Free

Basic Networking

Beginner

Computer networks consist of many different components, technologies, and protocols …

What you'll learn
Operation of IP Data Networks
LAN Switching Technologies
IP Addressing [IPv4 / IPv6]
IP Routing Technologies
IP Services
Network Device Security
Featured
Free

Computer Repair & Maintenance

Beginner

This course is intended to teach students how to fix …

What you'll learn
Computer Hardware and Software
Safety precautions and use of tools
Computer Assembly
Operating System
Maintenance and Troubleshooting
Free

The Internet

Beginner

Are you in the dark about how the Internet works? …

What you'll learn
What is a browser?
Using Google to search websites
Using Google Images to search and save images
Using Google Maps to plan a journey
How to navigate a web page
How to bookmark a favourite website
Free

Introduction to Computers

Beginner

If you’re completely new to computers, this beginners’ computer course …

What you'll learn
What is a computer
Devices attached to a computer
How to operate a computer
Finding your way around the screen
Identifying the desktop, icons, mouse, taskbar, start button, start menu, and the recycle bin
How to use windows
Connecting and using a printer
The function of the File Explorer
Featured
Free

Digital Skills: Succeeding in a Digital World

Beginner

This online course will develop participants’ confidence and skills to …

What you'll learn
Understand and be confident in your online identity
Use technology confidently and critically to achieve your study, work and life goals
Reflect proactively on your level of digital confidence, and identify steps for further development.
Free

Network Security

Beginner

This course discusses the key problems involved in achieving a …

What you'll learn
Identify some of the factors driving the need for network security
Identify and classify particular examples of attacks
Define the terms vulnerability, threat and attack
Identify physical points of vulnerability in simple networks
Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare