Exploring basic computer concepts
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Learn about the parts of computers and how they work together.
After completing this module, you'll be able to:
- Identify the parts of a computer
- Understand identity on networks
- Explain how VPNs work and are used
- Identify the parts of a web address
- Module 2: Explore computers
After completing this module, you'll be able to:
- Identify the parts of a computer
- Explain how the parts of a computer work together
- Analyze small and large networks
- Describe the differences between authentication and authorization
- Module 3: Investigate the history of app development
After completing this module, you'll be able to:
- Outline computing history
- Survey the early days of programming
- Explain modern programming techniques
- Summarize the importance of accessibility
- Module 4: Explore security
After completing this module, you'll be able to:
- Analyze the need for computer security
- Summarize how modern computers verify identity
- Describe how biometrics work
- Explain how hackers try to disrupt security
Syllabus
- Module 1: Module 1: Discover the basics of computing
- Introduction
- Explore the basics of computers
- Discover computer networking
- Investigate identity on a network
- Examine identity on the internet
- Describe virtual private networks
- Examine web addresses
- Knowledge check
- Summary
- Module 2: Module 2: Explore computers
- Introduction
- Explore personal computers
- Investigate processors
- Examine random access memory
- Understand storage
- Describe networking
- Research data centers for cloud computing
- Inspect directory authorization
- Knowledge check
- Summary
- Module 3: Module 3: Investigate the history of app development
- Introduction
- Research computing history
- Explore programming history
- Investigate modern programming
- Inspect modern cloud structure
- Explore accessibility
- Knowledge check
- Summary
- Module 4: Module 4: Explore security
- Introduction
- Explore identity
- Research cloud identity
- Investigate two factor security
- Inspect biometrics
- Understand bad actors
- Knowledge check
- Summary
Tags
Related Courses
Access Controls(ISC)² via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Data Privacy Fundamentals
Northeastern University via Coursera The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy iOS Development: Security
LinkedIn Learning