├── google-it-support.jpg
├── c5_it-security
├── it-security.pdf
├── 3_aaa_security
│ ├── resources.md
│ ├── readme.md
│ └── practice-quiz-authorization-and-accounting.md
├── 6_creating-company-culture-for-security
│ ├── resources.md
│ └── readme.md
├── 1_understanding-security-threads
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-other-attacks.md
│ └── practice-quiz-network-attacks.md
├── 2_pelgbyblt
│ ├── readme.md
│ ├── resources.md
│ ├── graded-assessments
│ │ ├── qwiklabs-openssl.sh
│ │ └── qwiklabs-hashing.sh
│ ├── practice-quiz-cryptography-applications.md
│ ├── practice-quiz-symmetric-encryption.md
│ └── practice-quiz-hashing.md
├── 5_defense-in-depth
│ ├── readme.md
│ ├── resources.md
│ └── practice-quiz-application-hardening.md
├── 4_securing-your-networks
│ ├── readme.md
│ ├── graded-assessments
│ │ └── qwiklabs-introducing-tcpdump.sh
│ ├── resources.md
│ ├── practice-quiz-wireless-security.md
│ └── practice-quiz-network-monitoring.md
└── README.md
├── c1_technical-support-fundamentals
├── 5_software
│ ├── resources.md
│ ├── graded-assessment
│ │ ├── install-update-and-remove-software-from-windows
│ │ │ ├── links.txt
│ │ │ ├── assets
│ │ │ │ ├── vlc-update.png
│ │ │ │ ├── firefox-install.png
│ │ │ │ └── gimp-uninstall.png
│ │ │ └── readme.md
│ │ └── install-update-and-remove-software-from-linux
│ │ │ ├── script.sh
│ │ │ └── readme.md
│ ├── practice-quiz-interacting-with-software.md
│ ├── readme.md
│ ├── practice-quiz-introduction-to-software.md
│ ├── highlights.md
│ └── quiz.md
├── 1_introduction-to-it
│ ├── resources.md
│ ├── graded-assessment
│ │ ├── binary-calculator.png
│ │ └── how-to-count-in-binary.md
│ ├── practice-quiz-computer-architecture.md
│ ├── readme.md
│ ├── quiz.md
│ ├── practice-quiz-binary.md
│ └── highlights.md
├── 3_operating-system
│ ├── graded-assessment
│ │ ├── create-a-folder-with-linux
│ │ │ ├── script.sh
│ │ │ └── readme.md
│ │ └── create-a-folder-with-windows
│ │ │ ├── step1.png
│ │ │ ├── step2.png
│ │ │ ├── step3.png
│ │ │ ├── step4.png
│ │ │ ├── step5.png
│ │ │ ├── readme.md
│ │ │ └── create-a-folder.md
│ ├── quiz.md
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-installing-an-operating-system.md
│ └── practice-quiz-what-is-operating-system.md
├── 4_networking
│ ├── resources.md
│ ├── readme.md
│ ├── quiz.md
│ ├── highlights.md
│ └── practice-quiz-limitations-of-the-internet.md
├── technical-support-fundamentals.pdf
├── 2_hardware
│ ├── graded-assessment
│ │ ├── assemble-a-computer.png
│ │ └── assemble-a-computer.md
│ ├── readme.md
│ ├── practice-quiz-the-modern-computer.md
│ ├── quiz.md
│ ├── resources.md
│ ├── practice-quiz-components.md
│ └── practice-quiz-starting-it-up.md
├── 6_troubleshooting
│ ├── readme.md
│ ├── resources.md
│ └── graded-assignment
│ │ └── quiz-writing-effective-documentation.md
└── README.md
├── c3_os-power-user
├── computer-networking.pdf
├── 1_navigating-the-system
│ ├── graded-assessments
│ │ ├── copy-file-win.png
│ │ ├── create-file-win.png
│ │ ├── delete-file-win.png
│ │ ├── qwiklabs-linux.sh
│ │ └── quiz-accessing-qwiklabs.md
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-basic-commands.md
│ └── practice-quiz-file-and-text-manipulation.md
├── 3_package-and-software-managemenet
│ ├── graded-assessments
│ │ ├── win-archieve.png
│ │ ├── win-extract.png
│ │ ├── win-install-vlc.png
│ │ ├── win-install-atom.png
│ │ ├── win-uninstall-git.png
│ │ └── qwiklabs-linux.sh
│ ├── practice-quiz-whats-happening-in-the-background.md
│ ├── readme.md
│ ├── practice-quiz-package-managers.md
│ ├── practice-quiz-device-software-management.md
│ └── resources.md
├── 6_operating-system-in-practice
│ ├── graded-assessments
│ │ ├── assets
│ │ │ ├── win-delete.png
│ │ │ ├── win-end-process.png
│ │ │ ├── win-permission.png
│ │ │ └── win-update-vlc.png
│ │ ├── qwiklabs-windows.md
│ │ └── qwiklabs-linux.md
│ ├── practice-quiz-remote-access.md
│ ├── resources.md
│ ├── readme.md
│ └── practice-quiz-logging.md
├── 5_process-management
│ ├── graded-assessments
│ │ ├── qwiklabs-linux.sh
│ │ └── qwiklabs-windows.txt
│ ├── practice-quiz-life-of-a-process.md
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-managing-processes.md
│ └── practice-quiz-process-utilization.md
├── 2_users-and-permissions
│ ├── resources.md
│ ├── readme.md
│ ├── graded-assessments
│ │ ├── qwiklabs-linux.sh
│ │ └── qwiklabs-windows.txt
│ └── practice-quiz-permissions.md
├── 4_filesystems
│ ├── graded-assessments
│ │ └── qwiklabs-linux.sh
│ ├── readme.md
│ └── resources.md
└── README.md
├── c2_computer-networking
├── computer-networking.pdf
├── 2_the-network-layer
│ ├── graded-assessments
│ │ ├── assets
│ │ │ ├── path1.jpg
│ │ │ ├── path2.jpg
│ │ │ ├── path3.jpg
│ │ │ ├── path4.jpg
│ │ │ ├── path5.jpg
│ │ │ ├── path6.jpg
│ │ │ ├── path7.jpg
│ │ │ └── path8.jpg
│ │ └── quiz-routing-paths-and-subnets.md
│ ├── practice-quiz-the-networking-layer.md
│ ├── practice-quiz-routing.md
│ ├── resources.md
│ ├── practice-quiz-subnetting.md
│ └── about.md
├── 5_connecting-to-the-internet
│ ├── graded-assessments
│ │ ├── assets
│ │ │ ├── wc1.jpg
