IT Software Technician: A+ (Core 2) 2022 beginner

https://www.skillsoft.com/channel/it-software-technician-b4c29ef0-e95e-11e6-82e6-b5f8c37eee05?a=18750370&expertiselevel=3975727 https://www.skillsoft.com/channel/it-software-technician-b4c29ef0-e95e-11e6-82e6-b5f8c37eee05?a=3975728&expertiselevel=3975727
  • 18 Courses | 21h 4m 38s
  • 12 Courses | 14h 13m 53s
  • Includes Lab
  • Includes Test Prep
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
 
If you have an affinity for software, you've come to the right place. Take the first step at becoming a master technician, from apps to operating systems.

GETTING STARTED

CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems

  • 1m 19s
  • 6m 34s

GETTING STARTED

CompTIA A+ 220-1002: Comparing Common Operating Systems

  • 7m 13s
  • 6m 33s

COURSES INCLUDED

CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
Technicians must be aware of the features and installation requirements of various types of operating systems. Use this course to learn about common OS types and how to perform OS installations and upgrades in a diverse OS environment. Begin by exploring the features of Windows, Linux, macOS, ChromeOS, and mobile device operating systems. Discover available OS installation options and plan an operating system deployment strategy after reviewing various installation methods. Finally, perform the installation of a Windows 10, Windows Server 2019, Ubuntu Linux, and macOS system. Once you have completed this course, you will be able to select the appropriate operating system for a given scenario and plan its deployment. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos | 1h 18m has Assessment available Badge
CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
New disk devices can be initialized as Master Boot Record (MBR) or GUID Partition Table (GPT) and can be formatted using different types of file systems. Use this course to become familiar with and learn how to manage common Linux, macOS, and Windows file systems. To start, explore common file system types including the New Technology File System (NTFS), File Allocation Table (FAT32), exFAT, ext3, ext4, and the Apple File System (APFS). Discover the difference between MBR and GPT disks and learn how to format and partition disks. You'll then work with NTFS, share, and Linux file system permissions to configure access for network shares and learn how to manage file systems using command line tools. Once you have completed this course, you will be able to choose the appropriate file system and management tools for specific situations. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h 7m has Assessment available Badge
CompTIA A+ Core 2: Operating System & Network Management
Understanding the network connectivity options in modern operating systems is a vital skill you need as a technician. In this course, you will explore various GUI management tools that can be used when working in Windows. Learn to navigate and configure Control Panel settings and discover how to utilize networking commands in Windows and Linux, and management tools for macOS. Next, you will review how IP addressing, DNS, and DHCP works and observe how to configure Windows DNS and DHCP servers. Finally, learn how to manage various network settings, including those related to Windows Defender and Microsoft Active Directory. Upon completion of this course, you'll be able to use command-line management tools and manage network-related settings in Windows, Linux, and the macOS. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos | 1h 50m has Assessment available Badge
CompTIA A+ Core 2: Physical Security Measures
Technicians need to familiarize themselves with the various security principles and technologies available to protect employees, networks, and intellectual property from the emergent threats of the 21st century Internet. You will begin by exploring how to implement traditional physical security measures such as video surveillance, alarm systems, and motion sensors. Discover how to implement physical security devices such as key fobs, smart cards, keys, biometrics, lighting, and magnetometers. Next, learn how to implement and configure security features of Active Directory and how to secure devices using Mobile Device Management. Lastly, explore logical security features such as the principle of least privilege, access control lists, multi-factor authentication, and hard and soft tokens. ​ Upon completion, you'll be able to design and implement technologies available to protect businesses against the latest security threats. This course helps you to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
7 videos | 38m has Assessment available Badge
CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
There are numerous wireless security protocols and authentication methods available. Technicians must learn how to recommend and potentially implement a wireless security solution depending on the requirements of an organization. In this course, you will start by learning the difference between the Wi-Fi Protected Access 2 (WPA2) and Wi-Fi Protected Access 3 (WPA3) wireless protocols and the features of each. Explore other wireless protocols and encryption options, including Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). Finally, investigate wireless security authentication solutions, including Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access-Control System (TACACS+), Kerberos, and multi-factor authentication. After completing this course you'll know how to implement wireless security protocols and authentication methods. This course also helps you to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
