-->
Duration: 30hrs
Cost: Free Course and Paid Certification via Coursera
Schedule: Self paced
This is your path to a career in IT. In this program, you’ll learn in-demand skills that will have you job-ready in less than 6 months. No degree or experience required.
About this Professional Certificate
Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job.
There are 400,000 U.S. job openings in IT and a $52,000 median entry-level salary in IT support.¹
Over 5 courses, learn in-demand skills that prepare you for an entry-level job.
Upon completion, you can directly apply for jobs with Google and over 150 U.S. employers, including Walmart, Best Buy, and Astreya.
75% of Google Career Certificate Graduates in the United States report an improvement in their career trajectory (e.g. new job or career, promotion or raise) within 6 months of certificate completion²
This program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.
This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.
If you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.
Topics
Google Technical Support Fundamental
Google IT Automation
Learn Computer Networking by google
Learn Operating Systems by Google
Learn System Administration by google
Learn IT security by google
¹US Burning Glass Labor Insight Report salary data (median with 0-5 years experience) and job opening data. Data for job roles relevant to featured programs (4/01/2021 - 3/31/22).
²Based on program graduate survey responses, United States 2021
This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist.
In this course, you’ll be introduced to the world of Information Technology, or IT.
You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, troubleshooting, and customer service.
This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this certificate program.
By the end of this course, you’ll be able to:
This course is designed to provide a full overview of IT automation.
We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting.
By the end of this course, you’ll be able to:
In this course – through a combination of video lectures, demonstrations, and hands-on practice – you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware.
By the end of this course you’ll be able to:
To earn a certificate or quizzes and supplementary reading please enroll for this course here: https://imp.i384100.net/9WaKnY
This course will transition you from working on a single computer to an entire fleet.
Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment.
In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running.
We’ll deep dive on cloud so that you’ll understand everything from typical cloud infrastructure setups to how to manage cloud resources.
You’ll also learn how to manage and configure servers and how to use industry tools to manage computers, user information, and user productivity.
Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.
By the end of this course you’ll be able to:
Course Introduction
What are IT Infrastructure Services?
The Role of IT Infrastructure Services in SysAdmin
Types of IT Infrastructure Services
How do Qwiklabs Work?
Heather First Tech Job
Server Operating Systems
Virtualization
Remote Access Revisited
FTP, SFTP, and TFTP
NTP
Network Support Services Revisited
DNS
DNS for Web Servers
DNS for Internal Networks
DHCP
Unable to Resolve a Hostname or Domain Name
What do Services Look Like in Action
Managing Services in Linux
Managing Services in Windows
Configuring Services in Linux
Configuring Services in Windows
Configuring DNS with Dnsmasq
Configuring DHCP with Dnsmasq
Module Introduction
Configuring Communication Services
Configuring Email Services
Configuring User Productivity Services
Configuring Security Services
Heather Managing Self Doubt
What are file services?
Network File Storage
Mobile Synchronization
Configuring Print Services
Web Servers Revisited
What is a database server?
Is the website down?
Cloud Concepts
Typical Cloud Infrastructure Setups
When and How to Choose Cloud
Module Introduction
What is a directory server?
Implementing Directory Services
What is centralized management?
What is LDAP?
What is LDAP Authentication?
Heather Overcoming Obstacles
What is Active Directory?
Managing Active Directory
Managing Active Directory Users and Groups
Managing Active Directory User Passwords
Joining an Active Directory Domain
What is Group Policy?
Group Policy Creation and Editing
Group Policy Inheritance and Precedence
Group Policy Troubleshooting
Mobile Device Management (MDM)
What is OpenLDAP?
Managing OpenLDAP
Module Introduction
What is Data Recovery?
Backing Up Your Data
Backup Solutions
Job transition35s
Testing Backups
Types of Backup
User Backups
What’s a Disaster Recovery Plan?
Designing a Disaster Recovery Plan
What’s a post-mortem?
Writing a Post-Mortem
Interview Role Play: Sys Admin
Final Project Introduction
Alex passion & success
Congratulations!
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand: