Exploring basic computer concepts
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Learn about the parts of computers and how they work together.
After completing this module, you'll be able to:
- Identify the parts of a computer
- Understand identity on networks
- Explain how VPNs work and are used
- Identify the parts of a web address
- Module 2: Explore computers
After completing this module, you'll be able to:
- Identify the parts of a computer
- Explain how the parts of a computer work together
- Analyze small and large networks
- Describe the differences between authentication and authorization
- Module 3: Investigate the history of app development
After completing this module, you'll be able to:
- Outline computing history
- Survey the early days of programming
- Explain modern programming techniques
- Summarize the importance of accessibility
- Module 4: Explore security
After completing this module, you'll be able to:
- Analyze the need for computer security
- Summarize how modern computers verify identity
- Describe how biometrics work
- Explain how hackers try to disrupt security
Syllabus
- Module 1: Module 1: Discover the basics of computing
- Introduction
- Explore the basics of computers
- Discover computer networking
- Investigate identity on a network
- Examine identity on the internet
- Describe virtual private networks
- Examine web addresses
- Knowledge check
- Summary
- Module 2: Module 2: Explore computers
- Introduction
- Explore personal computers
- Investigate processors
- Examine random access memory
- Understand storage
- Describe networking
- Research data centers for cloud computing
- Inspect directory authorization
- Knowledge check
- Summary
- Module 3: Module 3: Investigate the history of app development
- Introduction
- Research computing history
- Explore programming history
- Investigate modern programming
- Inspect modern cloud structure
- Explore accessibility
- Knowledge check
- Summary
- Module 4: Module 4: Explore security
- Introduction
- Explore identity
- Research cloud identity
- Investigate two factor security
- Inspect biometrics
- Understand bad actors
- Knowledge check
- Summary
Tags
Related Courses
An Introduction to Computer NetworksStanford University via Independent Introduction to Systems Biology
Icahn School of Medicine at Mount Sinai via Coursera Network Analysis in Systems Biology
Icahn School of Medicine at Mount Sinai via Coursera Networks, Crowds and Markets
Cornell University via edX Networking Leadership 101: Building Your Core Professional Network
Center for Creative Leadership via Acumen Academy