10 videos | 45m has Assessment available Badge
CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods. Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. ​ After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos | 1h 41m has Assessment available Badge
CompTIA A+ Core 2: Social Engineering Attacks
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers. Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks. Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD). This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.
18 videos | 1h 57m has Assessment available Badge
CompTIA A+ Core 2: Operating System Security Best Practices
There are many things to consider when managing and configuring basic security settings in the Microsoft Windows OS. Therefore, technicians must become well versed in configuring and enforcing workstations to meet best practices for security. In this course, you will begin by learning how to configure basic security settings including firewalls, Defender anti-virus, users and groups, and operating system login options. Explore the difference between NTFS and share permissions and discuss file and folder attributes and inheritance. Next, discover features of the administrator and standard user accounts and learn the fundamentals of user account control (UAC). Lastly, explore how to configure workstation security using features such as encryption, complex passwords, and account management and how to disable the AutoRun and AutoPlay features. Upon completion, you'll know how to configure basic security setting in the Windows OS. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos | 1h 34m has Assessment available Badge
CompTIA A+ Core 2: Mobile & Embedded Device Security
As mobile technology evolves, so does the need for mobile device security. Mobile device security features protect data, including sensitive and private information, on mobile devices such as smartphones, tablets, and laptops. Learn about screen lock security features such as facial recognition, PIN codes, fingerprint, pattern, and swipe devices. Discover the benefits of remote wiping features, locator applications, and device encryption. Next, explore how operating system updates can help secure devices and patch vulnerabilities. Then discover features of remote backup applications, firewalls, and mobile anti-virus and anti-malware solutions. Lastly, you'll get an overview of policies and procedures as they relate to BYOD, profile security requirements, and Internet of Things (IoT) security. Upon completion of this course, you'll be able to outline common methods for securing mobile and embedded devices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 59m has Assessment available Badge
CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
Technicians need to familiarize themselves with strategies, features, and techniques that can help ensure a safe and secure small office/home office (SOHO) environment. In this course, discover home router security settings to configure on a SOHO network. Explore wireless security considerations, including changing the service set identifier (SSID), disabling SSID broadcast and encryption settings, disabling guest access, and changing channels. Next, discover firewall security features such as disabling unused ports and port forwarding or mapping. You'll also learn to install and configure browsers and relevant security settings. Next you'll explore browser installations, extensions, and plug-ins, as well as password managers and certificates. Lastly, explore Internet browsing security features and techniques, including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers. Once you have completed this course, you'll be able to configure security settings for browsers and SOHO networks. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
10 videos | 1h 3m has Assessment available Badge
CompTIA A+ Core 2: Windows OS Problems & Personal Computer Security
Diagnosing problems within a network or a computer requires a special and versatile toolbox for the IT specialist. This course outlines many popular troubleshooting tools and practical strategies needed to quickly isolate all kinds of problems, regardless of platform, and resolve them, to help restore normal working conditions efficiently and quickly. Explore the benefits of building process checklists and learn how to determine if a problem is widespread or limited to one machine. Discover how to trace issues back to new hardware or software installations, and explore best practices and techniques for malware removal. Lastly, explore valuable troubleshooting steps that can be used to resolve mobile OS and app issues and any mobile OS security issues. This course will help you prepare for CompTIA+ certification exam 220-1102.
9 videos | 59m has Assessment available Badge
CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
