Foundations of Information Systems Management

(NGU-INFO-SYS-MGMT.AEB1) / ISBN : 978-1-64459-998-3
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Core Hardware Components

  • Introducing Internal Components
  • Exploring Motherboards, Processors, and Memory
  • Exploring Storage and Expansion Devices
  • Exploring Power and Cooling
  • Summary
  • Exam Essentials
  • Written Lab
2

Peripherals and Connectors

  • Understanding Common Peripherals, Interfaces, and Connectors
  • Summary
  • Exam Essentials
  • Written Lab
3

Computing Devices and the Internet of Things

  • Exploring Common Computing Devices
  • Understanding the Internet of Things
  • Summary
  • Exam Essentials
  • Written Lab
4

Operating Systems

  • Operating System Fundamentals
  • Managing an Operating System
  • Summary
  • Exam Essentials
  • Written Lab
5

Software Applications

  • Understanding Application Architecture and Installation
  • Exploring Common Application Types
  • Summary
  • Exam Essentials
  • Written Lab
6

Software Development

  • Exploring Programming Languages
  • Understanding Programming Concepts and Techniques
  • Summary
  • Exam Essentials
  • Written Lab
7

Database Fundamentals

  • Understanding Databases
  • Summary
  • Exam Essentials
  • Written Lab
8

Networking Concepts and Technologies

  • Exploring Connection Types and Features
  • Understanding Network Connectivity Essentials
  • Setting Up a Wireless Network
  • Summary
  • Exam Essentials
  • Written Lab
9

Security Concepts and Threats

  • Understanding Hackers and Motives
  • Understanding Security Threats
  • Understanding Access Control
  • Summary
  • Exam Essentials
  • Written Lab
10

Security Best Practices

  • Understanding Security Best Practices
  • Summary
  • Exam Essentials
  • Written Lab
11

Business Continuity and Computer Support

  • Understanding Business Continuity
  • Exploring Computer Support Concepts
  • Summary
  • Exam Essentials
  • Written Lab
A

Appendix A: Videos

13

Project Management Framework

  • Project and Operation
  • Project Life Cycles and Project Management Processes
  • Project Environment
  • Organizational Structure
  • Summary
14

Risk Management Planning

  • Risk
  • Plan Risk Management
  • Summary
15

Stakeholder Communication and Engagement

  • Project Stakeholder Management
  • Project Communications Management
  • Theories and Concepts
  • Summary
16

Asset Management and Data Loss Prevention

  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary
17

Regulatory Compliance for Financial Institutions

  • The Gramm-Leach-Bliley Act
  • New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Summary
18

Regulatory Compliance for the Health-Care Sector

  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary
19

PCI Compliance for Merchants

  • Protecting Cardholder Data
  • PCI Compliance
  • Summary
20

NIST Cybersecurity Framework

  • Introducing the NIST Cybersecurity Framework Components
  • The Framework Core
  • Framework Implementation Tiers ("Tiers")
  • NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
  • NIST's Cybersecurity Framework Reference Tool
  • Adopting the NIST Cybersecurity Framework in Real Life
  • Summary

1

Core Hardware Components

  • Identifying the Motherboard Form Factors
  • Installing a Motherboard, Processor, and Processor Fan
  • Identifying Motherboard Slots
  • Installing PCIe Cards on the Motherboard
  • Identifying Slots of a Motherboard
  • Installing a PCI Sound Card
  • Identifying Types of RAM
  • Assessing Computer’s RAM and Virtual Memory
  • Examining Hard Drives in Windows
  • Connecting the Motherboard to the Internal Hard Disk
  • Identifying Video Card Components
  • Installing SMPS and Connecting it to the Motherboard
2

Peripherals and Connectors

  • Configuring Mouse Properties
  • Disabling a Touchpad
  • Configuring Language in Windows
  • Installing an IP Printer
  • Identifying Printer Types
  • Identifying a Daisy-Wheel Printer
  • Connecting Speakers to a Computer
  • Connecting a Keyboard, Mouse, and Monitor to a Computer
  • Connecting a Monitor and Headset to a Computer
  • Identifying Function Keys of a Keyboard
  • Identifying Video Ports and Connectors
  • Identifying Computer Power Supply Connectors
  • Changing Screen Resolution
3

Computing Devices and the Internet of Things

  • Replacing the Battery of a Smartphone and Inserting a Memory Card
  • Identifying Features of a Laptop and Tablet
4

Operating Systems

  • Defining Operating System Functions
  • Creating a Shortcut
  • Creating a Password-Protected User Account
  • Creating a Standard User Account
  • Viewing Driver Details
  • Deleting a Partition
  • Creating a New Volume
  • Changing the System's Virtual Memory
  • Running the Disk Cleanup Utility
  • Configuring Windows User Account Control
  • Creating a Task with Task Scheduler
  • Manipulating Files
5

Software Applications

  • Installing Operating System Features
  • Uninstalling an Application
  • Uninstalling and Reinstalling a Device Driver
  • Disabling and Enabling a Device in Device Manager
  • Rolling Back a Driver
  • Updating a Driver
  • Enabling Windows Update
  • Installing 7-Zip
  • Managing Cookies and Cache in Microsoft Edge
  • Configuring the Edge Pop-Up Blocker
  • Downloading and Installing the Adobe Acrobat Reader
  • Using 7-Zip to Create an Archive
  • Running Antivirus
  • Turning on Windows Firewall
  • Setting Up a DMZ on a SOHO Router
6

Software Development

  • Converting a Decimal Number to Binary
  • Creating “Hello, world!” in HTML
  • Understanding Data Types
7

Database Fundamentals

  • Deleting a Table
  • Creating a Database and a Table
  • Importing Data from Excel to Access
8

Networking Concepts and Technologies

  • Obtaining Automatic Private IP Addressing
  • Configuring Automatic Private IP Addressing
  • Accessing the Windows 10 Wireless Properties
  • Connecting a Wireless Router to a Laptop
  • Configuring Windows 10 Wireless Settings
  • Configuring a Wireless Client
  • Configuring a DHCP Role with Error Notification
9

Security Concepts and Threats

  • Creating a DoS Attack Scenario
  • Identifying the Denial of Service Attack
  • Understanding Single Sign-On
10

Security Best Practices

  • Applying a Screen Saver
  • Backing Up a Windows Security Certificate
  • Starting and Stopping a Service
11

Business Continuity and Computer Support

  • Backing Up Files
  • Restoring Files
  • Booting Into Safe Mode 
  • Creating a Restore Point
  • Restoring a Restore Point
  • Running an Application in Compatibility Mode
  • Using the System Configuration Utility
  • Creating a Desktop Shortcut for MSConfig
12

Project Management Framework

  • Introduction about the Project and Operation
13

Risk Management Planning

  • Introduction about the Project Risk Management process
14

Stakeholder Communication and Engagement

  • Introduction of the Plan Communications Management process
  • Introduction about the Manage Communications process

Related Courses

All Courses
scroll to top