│ │ │ ├── wc2.jpg
│ │ │ ├── wc3.jpg
│ │ │ └── wc4.jpg
│ │ └── quiz-wireless-channels.md
│ ├── readme.md
│ ├── practice-quiz-wireless-networking.md
│ ├── resources.md
│ ├── practice-quiz-broadband-internet.md
│ ├── practice-quiz-pots-and-dial-up.md
│ └── practice-quiz-wans.md
├── 1_introduction-to-networking
│ ├── graded-assesment
│ │ ├── layers-in-networking-models.png
│ │ └── quiz-layers-in-networking-models.md
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-tcp-ip.md
│ ├── practice-quiz-the-physical-layer.md
│ ├── practice-quiz-data-link-layer.md
│ ├── practice-quiz-the-data-link-layer.md
│ └── practice-quiz-networking-devices.md
├── 3_the-transport-and-application-layer
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-the-application-layer.md
│ ├── practice-quiz-the-transport-layer.md
│ └── graded-assessments
│ │ └── quiz-five-layer-network-model.md
├── 6_troubleshooting-the-future-of-internet
│ ├── resources.md
│ ├── readme.md
│ ├── graded-assessments
│ │ └── quiz-ipv6-compression.md
│ ├── practice-quiz-digging-into-dns.md
│ ├── practice-quiz-ipv6.md
│ ├── practice-quiz-verifying-connectivity.md
│ └── practice-quiz-the-cloud.md
├── 4_network-services
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-name-resolution.md
│ ├── practice-quiz-name-resolution-in-practice.md
│ ├── practice-quiz-vpns-and-proxies.md
│ ├── practice-quiz-dynamic-host-configuration-protocol.md
│ ├── practice-quiz-network-address-translation.md
│ └── graded-assessments
│ │ └── quiz-networking-services-simulation.md
└── README.md
├── c4_system-administration-it-infrastructure-services
├── computer-networking.pdf
├── 5_data-recovery-and-backups
│ ├── resources.md
│ ├── practice-quiz-post-mortems.md
│ ├── readme.md
│ └── practice-quiz-disaster-recovery-plans.md
├── 4_directory-services
│ ├── readme.md
│ ├── resources.md
│ ├── practice-quiz-intro-to-directory-services.md
│ └── practice-quiz-centralized-management-and-ldap.md
├── 1_what-is-system-administration
│ ├── qwiklabs-prod-and-test.sh
│ ├── readme.md
│ └── practice-quiz-system-administration-task.md
├── 2_network-and-infrastructure-services
│ ├── resources.md
│ ├── readme.md
│ ├── practice-quiz-intro-it-infra-services.md
│ ├── practice-quiz-physical-infrastructure-services.md
│ └── qwiklabs-service-manag-linux.sh
├── 3_software-and-platform-services
│ ├── practice-quiz-troubleshooting-platform-services.md
│ ├── readme.md
│ ├── qwiklabs-managing-cloud-resources.sh
│ ├── qwiklabs-managing-web-with-apache2.sh
│ ├── practice-quiz-file-print-and-platform-service.md
│ ├── resources.md
│ ├── qwiklabs-001-ourcompany.conf
│ └── practice-quiz-software-services.md
├── 6_final-project
│ └── readme.md
└── README.md
├── LICENSE
└── README.md
/google-it-support.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/google-it-support.jpg
--------------------------------------------------------------------------------
/c5_it-security/it-security.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c5_it-security/it-security.pdf
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/Software_versioning
--------------------------------------------------------------------------------
/c3_os-power-user/computer-networking.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/computer-networking.pdf
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://simple.wikipedia.org/wiki/Logic_gate.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-linux/script.sh:
--------------------------------------------------------------------------------
1 | #/usr/bin/bash
2 |
3 | mkdir my-super-cool-folder
--------------------------------------------------------------------------------
/c2_computer-networking/computer-networking.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/computer-networking.pdf
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/4_networking/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * http://www.wired.co.uk/article/internet-of-things-what-is-explained-iot
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/technical-support-fundamentals.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/technical-support-fundamentals.pdf
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/links.txt:
--------------------------------------------------------------------------------
1 | https://www.mozilla.org/en-US/firefox/new/
2 | https://www.videolan.org/vlc/download-windows.html
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/computer-networking.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c4_system-administration-it-infrastructure-services/computer-networking.pdf
