Introduction to Modern ICT  Course Outline

For introductory courses in computer concepts, digital literacy, or computer literacy, often including basic computer networking. With an array of fun and engaging learning tools. This course is also appropriate for students entering into information technology field. It is ideal for students any student who wish to learn computer fundamentals.

System Software: The Operating System

 

Utility Programs, and File Management

Understanding System Software

Operating System Fundamentals

Real-Time Operating Systems

Operating Systems for Networks, Servers, and Mainframes

Operating Systems for Mobile Devices

Operating Systems for Personal Computers

What the Operating System Does

The User Interface

Processor Management

Memory and Storage Management

Hardware and Peripheral Device Management

ETHICS in IT: The Great Debate: Is Mac OS X Safer than Windows?

Software Application Coordination

The Boot Process: Starting Your Computer

Step 1: Activating BIOS

Step 2: Performing the Power-On Self-Test

Step 3: Loading the OS

Step 4: Checking Further Configurations and Customizations

Handling Errors in the Boot Process

Using System Software

The Windows Interface

Open Source Software: Why Isn't Everyone Using Linux?

Organizing Your Computer: File Management

Organizing Your Files

Viewing and Sorting Files and Folders

Naming Files

Working with Files

Utility Programs

Display Utilities

The Programs and Features Utility

File Compression Utilities

System Maintenance Utilities

System Restore and Backup Utilities

How Disk Defragmenter Utilities Work

Accessibility Utilities

Password Protection and Password Management

Creating Passwords

Managing Your Passwords

Anonymous Web Surfing: Hiding from Prying Eyes

Biometric Authentication Devices

Testing Your Network Security

Protecting Your Digital Property from Yourself

Managing Online Annoyances

Malware: Adware and Spyware

Spam

Computer Forensics: How It Works

Cookies

Keeping Your Data Safe

Protecting Your Personal Information

Backing Up Your Data

Social Engineering

Phishing and Pharming

Scareware

TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches

Protecting Your Physical Computing Assets

Environmental Factors

Power Surges

Deterring Theft

Keep Them Safe: Alarms

Keeping Mobile Device Data Secure

Software Alerts and Data Wipes

Using Technology to Change the World

Technology on the World Stage

Political Issues

Other Global Issues

The Digital Divide and the Mobile Bridge

Technology and Our Society

Technology Impacts How We Think

Technology Impacts: How We Connect

Technology Impacts How We Consume

Technology at Home

Technology and Your Career

Retail: Working in a Data Mine

Arts: Ink, Paints, and a Laptop

Education: Teaching and Learning

Law Enforcement

Medicine: The Chip Within

Science: Simulating Reality

Psychology: Computerized Coach

System Software

 

The Operating System, Utility Programs, and File Management

Understanding System Software

Operating System Fundamentals

Real-Time Operating Systems

Operating Systems for Networks, Servers, and Mainframes

Operating Systems for Mobile Devices

Operating Systems for Personal Computers

What the Operating System Does

The User Interface

Processor Management

Memory and Storage Management

Hardware and Peripheral Device Management

ETHICS in IT: The Great Debate: Is Mac OS X Safer than Windows?

Software Application Coordination

The Boot Process: Starting Your Computer

Step 1: Activating BIOS

Step 2: Performing the Power-On Self-Test

Step 3: Loading the OS

Step 4: Checking Further Configurations and Customizations

Handling Errors in the Boot Process

Using System Software

The Windows Interface

Open Source Software: Why Isn't Everyone Using Linux?

Organizing Your Computer: File Management

Organizing Your Files

Viewing and Sorting Files and Folders

Naming Files

Working with Files

Utility Programs

Display Utilities

The Programs and Features Utility

File Compression Utilities

System Maintenance Utilities

System Restore and Backup Utilities

How Disk Defragmenter Utilities Work

Accessibility Utilities

Looking at Computers

 

Understanding the Parts

Understanding Digital Components

Understanding Your Computer 

Computers Are Data Processing Devices

Bits and Bytes: The Language of Computers

Types of Computers

Input Devices

Processing and Memory on the Motherboard

Memory Processing

Storing Data and Information

Hard Drives

Cloud Storage

Portable Storage Options

Optical Storage

Connecting Peripherals to the Computer

High-Speed and Data Transfer Ports

Connectivity and Multimedia Ports

Networking: Connecting Computing Devices

How Networks Function

Networking Fundamentals

Network Architectures

Network Architectures Defined by Distance

Network Architectures Defined by Levels of Administration

Ethernet Protocols

Network Components

Transmission Media

Basic Network Hardware

Network Software

Connecting to the Internet

Wired Broadband Internet Connections

Wireless Internet Access

Dial-Up Connections

Testing Your Wired and Wireless Internet Connection Speeds

Your Home Network

Installing and Configuring Home Networks

Planning Your Home Network

Connecting Devices to a Router

Network-Attached Storage Devices

Home Network Servers

Digital Entertainment Devices on a Network

Specialized Home-Networking Devices

Configuring Software for Your Home Network

Troubleshooting Wireless Network Problems

ETHICS in IT: Sharing Your Internet Connection with Your Neighbors: Legal? Ethical? Safe?

