lesson. Here you'll learn about the most important types of resource records, including A records, SOA records, and others. You'll also learn about the two types of DNS queries: recursive and iterative. There are many other resource record types, and you'll learn about those today, too. By the end of this lesson, it'll be clear just how important DNS is to our daily lives!

Week 6 Wednesday - Lesson 11

Internet Servers and Services
In this lesson, you'll learn how Internet Servers operate, including how a Web page is requested and transmitted to your computer, then displayed on your screen. You'll also learn about the two primary Web protocols—HTTP and HTML. There are other Internet-based services, such as e-mail servers, news servers, and instant messaging, and we'll investigate those in this lesson, too.

Week 6 Friday - Lesson 12

Understanding Servers
Have you ever wondered about the difference between a desktop computer and a server? Have you heard of cloud computing, but don’t know exactly what it means? In our final lesson, we'll go over the differences between server-class operating systems and server-class computers, and we’ll talk in-depth about the various hardware components that comprise a true server-class computer. Understanding why a desktop computer shouldn't be used as a departmental server is important! You’ll also learn what cloud computing is, why it’s such a compelling platform, and how datacenters provide all that computing power.
Microsoft Windows 95 or better, and completion of David Iseminger's Introduction to Networking course (or equivalent experience).
Course Details
This course is fully online, you require internet access and an email account. The course duration is 6 weeks, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week, for a total of 12. You are not required to be online at any specific time.

In addition to the specific lesson content, there is a discussion board with each lesson and often there is an optional assignment to apply the learning.

Following each lesson, there is a short multiple choice quiz. Your score on these quizzes does not count towards the final mark but completing these helps solidify your learning as well as prepare you for the final exam.

The final exam is an open-book, multiple choice exam and you need to achieve a minimum of 65% on the final exam to pass the course. There is only one opportunity to pass the exam. A certificate of completion from Ed2Go is available for printing immediately upon successful completion of the course and a certificate from the University of Waterloo will be mailed typically 4-6 weeks later.

Certificates
Many of the Ed2Go courses are eligible towards the various online certificates offered by Professional Development.

Choose your course start date:

Aug 14, 2019Sep 11, 2019Oct 16, 2019Nov 13, 2019Dec 11, 2019Jan 15, 2020
Introduction to Networking

Introduction to Networking

$190 + applicable tax

Introduction to Networking explains computer networking basics in terms that you can easily understand, using concepts common to everyday, non-computing experience. A brief introduction to networking history provides context, explaining how networks have become so important to businesses and individuals. The course emphasizes networking fundamentals, explaining the software and hardware that makes networking possible. The course stresses understanding how and why networks work, rather than focusing on memorization of terms or numbers.

Upon completion of the course, you will be capable of performing basic computer networking tasks, such as DSL connectivity, configuring connections to an Internet Service Provider, and creating a private network. This course will give you the foundation you need to begin training for CCNA Certification or employment in a computer networking career.

Week 1 Wednesday - Lesson 1

History of Networking
Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

Week 1 Friday - Lesson 2

How Networks Operate
In today's lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks.

Week 2 Wednesday - Lesson 3

Peer-to-Peer versus Client/Server
Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in today's lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

Week 2 Friday - Lesson 4

Network Types and Topologies
Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet, and a whole lot more. Here you'll find out the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson, you'll get those answers and many more!

Week 3 Wednesday - Lesson 5

Segmentation and Routing
In today's lesson, we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

Week 3 Friday - Lesson 6

Protocols
When people communicate, they speak a language—such as English—to exchange information. Computers communicate similarly over a network, but instead of speaking a language, they use something called a protocol. Protocols are similar to languages, and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

Week 4 Wednesday - Lesson 7

TCP/IP
In today's lesson, you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and today we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner—it's similar to how we use street addresses.