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path1.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path2.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path2.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path3.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path3.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path4.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path4.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path5.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path5.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path6.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path6.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path7.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path7.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path8.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/2_the-network-layer/graded-assessments/assets/path8.jpg
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/graded-assessments/copy-file-win.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/1_navigating-the-system/graded-assessments/copy-file-win.png
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/graded-assessments/create-file-win.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/1_navigating-the-system/graded-assessments/create-file-win.png
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/graded-assessments/delete-file-win.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/1_navigating-the-system/graded-assessments/delete-file-win.png
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc1.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc2.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc2.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc3.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc3.jpg
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc4.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/assets/wc4.jpg
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/graded-assessment/assemble-a-computer.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/2_hardware/graded-assessment/assemble-a-computer.png
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-archieve.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-archieve.png
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-extract.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-extract.png
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-delete.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-delete.png
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-install-vlc.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-install-vlc.png
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-install-atom.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-install-atom.png
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-uninstall-git.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/win-uninstall-git.png
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-end-process.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-end-process.png
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-permission.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-permission.png
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-update-vlc.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c3_os-power-user/6_operating-system-in-practice/graded-assessments/assets/win-update-vlc.png
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/graded-assessment/binary-calculator.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/1_introduction-to-it/graded-assessment/binary-calculator.png
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/graded-assesment/layers-in-networking-models.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c2_computer-networking/1_introduction-to-networking/graded-assesment/layers-in-networking-models.png
--------------------------------------------------------------------------------
/c2_computer-networking/3_the-transport-and-application-layer/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.iana.org/
6 | * https://www.iana.org/assignments/service-names-port-numbers
7 | * https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step1.png
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step2.png
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step3.png
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step4.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step4.png
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step5.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/step5.png
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.sans.org/reading-room/whitepapers/standards/osi-model-overview-543
6 | * https://en.wikipedia.org/wiki/OSI_model
7 | * https://en.wikipedia.org/wiki/Ethernet_over_twisted_pair
--------------------------------------------------------------------------------
/c5_it-security/3_aaa_security/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.planetbiometrics.com/article-details/i/5774/desc/indian-pupils-cheat-biometric-system-with-glue/
6 | * https://www.theverge.com/2017/5/3/15534768/google-docs-phishing-attack-share-this-document-with-you-spam
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/quiz.md:
--------------------------------------------------------------------------------
1 | ### Logs
2 |
3 | ____ are files that record system events on our computer just like a system's diary. Check all that apply.
