<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=325921436538399&amp;ev=PageView&amp;noscript=1">
Skip to the main content.

Create an account on our custom learning platform, Foundry™, to access our free and premium content.

Create Free Account

 

New call-to-action

Skip to the main content.

Create an account on our custom learning platform, Foundry™, to access our free and premium content.

Create Free Account

 

New call-to-action

IT Fundamentals V2

Part one of our three-part Cybersecurity Foundations training pathway.

it

 

In this course, you'll:

  • Administer Windows: Learn user management, troubleshoot, optimize performance, and automate tasks with PowerShell.

  • Learn and Leverage Linux with the CLI: Navigate and control the Linux environment, managing files, users, and permissions with command-line efficiency.

  • Go from Zero to Malicious Network Traffic Analysis: Understand IP basics, test connectivity, manage network shares, analyze traffic with Wireshark, and identify vulnerabilities.

IT Fundamentals Curriculum

Check out the syllabus here: All Fundamentals Syllabus and some screenshots from labs you'll complete below:

Registry-enhance-1x
The Windows Registry stores low-level settings for the OS and applications, centralizing configurations and managing preferences.
Permissions-enhance-1x

Permissions in Windows are crucial for defining who can access, modify, or execute files and applications, ensuring security and data integrity within the operating system.

Services-enhance-1x

Services in Windows are essential background processes that enable the operating system and applications to function correctly and provide various system functions and features.

PowerShell-enhance-1x

PowerShell is a powerful scripting language and command-line shell that provides comprehensive control and automation of Windows system tasks and configurations.

Linux File System-enhance-1x
The Linux file system is crucial as it organizes data, manages permissions, and provides a structured environment for file storage and system operation.
Linux Logs-enhance-1x

The Linux log viewer is essential for monitoring system health, troubleshooting issues, and enhancing security through the analysis of logged events and activities. 

Proc Files-enhance-1x
The Linux proc filesystem is vital as it provides a dynamic interface to system and process information, enabling direct kernel interaction and monitoring.
Bash Scripting-enhance-1x
Bash scripting is crucial for automating tasks, enhancing efficiency, and managing complex workflows in Linux environments.
Processes-enhance-1x
Monitoring services in Linux is crucial for ensuring system stability, performance optimization, and timely detection and resolution of operational issues.
Systemctl-enhance-1x
Using systemctl is essential for efficiently managing and configuring system services in Linux, enabling precise control over the system's behavior and resources.
CLI networking-enhance-1x
Understanding and utilizing networking CLI commands is essential for accurately configuring, diagnosing, and managing network functionalities and issues in Linux systems.
Nmap scanning-enhance-1x
Using nmap for network scanning is essential for uncovering vulnerabilities, understanding network structure, and reinforcing security measures.
Protocol analysis-enhance-1x
Performing network protocol analysis is vital for identifying communication issues, enhancing security, and optimizing network performance.
Three way handshake-enhance-1x
Identifying key networking processes like the three-way handshake aids in diagnosing connection issues and ensuring reliable network interactions.
Inspect HTTP Streams-enhance-1x
Analyzing HTTP headers and streams is essential for understanding web communications, improving security, and troubleshooting web issues.

IT Fundamentals is part of our Cybersecurity Foundations training pathway.

Because each course builds off its predecessor, we strongly recommend completing the Cybersecurity Foundations training pathway in this order:

  1. IT Fundamentals (You are here!)

  2. Cybersecurity Fundamentals

  3. Compliance Fundamentals

Check out our other courses below.

cybersecurity

 

compliance