Week 4 Friday - Lesson 8

Name Resolution and Services
Have you ever wondered how your computer converts a World Wide Web address into a website that appears on your screen? In this lesson, you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

Week 5 Wednesday - Lesson 9

Wide Area Networks (WANs)
Today, we'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

Week 5 Friday - Lesson 10

Remote Access
If you connect to the Internet, you use remote access. In today's lesson, we'll explore the traditional means of connecting to remote LANs, and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

Week 6 Wednesday - Lesson 11

Making Internet Connections
In this lesson, you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there, we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

Week 6 Friday - Lesson 12

Review and Conclusion
In our final lesson, we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!

Course Details
This course is fully online, you require internet access and an email account. The course duration is 6 weeks, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week, for a total of 12. You are not required to be online at any specific time.

In addition to the specific lesson content, there is a discussion board with each lesson and often there is an optional assignment to apply the learning.

Following each lesson, there is a short multiple choice quiz. Your score on these quizzes does not count towards the final mark but completing these helps solidify your learning as well as prepare you for the final exam.

The final exam is an open-book, multiple choice exam and you need to achieve a minimum of 65% on the final exam to pass the course. There is only one opportunity to pass the exam. A certificate of completion from Ed2Go is available for printing immediately upon successful completion of the course and a certificate from the University of Waterloo will be mailed typically 4-6 weeks later.

Certificates
Many of the Ed2Go courses are eligible towards the various online certificates offered by Professional Development.

Choose your course start date:

Aug 14, 2019Sep 11, 2019Oct 16, 2019Nov 13, 2019Dec 11, 2019Jan 15, 2020
Introduction to PC Security

Introduction to PC Security

$190 + applicable tax

What you don't know about PC security really can hurt you! Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This course, taught by a security expert, will quickly bring you up to speed on the fundamentals of PC and network security.

You'll understand and explore the many vulnerabilities of operating systems, software, and networks. Then, you'll get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You'll find out why, where, and how viruses, worms, and blended threats are created. You'll be able to identify and work to prevent DoS, SYN flooding, and other network attacks. You'll learn a safe way to share files and data across the Internet through a virtual private network. And you'll be able to install and configure a firewall to build an impenetrable moat around your computer or network.

Course Revised December 2013

Week 1 Wednesday - Lesson 1

Introduction to PC Security
In our first lesson, you'll learn the facts--and the myths--about PC security. Then, I'll introduce you to the language of security and explain what you need to know about each acronym. By the end of this lesson, you'll also be able to assess your own risk, whether you're an individual or manage a network of any size. You'll also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

Week 1 Friday - Lesson 2

Your PC and Network
If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you'll find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

Week 2 Wednesday - Lesson 3

PCs, Networks, and Software Demystified
Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you'll learn all about it in this lesson. I'll also teach you how, why, and where the weak links of security are in software and operating systems.

Week 2 Friday - Lesson 4

Viruses, Worms, Blended Threats, and More
Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. I'll also show you why people create them and where they come from. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

Week 3 Wednesday - Lesson 5

The Family of Malware
We’ll introduce you to the ware family in this lesson. Who is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You'll meet them and learn all about their family traits and values. I'll also show you where they live, places they frequent, and how to remove these unwelcome guests that inhabit your PC.

Week 3 Friday - Lesson 6

Exploits and Vulnerabilities
You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you'll find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

Week 4 Wednesday - Lesson 7

Network Attacks
Have you ever tried to access the Web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? If so, you may have been under an attack! Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. Why? Because beginners don't know what they are, why they're happening, or where they're coming from. After this lesson, you'll no longer be left wondering what happened to your Internet connection.

Week 4 Friday - Lesson 8

Everything You Wanted to Know About Firewalls! (Part One)
This lesson will introduce you to firewalls. Join me in this lesson, and you'll soon start building an impenetrable moat around your network.

Week 5 Wednesday - Lesson 9

Everything You Wanted to Know About Firewalls! (Part Two)
Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you'll learn how to configure your firewall and maximize your network security.