4 |
5 | * Metadata
6 | * Kernels
7 | * **Logs**
8 | * Bootloaders
9 |
10 | > Logs are our computer's system diary.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/assets/vlc-update.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/assets/vlc-update.png
--------------------------------------------------------------------------------
/c5_it-security/6_creating-company-culture-for-security/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.tenable.com/products/nessus-vulnerability-scanner
6 | * http://www.openvas.org/
7 | * https://www.qualys.com/forms/freescan/
8 | * https://support.google.com/a/answer/6197508?hl=en
9 | * https://vsaq-demo.withgoogle.com/
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/assets/firefox-install.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/assets/firefox-install.png
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/assets/gimp-uninstall.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elmoallistair/google-it-support/HEAD/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/assets/gimp-uninstall.png
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/graded-assessments/qwiklabs-linux.sh:
--------------------------------------------------------------------------------
1 | # Terminating a specific process
2 | ps -aux | grep "totally_not_malicious"
3 | sudo kill 1248
4 | ps -aux | grep "totally_not_malicious"
5 |
6 | # Terminating multiple processes
7 | ps -aux | grep "razzle"
8 | sudo kill 1249
9 | sudo kill 1250
10 | sudo kill 1251
11 | ps -aux | grep "razzle"
12 |
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/Netcat
6 | * https://docs.microsoft.com/powershell/module/nettcpip/test-netconnection
7 | * https://en.wikipedia.org/wiki/6in4
8 | * https://en.wikipedia.org/wiki/Tunnel_Setup_Protocol
9 | * https://en.wikipedia.org/wiki/Anything_In_Anything
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/practice-quiz-interacting-with-software.md:
--------------------------------------------------------------------------------
1 | ## Interacting with Software
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | In the Linux distribution Ubuntu, what command would you use to install an application?
8 |
9 | * **apt**
10 | * execute
11 | * application
12 | * run
13 |
14 | > apt is a command we use in Ubuntu for package installs.
--------------------------------------------------------------------------------
/c5_it-security/1_understanding-security-threads/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * http://www.independent.co.uk/news/business/news/disgruntled-worker-tried-to-cripple-ubs-in-protest-over-32000-bonus-481515.html
6 | * https://threatpost.com/major-dns-cache-poisoning-attack-hits-brazilian-isps-110711/75859/
7 | * https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/graded-assessments/qwiklabs-windows.txt:
--------------------------------------------------------------------------------
1 | # Terminating a specific process
2 | Get-Process -Name "totally_not_malicious"
3 | taskkill /F /PID 1332
4 | Get-Process -Name "totally_not_malicious"
5 |
6 | # Terminating multiple processes
7 | Get-Process -Name "*razzle*"
8 | taskkill /F /PID 1984
9 | taskkill /F /PID 1884
10 | Get-Process -Name "*razzle*"
11 |
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/practice-quiz-whats-happening-in-the-background.md:
--------------------------------------------------------------------------------
1 | ## What’s happening in the background?
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following tools allows you to create or edit MSI files?
8 |
9 | * Process monitor
10 | * **Orca**
11 | * Setup.exe
12 |
13 | > The Orca tool, that's part of the Windows SDK, will let you work with MSI files.
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/practice-quiz-life-of-a-process.md:
--------------------------------------------------------------------------------
1 | ## Life of a Process
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | True or false: Windows processes can operate independently of their parents.
8 |
9 | * **TRUE**
10 | * FALSE
11 |
12 | > Unlike in Linux, after a child process is created in Windows and inherits its parent's environment, the parent process can be terminated and the child will continue to run.
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/practice-quiz-remote-access.md:
--------------------------------------------------------------------------------
1 | ## Remote Access
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
8 |
9 | * **pscp.exe**
10 | * psftp.exe
11 | * pageant.exe
12 |
13 | > The pscp.exe tool, or PuTTY Secure Copy Client, will let you copy files to and from remote computers using SCP.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/5_data-recovery-and-backups/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://about.gitlab.com/2017/02/01/gitlab-dot-com-database-incident/
6 | * https://support.microsoft.com/en-us/help/17127/windows-back-up-restore
7 | * https://support.apple.com/en-us/HT201250
8 | * https://wiki.archlinux.org/index.php/rsync#As_a_backup_utility
9 | * https://en.wikipedia.org/wiki/Standard_RAID_levels
--------------------------------------------------------------------------------
/c3_os-power-user/2_users-and-permissions/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://msdn.microsoft.com/en-us/library/cc875839.aspx
6 | * https://support.apple.com/HT201320
7 | * https://support.google.com/nexus/answer/7664951
8 | * https://support.google.com/nexus/answer/2865483
9 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa374872(v=vs.85).aspx
10 | * https://technet.microsoft.com/en-us/library/cc732880(v=ws.11).aspx
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-linux/script.sh:
--------------------------------------------------------------------------------
1 | # verifying installed software
2 | dpkg -s firefox
3 | dpkg -s gimp
4 | dpkg -s vlc
5 |
6 | sudo apt-get install -f # force an update of the package manager, update vlc
7 | dpkg -s vlc
8 | sudo apt-get update
9 | sudo apt-get install firefox # install firefox
10 | dpkg -s firefox
11 | sudo apt-get remove gimp # remove gimp
12 | dpkg -s gimp
13 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-linux/readme.md:
--------------------------------------------------------------------------------
1 | ## Create a Folder with Linux
2 |
3 | Now you will do the exact same thing that you did for the Windows lab but for the Linux operating system!
