Advanced Tools for the Experienced Systems Analyst

Problem diagnosis and solution: Software
0 reviews
TAUGHT BY
  • * Professional translator and interpreter since 1992 (Brazil and Australia);

    * Leading researcher in Logic (paradoxes), Real Analysis (S-convexity), Networks (Model for human networks in the case of disease spread), and ODEs (nonisothermal film blowing);

    * Listed with the IBC and the Who's Who Marquis because of her achievements in research (considered to be meaningful to human kind as a whole);

    * Leader of the Syndicate of Professional Translators and Interpreters of Australia (SPTIA);

    * Professional educator (20 years +);

    * Systems Analyst;

    * Long (10 years +) and successful history in computer troubleshooting; and

    * Others.

WHAT'S INSIDE
  • Lifetime access to 7 lectures
SHARE

Advanced Tools for the Experienced Systems Analyst

Problem diagnosis and solution: Software
0 reviews

HOW UDEMY WORKS?

Discover courses made by experts from around the world.

Take your courses with you and learn anytime, anywhere.

Learn and practice real-world skills and achieve your goals.

COURSE DESCRIPTION

This course is about what every IT professional would like to be told by experienced people who seem to be aces in what they do. It aims at providing the student with the best 'secrets of the trade'.

It has got six classes and they are all in the shape of video.

There are no quizzes.

The duration of the course is dictated by the student in the Udemy World, but the minimum duration of this one is inferior to one hundred minutes.

The minimum thing that the student can do at the end of this course is adding it to their resume. Any course, especially if so refined, will increase the market value of the person.

The instructor is available for doubts and those can be dealt with through the Udemy platform, for instance.

    • Familiarity to the level of 'expert' with any IT branch (programming, managing, troubleshooting or others)
    • High School Certificate
    • Proficiency in the English language
    • Internet connection that be reliable
    • Headphones
    • A computer equipped with a sound system
    • Over 7 lectures and 48 mins of content!
    • By the end of this course, the IT professional who has been out of action for a while will know how to do a few things that will make them be more valued in the IT market;
    • By the end of this course, the IT professional who has been working in IT will have more certainty on how to act in a few special situations and will, therefore, be ready to address some special problems with much more speed than when they started the course;
    • By the end of this course, the IT professional will know how to use the 'CTRL+ALT+DEL' resource to detect and stop a few problems with computers and networking;
    • By the end of this course, the IT professional will know how to use the function 'ping' to test the browser for problems;
    • By the end of this course, the IT professional will know a few problems with downloads and how to address at least one of them;
    • By the end of this course, the IT professional will know that some resources cannot be trusted in the Microsoft environment and will be able to mention at least two of those; and
    • By the end of this course, the IT professional will have a good idea on how USB ports sticks and other internal pieces of hardware can create security issues and how they can try to avoid those.
    • IT professionals in general
    • Curious people

THE UDEMY GUARANTEE

30 day money back guarantee
Lifetime access
Available on Desktop, iOs and Android
Certificate of completion

CURRICULUM

  • SECTION 1:
    Basic tools for security, software
  • 1
    Introductory lecture/Promotional video
    05:54

    This is just a summary of what will be seen in this course.

  • 2
    Mr. Ping and the browser
    03:54

    Here, you will learn how to use the function/command 'ping' to test your browser in terms of settings.

  • 3
    Computer Aids: In or Out?
    05:05

    This lecture is about whether it is better to have hard disks, blueteeth, and other aids inside of our machines or outside of those.

  • 4
    Two resources that detect and stop attacks to machines
    08:32

    This lecture is about two resources that can be easily used to detect and stop attacks to your machine.

  • 5
    Firewall
    13:15

    This lecture is about firewalls.

  • 6
    Malware: What protection?
    08:17

    This lecture is about protecting machines against malware.

  • 7
    Summary of what has been seen and future courses
    04:02

    This is the last lecture of this course. It provides you with a summary of what has been seen and an idea on what is yet to be seen, as for our courses.

UDEMY BY THE NUMBERS

5,200,000
Hours of video content
19,000,000
Course Enrollments
5,700,000
Students
  • 30 day money back guarantee!
  • Lifetime Access. No Limits!
  • Mobile Accessibility
MORE FROM I. M. R. Pinheiro