Week 5 Friday - Lesson 10

Laptops, Notebooks, Netbooks, and Wireless Networking
You may want to check out this lesson before you grab your laptop and run off to the next Internet café, because what you learn today may surprise you! Laptops and wireless connectivity are the buzzwords of the moment, but these two technologies aren't as secure as they appear. You'll understand why in this lesson.

Week 6 Wednesday - Lesson 11

Virtual Private Networking (VPN)
I'm going to share my love for VPNs with you today. You'll learn what a Virtual Private Network is, how it's different from standard networks, how it works, how to secure it, and how to set up your own. Just think about the possibilities! You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

Week 6 Friday - Lesson 12

The Changing Face of Security
Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? Have no fear, for I'll show you a simple method for staying up-to-date with those security issues that only pertain to you. You'll also learn about emerging security technology, sources to use that will help make the job of managing and securing your network easier, and creating a checklist to keep handy. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.
A familiarity with general computing terminology, an understanding of any operating system you are using (as in: Mac, Windows, Linux) and an ability to locate programs and change settings.
Course Details
This course is fully online, you require internet access and an email account. The course duration is 6 weeks, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week, for a total of 12. You are not required to be online at any specific time.

In addition to the specific lesson content, there is a discussion board with each lesson and often there is an optional assignment to apply the learning.

Following each lesson, there is a short multiple choice quiz. Your score on these quizzes does not count towards the final mark but completing these helps solidify your learning as well as prepare you for the final exam.

The final exam is an open-book, multiple choice exam and you need to achieve a minimum of 65% on the final exam to pass the course. There is only one opportunity to pass the exam. A certificate of completion from Ed2Go is available for printing immediately upon successful completion of the course and a certificate from the University of Waterloo will be mailed typically 4-6 weeks later.

Certificates
Many of the Ed2Go courses are eligible towards the various online certificates offered by Professional Development.

Choose your course start date:

Aug 14, 2019Sep 11, 2019Oct 16, 2019Nov 13, 2019Dec 11, 2019Jan 15, 2020
Introduction to PC Troubleshooting

Introduction to PC Troubleshooting

$190 + applicable tax

Don't spend your hard-earned cash on expensive PC repairs! The vast majority of the problems people experience with their computers are completely avoidable, and most can be solved with nothing more than a few minutes of your time. Intro to PC Troubleshooting takes you step by step through the typical hardware and operating system problems encountered by technicians, teaching troubleshooting techniques to decipher any problem, and giving you the skills you need to solve them. Once you've mastered the basics, the course launches into some of the more advanced and nasty problems that crop up in the PC, teaching you how to diagnose and fix those problems as well! Finally, Intro to PC Troubleshooting shows you how to maintain and optimize a Windows PC. So what are you waiting for? Let's troubleshoot - and fix - some PCs!

Week 1 Wednesday - Lesson 1

The Computing Process
Lesson 1 starts you on the path to troubleshooting PCs like a pro. You’ll first look at input devices, or how you tell the computer to do stuff. In the second part of the lesson, you’ll explore the pieces that do the work inside the computer. The final section describes the output devices, where the computer communicates to you.

Week 1 Friday - Lesson 2

Troubleshooting Theory

This lesson will take you through the troubleshooting process. It’s not a guide to solving specific computer problems, but the steps explained here will enable you to tackle any computer problems you might encounter. The three main steps are identifying the problem, testing solutions, and completing the process.

Week 2 Wednesday - Lesson 3

Operating System Overview
Lesson 3 introduces you to some of the basic components and tools of an operating system. First, you’ll find out about the primary functions of operating systems. You’ll then explore the major parts of Microsoft Windows, including the Desktop and Windows Explorer. You’ll finish the lesson by learning about the most important troubleshooting tools for fixing operating systems.