4 |
5 | ### What you’ll do
6 |
7 | There are two learning objectives for this lab:
8 |
9 | * Familiarize yourself with the Qwiklabs environment and log into the Google Cloud Console
10 | * Access a Linux VM instance and create a basic file using the command line interface.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/graded-assessment/assemble-a-computer.md:
--------------------------------------------------------------------------------
1 | ## Assemble a Computer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | You will assemble a computer virtually by drag-and-dropping the components to the corresponding red sections.
8 |
9 | In the CPU section, you will need to place the items in the correct order from bottom to top. What this means is that you will place the component on the screen in the order that you would put them into the physical computer first.
10 |
11 | 
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/graded-assessments/qwiklabs-linux.sh:
--------------------------------------------------------------------------------
1 | # install atom
2 | sudo dpkg -i /home/qwiklab/downloads/atom-amd64.deb
3 | sudo apt install -f -y
4 | dpkg -s atom
5 |
6 | # extracting an archive
7 | cd /home/qwiklab/downloads
8 | sudo tar -xvf extract_me.tar
9 |
10 | # archiving files
11 | cd ~
12 | tar -cvf Planets.tar /home/qwiklab/documents/Earth /home/qwiklab/documents/Mercury /home/qwiklab/documents/Venus
13 |
14 | # install 7zip
15 | sudo apt install p7zip-full -y
16 | dpkg -s p7zip-full
17 |
18 | # uninstall gimp
19 | sudo apt remove gimp -y
20 | dpkg -s gimp
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.iana.org/
6 | * https://www.nro.net/ipv4-free-pool-depleted
7 | * https://mailman.apnic.net/mailing-lists/apnic-announce/archive/2011/04/msg00002.html
8 | * https://www.ripe.net/publications/news/announcements/ripe-ncc-begins-to-allocate-ipv4-address-space-from-the-last-8
9 | * https://www.lacnic.net/en/web/anuncios/2014-no-hay-mas-direcciones-ipv4-en-lac
10 | * https://www.arin.net/vault/announcements/2015/20150924.html
11 | * https://afrinic.net/exhaustion
12 | * https://en.wikipedia.org/wiki/IPv4_address_exhaustion
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/readme.md:
--------------------------------------------------------------------------------
1 | ## Hardware
2 |
3 | In the second week of this course, we'll learn about what's inside a computer. We'll learn all about the hardware components or different pieces inside a computer. We'll discover what each component does and how they work together to make a computer function. By the end of this module, you will also know how to build a computer from scratch!
4 |
5 | ### Key Concepts
6 |
7 | * Describe the main components that make up a computer and how they work together.
8 | * Understand how the CPU takes instructions and executes them.
9 | * Describe how binary data physically travels throughout a computer.
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/readme.md:
--------------------------------------------------------------------------------
1 | ## Connecting to the Internet
2 |
3 | In the fifth week of this course, we'll explore the history of the Internet, how it evolved, and how it works today. We'll understand the different ways to connect to the Internet through cables, wireless and cellar connections, and even fiber connections. By the end of this module, you'll be able to define the components of WANs and outline the basics of wireless and cellular networking.
4 |
5 | ### Key Concepts
6 |
7 | * Describe various Internet connectivity technologies.
8 | * Define components of WANs.
9 | * Outline the basics of wireless and cellular networking.
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/taskkill
6 | * https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-process?view=powershell-5.1
7 | * http://man7.org/linux/man-pages/man1/ps.1.html
8 | * https://docs.microsoft.com/en-us/cpp/c-runtime-library/reference/signal
9 | * https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer
10 | * https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-process?view=powershell-5.1#outputs
11 | * https://en.wikipedia.org/wiki/Load_(computing)
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/practice-quiz-the-modern-computer.md:
--------------------------------------------------------------------------------
1 | ## The Modern Computer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Where does the CPU store its computations?
8 |
9 | * Binary
10 | * **Registers**
11 | * Processor
12 | * External Data Bus
13 |
14 | > When the CPU does computation, it stores information in registers first.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Which mechanisms do we use to transport binary data and memory addresses? Check all that apply.
21 |
22 | * **Address Bus**
23 | * **The External Data Bus**
24 | * School Bus
25 | * DBus
26 |
27 | > The EDB is used to transport binary data and the Address Bus is used to transport memory addresses.
--------------------------------------------------------------------------------
/c3_os-power-user/2_users-and-permissions/readme.md:
--------------------------------------------------------------------------------
1 | ## Users and Permissions
2 |
3 | In the second week of this course, we'll learn about configuring users and permissions in Windows and Linux OS. As an IT Support Specialist, it's important to know how to grant the appropriate permissions to users and groups for both Windows and Linux OS. By the end of this module, you will know how to add, modify, and remove users for a computer and for specific files and folders by using the Windows GUI, Windows CLI, and Linux shell.
4 |
5 | ### Key Concepts
6 |
7 | * Grant the appropriate permissions to users and groups.
8 | * Add, modify and remove users on a computer.
9 | * Add, modify and remove permissions on files and folders.
--------------------------------------------------------------------------------
/c3_os-power-user/4_filesystems/graded-assessments/qwiklabs-linux.sh:
--------------------------------------------------------------------------------
1 | # creating partitions
2 | sudo fdisk /dev/sda2
3 | # in fdisk
4 | d # delete partition
5 | [ENTER] # default value 1
6 | n # new disk
7 | p # physical disk
8 | [ENTER] # default value: 1
9 | [ENTER] # default value: 2048
10 | 2097200 # 1gb partition
11 | n # new disk
12 | p # physical disk
13 | [ENTER] # default value: 2
14 | [ENTER] # default value: 2099200
15 | [ENTER] # default value: remaining disk space
16 | v # verify
17 | w # commit
18 |
19 | # formatting partitions using mkfs
20 | lsblk
21 | sudo mkfs -t ext4 /dev/sda2
22 | sudo mount /dev/sda2 /home/my_drive
23 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/4_directory-services/readme.md:
--------------------------------------------------------------------------------
1 | ## Directory Services
2 |
3 | In the fourth week of this course, we'll learn about directory services. Specifically, we'll cover how two of the most popular directory services, Active Directory and OpenLDAP, work in action. We'll explore the concept of centralized management and how this can help SysAdmins maintain and support all the different parts of an IT infrastructure. By the end of this module, you will know how to add users, passwords, and use group policies in Active Directory and OpenLDAP.
4 |
5 | ### Key Concepts
6 |
7 | * Understand what services a directory server provides.
8 | * Understand what LDAP and Active Directory are.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://blogs.msdn.microsoft.com/powershell/2015/06/03/looking-forward-microsoft-support-for-secure-shell-ssh/
6 | * https://en.wikipedia.org/wiki/Comparison_of_SSH_clients
7 | * https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
8 | * https://en.wikipedia.org/wiki/Chrome_OS
9 | * https://en.wikipedia.org/wiki/ReFS
10 | * http://www.makeuseof.com/tag/operating-system-choose-next-pc/
11 | * https://www.ubuntu.com/
12 | * https://www.balena.io/etcher/
13 | * https://www.ubuntuupdates.org/
14 | * https://arstechnica.com/information-technology/2017/04/ubuntu-unity-is-dead-desktop-will-switch-back-to-gnome-next-year/
--------------------------------------------------------------------------------
/c2_computer-networking/3_the-transport-and-application-layer/readme.md:
--------------------------------------------------------------------------------
1 | ## The Transport and Application Layers
2 |
3 | In the third week of this course, we'll explore the transport and application layers. By the end of this module, you'll be able to describe TCP ports and sockets, identify the different components of a TCP header, show the difference between connection-oriented and connectionless protocols, and explain how TCP is used to ensure data integrity.
4 |
5 | ### Key Concepts
6 |
7 | * Describe TCP ports and sockets.
8 | * Examine the different components of a TCP header.
9 | * Compare differences between connection-oriented and connectionless protocols.
10 | * Explain how TCP is used to ensure data integrity.
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/readme.md:
--------------------------------------------------------------------------------
1 | ## Troubleshooting and the Future of Networking
2 |
3 | Congratulations, you've made it to the final week in the course! In the last week of this course, we'll explore the future of computer networking. We'll also cover the practical aspects of troubleshooting a network using popular operating systems. By the end of this module, you'll be able to detect and fix a lot of common network connectivity problems using tools available in Microsoft Windows, MacOS, and Linux operating systems.
4 |
5 | ### Key Concepts
6 |
7 | * Inspect common network connectivity problems.
8 | * Use tools available in Microsoft Windows, MacOS, and Linux to troubleshoot network issues.
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/practice-quiz-the-networking-layer.md:
--------------------------------------------------------------------------------
1 | ## The Network Layer
2 |
3 | ### Question 1
4 |
5 | Please select all of the valid IP addresses. Check all that apply.
6 |
7 | * 123.456.123.456
8 | * **192.168.1.1**
9 | * **8.8.8.8**
10 | * 257.70.312.49
11 |
12 | ### Question 2
13 |
14 | What happens to the TTL field of an IP datagram every time it reaches a router?
