How to become a Computer Technical Support Specialist
What you'll learn
- How to become a Computer Tech Support from scratch
Requirements
- None
Description
One of the most significant challenges within the Cybersecurity Profession is where to start. My name is Jeremiah Batac, CEO Co-founder of Netsectap. My business partner Ray Caparros and I built a cybersecurity training academy to remove all the junk and focus on Outcome-based Cybersecurity Training. Our training does not use books, PowerPoint slides, or guides. The only way to learn is to do Hands-on, Take Notes and follow-through. We believe that this is the best way to enforce learning. In this 3 part series course, we will outline all the skills you need to become a Security Engineer. You can do better with your current situation, now, go ahead, enroll, and enjoy the journey.
Who this course is for:
- Beginner, Fresh out of College, Someone who wants to transition to Cybersecurity, Cyber Professionals that needs hands-on guidance
Course content
- Preview30:50
- Preview15:28
- Preview04:31
- 05:094 - Operating system virtualization explanation
- 12:525 - How to Install a Virtualization Software
- 32:176 - What is an Operating System
- 01:01:307 - Learn Windows Operating System
- 14:448 - Learn Unix Operating Systems
- 23:299 - Install and Build a Unix Based Operating System Part 1 of 2
- 18:229 - Install and Build a Unix Based Operating System Part 2 of 2
- 32:4510 - Updating Unix Operating Systems
- 01:04:1811 - How to Backup UNIX systems
- 12:3012 - What is a Network?
- 12:3013 - What is Internet and TCP-IP
- 16:4714 - What are the different type of networks, topologies and components
- 49:3615 - Basic Troubleshooting Part 1 of 2 - APSTNDP
- 33:5916 - Basic Troubleshooting Part 2 of 2 - Installing TCPDUMP
Instructor
Jeremiah Batac is been in the network security field for over 14 years and keeps on learning new technologies as he works on different projects. His knowledge and experience includes DLP, Insider Threat, CASB, Web and Email Security, Firewalls, IDS/IPS, SIEM Technology, EUBA, Compliance, Vulnerability Assessment, Penetration Testing and Project Management. He is also well versed in network security architecture, deployment, training and administration of network security systems. Outside of work, Jeremiah fights and trains Brazilian Jiu-Jitsu and aspires to have his own academy.