Through this course you will learn how to create and use various types of IT-related documentation, how to keep private data safe, and how to secure mobile devices. You'll also learn about centralized change management and malware mitigation.
Organizations use standard sets of policies and procedures for the consistent application of best practices to ensure IT systems and data are functional and protected. In this course, Computer Fundamentals: Operational Procedures, you will first learn about IT documentation and how to conduct yourself in a professional manner. Next, you'll explore environmental factors, software licensing, how to follow safety guidelines when at work, options that enable centralized change management, and disaster recovery. Finally, you'll examine remote access protocols and the basics of script automation using PowerShell and Bash. By the end of this course you'll have a foundational understanding of best practices to protect and manage IT systems and data.
Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Course Overview Hi everyone, I'm Dan Lachance, and welcome to my course, Computer Fundamentals: Operational Procedures. Consistency in an IT environment really stems from having up-to-date documentation related to things like network diagrams and organizational policies, and it also allows for smooth, centralized change management. Some of the major topics that we'll cover in this course include documentation and professionalism; licensing, privacy, and safety; change management and disaster recovery; and scripting and remote access. By the end of this course, you'll have the skills necessary to create and use various types of IT documentation. You'll have the knowledge required to secure file systems through encryption, and you'll be able to deploy compliance baselines on the network and access devices remotely using SSH and RDP. Finally, you'll learn the basics of automation through PowerShell and Bash shell scripts. I hope you'll join me to learn about Computer Fundamentals: Operational Procedures, here at Pluralsight.