Week 2 Friday - Lesson 4

OS Fixes
Lesson 4 leads you through the basic steps of troubleshooting an operating system, including startup, video, sound, and application errors. You’ll look at tools like Safe Mode and the System Configuration utility and learn about driver rollback. You’ll end the lesson by learning how to troubleshoot audio/visual errors.

Week 3 Wednesday - Lesson 5

Avoiding OS Obstacles
How would you like to prevent system problems instead of rushing to fix them? In this lesson, you’ll master the three most important types of preventive maintenance: backing up data that’s on a hard drive, updating or upgrading the operating system, and using Windows utilities that help you monitor and maintain the OS.

Week 3 Friday - Lesson 6

Networking Basics
Lesson 6 covers the basics of networking. First, you’ll find out how networks work and what the necessary components are for a wired network. Next, you’ll discover wireless networks and everything that separates them from their wired-network brethren. Finally, you’ll learn about the biggest network of them all, the Internet.

Week 4 Wednesday - Lesson 7

Troubleshooting Network and Internet Issues
Lesson 7 covers the steps to take when trying to fix your network or Internet connections. You’ll learn how to troubleshoot wired and wireless networks, share files, and fix a dial-up or broadband Internet connection.

Week 4 Friday - Lesson 8

Preventing Internet Problems
Keep your computer safe from Internet-based attacks, including viruses and spyware! You’ll discover the many types of malicious software that can infect your computer, and I’ll walk you through the five-step process of recovering from a virus infection. You’ll also read about safe browsing and safe email use, and you’ll find out how to configure a firewall to help defend your PC.

Week 5 Wednesday - Lesson 9

Introduction to PC Hardware
All PC techs needs to get their hands dirty eventually, which means diving inside the case and checking things out from the inside. In this lesson, I’ll teach you about the power of different PC parts, including what to look for when shopping for new parts. I’ll also guide you in the safe and proper handling of components.

Week 5 Friday - Lesson 10

Installing Hardware
Replacing hardware components can dramatically improve your PC's performance. For instance, RAM can speed up your computer, a second hard drive increases your data storage capacity, and expansion cards can add features and ports to your computer. In this lesson, you'll learn to handle RAM, hard drives, and expansion cards.

Week 6 Wednesday - Lesson 11

Maintaining Hardware
Dirt happens! You can't make your PC last forever, but you can make it last longer and run better by keeping it clean. Get out your canned air and your distilled water (but not your pencil erasers or your household vacuum cleaner), and I'll show you safe and effective ways to check, clean, and maintain the inside and outside of your computer. We'll also talk about how to donate an old computer, and I'll explain how to throw away a computer without losing data or harming the environment.

Week 6 Friday - Lesson 12

Life of a PC Troubleshooter
You've come a long way since the beginning of this course. Before you complete your PC troubleshooting training, I'll remind you about the computing process and about troubleshooting theory. Combined with your new knowledge of PC hardware, software, and networking, you can use these tools to fix all sorts of problems. I'll also discuss your future as a PC troubleshooter, including the certifications and careers available to anyone with the right skills.
A computer equipped with any Microsoft Windows 95 or better. You will also need access to one or more computers that do not contain any data you consider sensitive.
Course Details
This course is fully online, you require internet access and an email account. The course duration is 6 weeks, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week, for a total of 12. You are not required to be online at any specific time.

In addition to the specific lesson content, there is a discussion board with each lesson and often there is an optional assignment to apply the learning.

Following each lesson, there is a short multiple choice quiz. Your score on these quizzes does not count towards the final mark but completing these helps solidify your learning as well as prepare you for the final exam.

The final exam is an open-book, multiple choice exam and you need to achieve a minimum of 65% on the final exam to pass the course. There is only one opportunity to pass the exam. A certificate of completion from Ed2Go is available for printing immediately upon successful completion of the course and a certificate from the University of Waterloo will be mailed typically 4-6 weeks later.

Certificates
Many of the Ed2Go courses are eligible towards the various online certificates offered by Professional Development.