Securing Wireless Networks

Password Protection and Password Management

Creating Passwords

Managing Your Passwords

Anonymous Web Surfing: Hiding from Prying Eyes

Biometric Authentication Devices

Testing Your Network Security

Protecting Your Digital Property from Yourself

Managing Online Annoyances

Malware: Adware and Spyware

Spam

Computer Forensics: How It Works

Cookies

Keeping Your Data Safe

Protecting Your Personal Information

Backing Up Your Data

Social Engineering

Phishing and Pharming

Scareware

TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches

Protecting Your Physical Computing Assets

Environmental Factors

Power Surges

Deterring Theft

Keep Them Safe: Alarms

Keeping Mobile Device Data Secure

Software Alerts and Data Wipes

Using the Internet: Making the Most of the Web's Resources

Working and Playing on the Web

The Internet and How It Works

The Origin of the Internet

How the Internet Works

Communicating and Collaborating on the Web

Social Networking

E-Mail

Instant Messaging

Wikis

Blogs

Podcasts and Webcasts

Web Entertainment

Conducting Business Over the Internet: E-commerce

E-Commerce Safeguards

Your Files in the Cloud

Using the Web Effectively

Accessing and Moving Around the Web

Web Browsers

URLs, Protocols, and Domain Names

Hyperlinks and Beyond

Favorites, Live Bookmarks, and Tagging

Searching the Web Effectively

Using Search Engines Effectively

Evaluating Websites

ETHICS in IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?

Digital Devices and Media

Managing a Digital Lifestyle

Mobile Devices

Digital Convergence

Telephony: Smartphones and Beyond

Smartphone Basics

Smartphone Components

How Cell Phone Technology Works

Synchronizing

Text Messaging

Mobile Internet

Smartphone Security

VoIP

Smartphone GPS

Making a Choice

The Digital Information Age

Digital Defined

Digital Media

Digital Publishing

Digital Music

Digital Photography

The Shift to Digital Music: A Bumpy Ride

Digital Video

ETHICS in IT: Managing Your Copyrights: Copy left Might Simplify Your Life

Using Technology to Change the World

Technology on the World Stage

Political Issues

Other Global Issues

The Digital Divide and the Mobile Bridge

Technology and Our Society

Technology Impacts How We Think

Technology Impacts: How We Connect

Technology Impacts How We Consume

Technology at Home

Technology and Your Career

Retail: Working in a Data Mine

Arts: Ink, Paints, and a Laptop

Education: Teaching and Learning

Law Enforcement

Medicine: The Chip Within

Science: Simulating Reality

Psychology: Computerized Coach

Application Software

 

Programs That Let You Work and Play

Programs That Let You Work

The Nuts and Bolts of Software

TRENDS in IT: Mobile Commerce: What Have You Bought with Your Phone Lately?

Productivity and Business Software

Bundled Productivity Software

Word Processing Software

Spreadsheet Software

Presentation Software

Database Software

Note-Taking Software

Personal Information Manager Software

Microsoft Office Productivity Software Features

Personal Financial Software

ETHICS in IT: Can I Borrow Software That I Don't Own?

Small Business Software

Software for Large and Specialized Businesses

Citing Website Sources

Entertainment Software

Digital Image- and Video-Editing Software

How Cloud Computing Works

Digital Audio Software

Gaming Software

Educational and Reference Software

Drawing Software

Managing Your Software

Getting Software

Software Licenses

Getting the Right Software for Your System

Installing and Uninstalling Software

Securing Your System

Protecting Your Digital Data and Devices

Major Threats to Your Digital Assets

Cybercrime and Identity Theft

Computer Viruses

Catching a Virus

Boot-Sector Viruses

Logic Bombs and Time Bombs

Worms

Script and Macro Viruses

E-Mail Viruses

Encryption Viruses

Additional Virus Classifications

Virus Symptoms

Preventing Virus Infections

Antivirus Software

Software Updates

Understanding Hackers

Problems Hackers Can Cause

Trojan Horses and Rootkits

Denial-of-Service Attacks

How Hackers Gain Computer Access

Restricting Access to Your Digital Assets

Firewalls

Types of Firewalls

How Firewalls Work

Knowing Your Computer Is Secure

 

Looking at Computers

 

Understanding the Parts

Understanding Digital Components

Understanding Your Computer 

Computers Are Data Processing Devices

Bits and Bytes: The Language of Computers

Types of Computers

Input Devices

Processing and Memory on the Motherboard

Memory Processing

Storing Data and Information

Hard Drives

Cloud Storage

Portable Storage Options

Optical Storage

Connecting Peripherals to the Computer

High-Speed and Data Transfer Ports

Connectivity and Multimedia Ports

  • White Twitter Icon
  • White Google+ Icon

© 2020 by  NICESTEP CyberLabs. 

6309 Oak Middle Oak Middle Ct, Richmond VA