15 |
16 | * **The TTL field is decremented by one.**
17 | * The TTL field is reset to zero.
18 | * The TTL field is used for a cyclical redundancy check.
19 | * The TTL field is incremented by one.
20 |
21 | > At every router hop, the TTL field is decremented by one until it reaches zero, causing the datagram to be discarded.
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/readme.md:
--------------------------------------------------------------------------------
1 | ## Process Management
2 |
3 | In the fifth week of this course, we'll explore process management. As an IT Support Specialist, it is important to use system tools to read and understand process statuses of machines. We will cover ways to start and terminate a process in Windows and Linux. We will also apply troubleshooting tools to solve problems with processes and resources. By the end of this module, you will use Windows and Linux commands to do practical process maintenance.
4 |
5 | ### Key Concepts
6 |
7 | * Use system tools and be able to read and understand process statuses.
8 | * Start and terminate a process.
9 | * Use troubleshooting tools to problem solve issues with processes and resources.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/1_what-is-system-administration/qwiklabs-prod-and-test.sh:
--------------------------------------------------------------------------------
1 | # in test-instance vm - fix the problem int the test instance
2 | # go visit http:///aboutus.html
3 | cd /var/www/example/ # change dir
4 | ls
5 | sudo mv about_us.html aboutus.html # rename file
6 | # go visit http:///aboutus.html
7 | ls -l # look at aboutus.html permission
8 | sudo chmod o+r aboutus.html # change file permission
9 | ls -l # verify permission
10 | # go visit http:///aboutus.html
11 |
12 | # in prod-server vm - fix the problem int the test instance
13 | cd /var/www/example/
14 | ls -l
15 | sudo mv about_us.html aboutus.html
16 | sudo chmod o+r aboutus.html
17 | ls -l
18 |
--------------------------------------------------------------------------------
/c5_it-security/6_creating-company-culture-for-security/readme.md:
--------------------------------------------------------------------------------
1 | ## Creating a Company Culture for Security
2 |
3 | Congratulations, you've made it to the final week in the course! In the last week of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!
4 |
5 | ### Key Concepts
6 |
7 | * Determine appropriate measures to use to meet the 3 goals of security.
8 | * Develop a security plan for a small-medium size organization.
9 | * Develop a disaster recovery plan.
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/graded-assessments/qwiklabs-linux.sh:
--------------------------------------------------------------------------------
1 | #!/usr/bin/bash
2 |
3 | cd /home/user/Documents
4 | mkdir red blue green yellow magenta
5 |
6 | touch empty_file
7 | cp /home/user/source_file /home/user/duplicates/target_file
8 | cd /home/user/Pictures
9 | mv .apple .banana .broccoli .milk /home/user/Documents/Hidden
10 |
11 | mv /home/user/Movies/Europe\ Pictures /home/user/Pictures
12 | cd /home/user/Pictures
13 | mv /home/user/Images/Vacation.JPG .
14 |
15 | cd /home/user/Music
16 | rm Best_of_the_90s 80s_jams Classical
17 | rmdir Rock
18 |
19 | grep -rw /home/user/Downloads -e "vacation"
20 | mv /home/user/Downloads/Iceland /home/user/Downloads/Japan /home/user/Documents
21 |
22 | touch editor_test.txt
23 | nano editor_test.txt
--------------------------------------------------------------------------------
/c3_os-power-user/4_filesystems/readme.md:
--------------------------------------------------------------------------------
1 | ## Filesystems
2 |
3 | In the fourth week of this course, we'll learn about how filesystems work for Windows and Linux OS. We'll learn about filesystem types and why they're different for certain OS. We'll learn about disk partitioning and virtual memory and why these are so important for an IT Support Specialist's role. We'll also cover ways mount and unmount filesystems, read disk usage, and repair filesystems. By the end of this module, you will partition and format a disk drive yourself in both Windows and Linux.
4 |
5 | ### Key Concepts
6 |
7 | * Format and partition a disk in Windows.
8 | * Use common tools to repair a filesystem and disk.
9 | * View disk usage and free space.
10 | * Format and partition a disk in Linux.
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/readme.md:
--------------------------------------------------------------------------------
1 | ## Pelcgbybtl (Cryptology)
2 |
3 | In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
4 |
5 | ### Key Concepts
6 |
7 | * Understand the how symmetric encryption, asymmetric encryption, and hashing work.
8 | * Describe the most common algorithms of cryptography.
9 | * Choose the most appropriate cryptographic method given a scenario.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/1_what-is-system-administration/readme.md:
--------------------------------------------------------------------------------
1 | ## What is System Administration?