Choose your course start date:

Aug 14, 2019Sep 11, 2019Oct 16, 2019Nov 13, 2019Dec 11, 2019Jan 15, 2020
Wireless Networking

Wireless Networking

$190 + applicable tax

Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones , and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

You'll learn how wireless works, how wireless devices connect to networks, and how to build and connect to your own wireless network. We'll also explore wireless standards, wireless security, satellite Internet and cellular phone technology, as well as the future of wireless.

Becoming knowledgeable about wireless networking is easier than ever. With a helpful instructor who is also a working industry expert, a practical and thoughtful approach to teaching, and an emphasis on giving you a practical, hands-on understanding how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.

Course Revised January 2013

Week 1 Wednesday - Lesson 1

Networking Basics
The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today the Internet serves millions of e-mails and Web pages every few minutes, connecting millions of users from all over the world. And today, wireless networking is the hottest networking technology around. People who use wireless networks can check e-mail from their favorite coffee shop, surf the Internet from their couch, and even get instant messages on their Internet-connected cellular phone. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

Week 1 Friday - Lesson 2

How Wireless Networking Works
Did you ever wonder how your radio turns invisible waves into music? Or have you wondered why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. In this lesson, I'll explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

Week 2 Wednesday - Lesson 3

Standards in the Wireless World
Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. And yes, you'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

Week 2 Friday - Lesson 4

Wireless Devices
If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

Week 3 Wednesday - Lesson 5

Wireless Networks—Short Range
In this lesson, we'll investigate short-range wireless network technologies. You'll learn all about Bluetooth (it has nothing to do with dentistry!), Wi-Fi, and the details that make each technology unique. We'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

Week 3 Friday - Lesson 6

Wireless Networks—Long Range
Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? I certainly would! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

Week 4 Wednesday - Lesson 7

Creating a Wireless Network—Part 1
Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! In this lesson, I'll walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

Week 4 Friday - Lesson 8

Creating a Wireless Network—Part 2
In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

Week 5 Wednesday - Lesson 9

Connecting to a Wireless Network—Part 1
Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then we'll look at the similarities and differences between Windows and Apple software.

Week 5 Friday - Lesson 10

Connecting to a Wireless Network—Part 2
Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

Week 6 Wednesday - Lesson 11

Security in Wireless Networks
You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

Week 6 Friday - Lesson 12

Conclusions and the Future
What is the future of wireless networking? Are we there? Is this as cool as it's going to get or are we going to see all sorts of new wireless technologies in the future? In this lesson, I'll give you my thoughts on where the future of wireless networking is headed and what that future might have in store. We'll discuss the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is open, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add you own thoughts to our discussion on the future of networking—this will be an especially interesting and exciting lesson!
Completion of David Iseminger's Introduction to Networking online course (or equivalent experience).
Course Details
This course is fully online, you require internet access and an email account. The course duration is 6 weeks, followed by a 2-week period to complete the final exam (online, open book). Lessons are released on Wednesdays and Fridays of each week, for a total of 12. You are not required to be online at any specific time.

In addition to the specific lesson content, there is a discussion board with each lesson and often there is an optional assignment to apply the learning.

Following each lesson, there is a short multiple choice quiz. Your score on these quizzes does not count towards the final mark but completing these helps solidify your learning as well as prepare you for the final exam.

The final exam is an open-book, multiple choice exam and you need to achieve a minimum of 65% on the final exam to pass the course. There is only one opportunity to pass the exam. A certificate of completion from Ed2Go is available for printing immediately upon successful completion of the course and a certificate from the University of Waterloo will be mailed typically 4-6 weeks later.

Certificates
Many of the Ed2Go courses are eligible towards the various online certificates offered by Professional Development.

Choose your course start date:

Aug 14, 2019Sep 11, 2019Oct 16, 2019Nov 13, 2019Dec 11, 2019Jan 15, 2020