Malware is software specifically designed to compromise computers, servers, clients, or computer networks. In this course, you will learn best practices for the identification and removal of malware. Begin by exploring how to properly investigate and verify malware symptoms and how to ensure infected systems are quarantined immediately. Discover the importance of disabling System Restore from the onset as well as steps to remediate infected systems. Explore how to schedule system scans and run updates on a system. Next, discover when to re-enable System Restore and create a new restore point in Windows. Lastly, learn about the key points and techniques to share with end users when educating them on malware. This course helps prepare for CompTIA+ certification exam 220-1102.
10 videos | 55m has Assessment available Badge
CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
A large percentage of the population carries at least one mobile device on them at all times. These devices often contain applications that can be attractive targets for mobile attacks. This course covers how to troubleshoot mobile OS applications and application security issues. Discover common symptoms pertaining to mobile OS and application issues such as applications that fail to launch, crash, and fail to update. Next, explore connectivity issues pertaining to Bluetooth, Wi-Fi, near-field communication, and AirDrop and learn how to identify internet connectivity issues, including limited or no connectivity. Lastly, discover how to deal with high numbers of ads, fake security warnings, unexpected application behavior, and leaked personal files and data. This course helps prepare for CompTIA+ certification exam 220-1102.
12 videos | 1h 18m has Assessment available Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 55m has Assessment available Badge
CompTIA A+ Core 2: Backup & Recovery Methods
Backing up data is the practice of copying data from a primary to a secondary location. Regular backups are essential when attempting to recover from a primary data failure. Backups should be performed regularly in both personal and business scenarios. In this course, explore disaster prevention techniques and recovery best practices. Discover how to differentiate between full, incremental, differential, and synthetic backups, and learn when to implement each method. Next, explore backup frequency timelines that can help ensure regular data backups. Discover how to differentiate between on-site and off-site backup rotation schemes, and lastly, explore backup rotation schemes including grandfather-father-son (GFS) and the 3-2-1 backup rule. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
7 videos | 46m has Assessment available Badge
CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
Environments should be designed and maintained with personal safety best practices and safety standards in mind. Enforcing safety standards helps ensure that operators are kept safe and prevented from causing harm to their systems. In this course, you'll learn when and where to use electrostatic discharge straps, mats, and bags. Explore personal safety measures, including disconnecting power before repairing a PC, lifting techniques, electrical fire safety, safety goggles, and air filtration masks. Discover material safety data sheet (MSDS) handling and disposal recommendations, including proper battery disposal, proper toner disposal, and proper disposal of other devices and assets. You will also learn the importance of temperature, humidity-level awareness, and proper ventilation, including equipment placement, dust cleanup, and compressed air and vacuums. Lastly, explore the impact of power surges, under-voltage events, and power outages and discuss when to use battery backup and surge suppressors. This course helps prepare for CompTIA A+ certification exam 220-1102.
12 videos | 57m has Assessment available Badge
CompTIA A+ Core 2: Communication Techniques, Licensing, & Policy Concepts
Professionalism is essential in any working environment, especially business operations that require interactions with customers. Learn about proper communication techniques and professionalism, such as avoiding jargon, acronyms, and slang. Explore how to maintain a positive attitude, project confidence, listen actively, and be on time. Discover how to avoid distractions including personal calls, texting, and personal interruptions. Explore how to set and meet expectations and timelines, and how to properly communicate status with the customer. Lastly, learn the importance of prohibited content/activity, privacy, licensing, and policy concepts. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h has Assessment available Badge
CompTIA A+ Core 2: Scripting & Remote Technologies
Remote access is accessing a computer or device from any location, including remotely administering networks and computing environments. Scripting is the process of automating tasks that would otherwise be performed individually by a human operator. In this course, discover how to leverage remote access technologies. First, learn the basics of scripting, including script file types, use cases, and other considerations for using scripts. Next, explore remote access methods and tools, and examine the security considerations of each access method. Finally, discover how to leverage remote access technologies and recognize remote access methods and tools, including the security considerations of each access method. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h 15m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

