Computer Fundamentals: Operational Procedures
Through this course you will learn how to create and use various types of IT-related documentation, how to keep private data safe, and how to secure mobile devices. You'll also learn about centralized change management and malware mitigation.
What you'll learn
Organizations use standard sets of policies and procedures for the consistent application of best practices to ensure IT systems and data are functional and protected. In this course, Computer Fundamentals: Operational Procedures, you will first learn about IT documentation and how to conduct yourself in a professional manner. Next, you'll explore environmental factors, software licensing, how to follow safety guidelines when at work, options that enable centralized change management, and disaster recovery. Finally, you'll examine remote access protocols and the basics of script automation using PowerShell and Bash. By the end of this course you'll have a foundational understanding of best practices to protect and manage IT systems and data.