Hosted by: Google | Coursera
Learn from Home
All around the year
This five-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place.
If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKSystems, UPMC, and, of course, Google.
Through a dynamic mix of video lectures, quizzes, and hand-on labs and widgets, this certificate program will introduce you to troubleshooting and customer service, networking, operating systems, system administration, and security.
Along the way, you’ll hear from Googlers with unique backgrounds and perspectives, whose own foundation in IT support served as a jumping off point for their careers. They’re excited to go on this journey with you, as you invest in your future by achieving an end-of-program certificate.
If you dedicate 8-10 hours a week to the courses, you can complete the certificate in about eight months. You can also skip through any content that you might already know and speed ahead to the graded assessments.
In this course, you’ll be introduced to the world of Information Technology, or IT. This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist. You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, and job-related skills. You’ll also learn about the history of computers, and the pioneers who shaped the world of computing that we know today.
This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this IT Support Professional Certificate. By the end of this course, you’ll be able to:
- understand how the binary system works.
- assemble a computer from scratch.
- choose and install an operating system on a computer.
- understand what the Internet is, how it works, and the impact it has in the modern world.
- learn how applications are created and how they work under the hood of our computer.
- utilize common problem-solving methodologies and soft skills in an Information Technology setting.
This course is designed to provide a full overview of computer networking. In this course, we’ll cover everything from the fundamentals of modern networking technologies and protocols to practical applications and network troubleshooting.
By the end of this course, you’ll be able to:
- describe computer networks in terms of a five-layer model.
- understand all of the standard protocols involved with TCP/IP communications.
- grasp powerful network troubleshooting tools and techniques.
- learn network services like DNS and DHCP that help make computer networks run.
In this course, you’ll learn how to use the major operating systems, Windows and Linux, which are a core component of IT. Through a combination of video lectures, demonstrations, and hands-on practice, you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware.
By the end of this course you’ll be able to:
- navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter.
- set up users, groups, and permissions for account access.
- install, configure, and remove software on the Windows and Linux operating systems.
- configure disk partitions and filesystems. - understand how system processes work and how to manage them.
- work with system logs and remote connection tools.
- utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role.
This course will transition you from working on a single computer to a whole fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. You’ll learn how to manage and configure servers, how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.
By the end of this course you’ll be able to:
- utilize best practices for choosing hardware, vendors, and services for your organization.
- understand how the most common infrastructure services that keep an organization running work and how to manage infrastructure servers.
- manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP.
- choose and manage the tools that your organization will use.
- backup your organization’s data and be able to recover your IT infrastructure in the case of a disaster.
- utilize systems administration knowledge to plan improve processes for IT environments.
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand:
- how various encryption algorithms and techniques work and their benefits and limitations.
- various authentication systems and types.
- the difference between authentication and authorization.
At the end of this course, you’ll be able to:
- evaluate potential risks and recommend ways to reduce risk.
- make recommendations on how best to secure a network.
- help others to understand security concepts and protect themselves.
Course available at :