CompTIA A+ 220-1002: Comparing Common Operating Systems
Explore and compare the various client-side operating systems and their installation processes. In this course you will learn: to identify and define what an operating system is; to differentiate between 32-bit and 64-bit processing; to differentiate between operating system vendors; and to understand the differences between the major smartphone and tablet operating system vendors. Learners also observe how to update limitations and compatibility concerns for vendor-specific operating systems; to identify the differences between versions of Microsoft operating systems; to determine appropriate editions of Windows client, based on customer profiles; and to configure desktop styles and user interfaces. You will learn how to choose the appropriate boot configuration based on needs; to choose appropriate types of installation methods based on deployment needs; to implement network and image-based deployments; how to recover a failed installation; and how to compare common operating system architectures, installation sources, and targets. The course concludes with exercises on aspects of common operating systems, including making distinctions between 32-bit and 64-bit architecture. Course helps prepare for CompTIA A+ certification exam 220-1002
12 videos | 1h 13m has Assessment available Badge
CompTIA A+ 220-1002: Microsoft Operating System Installation & Upgrade
Learn important Microsoft operating system (OS) installation and upgrade considerations and critical skills to ensure success of your installations. In this course, you will learn: to configure partitions and volumes, create redundant disk arrays, and convert disks; to configure disk formatting and distinguish between file system types and their use; to stage and configure alternate third-party drivers to load when necessary; and how to differentiate between the Workgroup and Domain setup, and when each is appropriate; to configure settings including time, date, region, and language. Observe how to perform driver management, including installation, update, and removal; to implement automated OS and software updates for Windows, MAC, and Linux; to use the factory recovery partition to reset a Windows installation; and to format the system volume (boot drive). Other issues covered: enumerating prerequisites for any Windows install and identifying which hardware compatibility tool to use for each OS compatibility; how Microsoft's application compatibility toolset has evolved since AppCompat; how to identify and mitigate OS compatibility/upgrade issues; and how to assess upgrade readiness. Course helps prepare for CompTIA A+ certification exam 220-1002.
13 videos | 1h 2m has Assessment available Badge
CompTIA A+ 220-1002: Microsoft Command Line Tools
Examine how to use Windows management utilities in both the command line and GUI - necessary skills for the A+ 220-1002 exam. During this course, you will learn how to navigate the file system and diagnose and maintain networks. Examine GOP tools, the imaging tool, Copy, Xcopy, and Robocopy. Learn about net use and the net user command to create and delete user accounts. Discover the native Windows GUI tool services.msc, to manage the Windows system. Also learn about other Windows GUI tools, such as Notepad, Explorer, Windows Update, and Regedit
12 videos | 1h 24m has Assessment available Badge
CompTIA A+ 220-1002: MS Operating System Administrative Tools
Examine how to use Windows Administrative Tools to navigate available options, and to perform memory diagnostics, disk management, and system maintenance - necessary skills for the A+ 220-1002 exam. Learn about computer management and a custom MMC to manage the local machine. Examine the Performance Monitor and Task Scheduler. Identify data sources, component services, and system configuration. Review print management, local security policy, Windows memory diagnostics, Windows Defender, the Event Viewer, and user account management. Finally, discover the features and uses of MSConfig, the Task Manager, and Disk Manager
14 videos | 1h 32m has Assessment available Badge
CompTIA A+ 220-1002: Windows Control Panel Utilities
The Windows Control Panel is a central location for accessing and configuring various system features and components. During this course, you will explore some of the critical Control Panel utilities covered on the CompTIA A+ 220-1002 exam. Discovr internet options, display settings, folder options, system settings, the Windows Firewall, and Windows power options. As a review exercise, you will learn how to configure internet options with tabs from the last browsing session, view hidden files and folders, and finally, turn Windows Firewall on, to guard connections to public networks
7 videos | 46m has Assessment available Badge
CompTIA A+ 220-1002: Application Installation, Networking, & Tools
Examine application installations and the configuration requirements and considerations for application rollouts, networking security, and remote connections, including the use of Windows Control Panel tools and Linux commands. This course shows learners how to configure the correct folder/file access to support application installation and validate security to minimize impact to devices and the network; how to configure Windows Firewall; how to configure IP addresses in Windows; how to list differences in network connection types, requirements, and security; when to use Homegroup, Workgroup, and Domain setup; how to manage and configure shares, mapped drives, and printers; and how to manage and configure remote connectivity, including proxy settings, Remote Desktop Connection, and Remote Assistance. Other issues: how to implement best practices for disk maintenance, patch management, driver/firmware updates, and antivirus/anti-malware updates; how to use and configure MAC/Linux client tools; how to manage client features; and how to use basic Linux commands, plus an overview of Client Tools. Course helps prepare for CompTIA A+ certification exam 220-1002
12 videos | 1h 12m has Assessment available Badge
CompTIA A+ 220-1002: Security Fundamentals
