YoVDO

Exploring basic computer concepts

Offered By: Microsoft via Microsoft Learn

Tags

Computer Networking Courses Computer Security Courses Network Analysis Courses Biometrics Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: Learn about the parts of computers and how they work together.

    After completing this module, you'll be able to:

    • Identify the parts of a computer
    • Understand identity on networks
    • Explain how VPNs work and are used
    • Identify the parts of a web address
  • Module 2: Explore computers

    After completing this module, you'll be able to:

    • Identify the parts of a computer
    • Explain how the parts of a computer work together
    • Analyze small and large networks
    • Describe the differences between authentication and authorization
  • Module 3: Investigate the history of app development

    After completing this module, you'll be able to:

    • Outline computing history
    • Survey the early days of programming
    • Explain modern programming techniques
    • Summarize the importance of accessibility
  • Module 4: Explore security

    After completing this module, you'll be able to:

    • Analyze the need for computer security
    • Summarize how modern computers verify identity
    • Describe how biometrics work
    • Explain how hackers try to disrupt security

Syllabus

  • Module 1: Module 1: Discover the basics of computing
    • Introduction
    • Explore the basics of computers
    • Discover computer networking
    • Investigate identity on a network
    • Examine identity on the internet
    • Describe virtual private networks
    • Examine web addresses
    • Knowledge check
    • Summary
  • Module 2: Module 2: Explore computers
    • Introduction
    • Explore personal computers
    • Investigate processors
    • Examine random access memory
    • Understand storage
    • Describe networking
    • Research data centers for cloud computing
    • Inspect directory authorization
    • Knowledge check
    • Summary
  • Module 3: Module 3: Investigate the history of app development
    • Introduction
    • Research computing history
    • Explore programming history
    • Investigate modern programming
    • Inspect modern cloud structure
    • Explore accessibility
    • Knowledge check
    • Summary
  • Module 4: Module 4: Explore security
    • Introduction
    • Explore identity
    • Research cloud identity
    • Investigate two factor security
    • Inspect biometrics
    • Understand bad actors
    • Knowledge check
    • Summary

Tags

Related Courses

Access Controls
(ISC)² via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Data Privacy Fundamentals
Northeastern University via Coursera
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
iOS Development: Security
LinkedIn Learning