An important component of traditional security measures is the physical security requirements employed to safeguard valuable computer equipment. This 14-video course examines current physical security practices and how to improve them in the 21 st century. Begin with door and offices locks, fences, and perimeter defenses-solar-powered lights, cameras, motion detectors, and data storage places. Fire suppression systems are important, but consider less obvious benefits of positive airflow systems-preventing dust particles from entering "clean" areas and ensure that air flows out, not in. Laptops must be physically secured at cubicle desks (cable locks); servers must be locked in secure rooms, not under a reception desk. Other tools: privacy screens; so-called "mantraps"-steel shutters walling off outer vestibules; entry control rosters. Be sure to secure mobile devices-tablets, cell phones-against both viruses and unauthorized use by outsiders. Antimalware, antiviral software, multifactor authentication, Smart cards, data loss prevention, and firewalls are also important examples. Emerge from this course better prepared to implement best practices in security in your office. Course helps prepare for CompTIA A+ certification exam 220-1002
14 videos | 1h 20m has Assessment available Badge
CompTIA A+ 220-1002: Critical Security Concepts
Among the newer forms of security for most workers in the 21 st century involves social engineering-protecting workers and work against subtle but dangerous attacks by con men and scammers. This 14-video course reviews security fundamentals and the many ways in which devious people steal information-masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing (airports, coffee shops), spoofing, dumpster-diving, and insidiously clever "spear phishing" attacks-legitimate-looking e-mails luring workers to malicious websites, or worse, into opening "encrypted" attachments with company credentials or password. Review critical measures of Active Directory administration, user management, and encryption of files and disks; implement logon time restrictions and failed-attempt lockouts; disable guest accounts in a timely fashion; avoid use of noncompliant systems; prevent careless moving or copying of office files; encrypt files and disks. In this day of widespread remote teleworking, safeguard home offices-where wireless signals are easily intercepted without simple, appropriate precautions. Danger lurks everywhere, and no one, however experienced, can ever be too careful! Course helps prepare for CompTIA+ certification exam 220-1002
14 videos | 1h 29m has Assessment available Badge
CompTIA A+ 220-1002: Software Troubleshooting
Diagnosing problems within a network or a computer requires a special and versatile toolbox for the IT specialist. This 9-video series outlines many popular troubleshooting tools and practical strategies needed to quickly isolate all kinds of problems, regardless of platform, and resolve them, to help restore normal working conditions efficiently and quickly. Various process checklists are invaluable-the five-step system checklist, the six-step analyzing systems, the seven-step remediation of malware, all discussed here. Is the problem widespread or limited to one machine? Has anything significant been installed recently-hardware or software? Are users plagued by popups, spam, slow bootups, or slow performance? Do specific security issues need addressing? Is a Web-based email application (Hotmail, Yahoo, G-mail accounts) involved? If malware is suspected or discovered, the system is often infected; one machine or many may need to be rebooted, restarted, and cleaned-and antivirus or antimalware installed. Learn what to do and when to do it, from rolling back updates to restarting service. Course helps prepare for CompTIA+ certification exam 220-1002
9 videos | 55m has Assessment available Badge
CompTIA A+ 220-1002: Operational Procedures Best Practices
This 13-video course offers a comprehensive overview of best practices and safety standards: the working rules which keep operators from causing harm to their systems. Documentation best practices, for example, begin with network topologies-mapping diagrams of distribution of devices and subnetworks, home or office-while sensible password policies exist to offer invaluable protection to users and systems alike. Record all incidents; manage inventory carefully; comply with government regulations and MSDS documentation. Basic safety procedures-goggles, air filter masks, weight limitations, toxic waste handling-are needed to protect users, equipment, and IT staff alike, and must be up-to-date. Change management is critical to continued success; what the world you work in will look like next year is almost impossible to guess, so learn to be ready for anything. Remote access technologies are constantly evolving, and you must keep abreast of changes. A closing exercise allows you to assess your knowledge of just a few: password policies; airborne dust and debris; and government regulatory compliance laws. Course helps prepare for CompTIA A+ certification exam 220-1002
13 videos | 1h 20m has Assessment available Badge
CompTIA A+ 220-1002: System Utilities
Explore critical system utilities, such as Credential Manager, Bitlocker, Device Manager, and Sync Center. This course also discusses when to use Windows HomeGroups, and how to configure Windows sound, devices, and printers. Learn how to use the Windows Network Sharing Center and the Device Manager to connect and troubleshoot peripherals and other connected devices. At the end of the course, you will have the opportunity to see how to add the Telnet client feature to your computer, set a default printer, setup your NIC card to automatically get an IP address, and to update your video card's display driver.
9 videos | 55m has Assessment available Badge
Programming Fundamentals : Command Line Interface & Operating System Commands
In computer programming, commands are a common method of interacting with a computer to perform specific operations. A computer's command line interface (CLI) tool is used to enter, accept, and forward commands to the computer's operating system (OS). The commands and CLI will vary depending on the OS used (Microsoft, Linux, macOS, etc.) Use this course to get started with some of the most common commands used in Windows and Linux systems. Learn the commands that generate the most return in terms of productivity, such as engaging with files, folders, and programs. In doing this, become comfortable with using Windows and Linux CLIs. By the end of the course, you'll be able to execute the most frequently used commands on a Windows or Linux system.
12 videos | 1h 1m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 21 users Rating 4.7 of 21 users (21)
Rating 4.5 of 29 users Rating 4.5 of 29 users (29)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)