2 |
3 | Welcome to the System Administration course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of system administration. We'll cover organizational policies, IT infrastructure services, user and hardware provisioning, routine maintenance, troubleshooting, and managing potential issues. By the end of this module, you will understand the roles and responsibilities of a System Administrator. So let's get started!
4 |
5 | ### Key Concepts
6 |
7 | * Examine the roles and responsibilities of a Systems Administrator.
8 | * Differentiate the technical differences between a server and a client machine.
--------------------------------------------------------------------------------
/c5_it-security/3_aaa_security/readme.md:
--------------------------------------------------------------------------------
1 | ## AAA Security (Not Roadside Assistance)
2 |
3 | In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
4 |
5 | ### Key Concepts
6 |
7 | * Identify and describe the most common authentication services.
8 | * Understand and be able to choose the most appropriate method of authentication or authorization.
9 | * Be able to grant the appropriate level of access for the users of an organization.
--------------------------------------------------------------------------------
/c5_it-security/5_defense-in-depth/readme.md:
--------------------------------------------------------------------------------
1 | ## Defense in Depth
2 |
3 | In the fifth week of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.
4 |
5 | ### Key Concepts
6 |
7 | * Implement the appropriate methods for system hardening.
8 | * Implement the appropriate methods for application hardening.
9 | * Determine the appropriate policies to use for operating system security.
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/readme.md:
--------------------------------------------------------------------------------
1 | ## Package and Software Management
2 |
3 | In the third week of this course, we'll learn about package and software management in Windows and Linux OS. It's important to know how package installs work and how devices and drivers are managed within these operating systems. We will also learn about different packaging and file compression methods. By the end of this module, you will know how to create, update, and remove software by using the Windows GUI, Windows CLI and Linux shell.
4 |
5 | ### Key Concepts
6 |
7 | * Differentiate between different packaging and file compression methods.
8 | * Understand how Windows and Linux package installs work.
9 | * Understand how devices and drivers are managed in Windows and Linux.
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://docs.microsoft.com/powershell/
6 | * https://docs.microsoft.com/powershell/scripting/learn/ps101/00-introduction
7 | * https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/windows-commands
8 | * https://www.gnu.org/software/bash/manual/bash.html
9 | * https://technet.microsoft.com/en-us/library/hh148159.aspx
10 | * https://notepad-plus-plus.org/
11 | * https://www.nano-editor.org/
12 | * https://vim.sourceforge.io/docs.php
13 | * https://www.gnu.org/software/emacs/tour/
14 | * https://mva.microsoft.com/en-us/training-courses/getting-started-with-microsoft-powershell-8276
15 | * https://github.com/PowerShell/PowerShell/blob/master/docs/learning-powershell/README.md
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/4_networking/readme.md:
--------------------------------------------------------------------------------
1 | ## Networking
2 |
3 | In the fourth week of this course, we'll learn about computer networking. We'll explore the history of the Internet and what "The Web" actually is. We'll also discuss topics like Internet privacy, security, and what the future of the Internet may look like. You'll also understand why the Internet has limitations even today. By the end of this module, you will know how the Internet works and recognize both the positive and negative impacts the Internet has had on the world.
4 |
5 | ### Key Concepts
6 |
7 | * Recognize the positive as well as negative impacts of the Internet such as privacy and security.
8 | * Understand the basics of computer networking.
9 | * Understand the basics of how data travels across the Internet.
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/practice-quiz-routing.md:
--------------------------------------------------------------------------------
1 | ## Routing
2 |
3 | ### Question 1
4 |
5 | Select examples of routing protocols. Check all that apply.
6 |
7 | * **Border Gateway Protocol**
8 | * **Routing Information Protocol**
9 | * Transmission Control Protocol
10 | * Hypertext Transfer Protocol
11 | * User Datagram Protocol
12 |
13 | ### Question 2
14 |
15 | Who is permitted to use non-routable address space?
16 |
17 | * **Anyone**
18 | * The IANA
19 | * It's for testing purposes only
20 | * The IETF
21 |
22 | > Anyone can use non-routable address space.
23 |
24 | ### Question 3
25 |
26 | A typical routing table may contain which of the following? Check all that apply.
27 |
28 | * Destination address
29 | * **Total hops**
30 | * Destination network
31 | * TTL
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 | * https://www.ietf.org/
4 | * https://en.wikipedia.org/wiki/Routing_Information_Protocol
5 | * https://tools.ietf.org/html/rfc2453
6 | * https://en.wikipedia.org/wiki/Enhanced_Interior_Gateway_Routing_Protocol
7 | * https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html
8 | * https://en.wikipedia.org/wiki/Open_Shortest_Path_First
9 | * https://tools.ietf.org/html/rfc2328
10 | * https://en.wikipedia.org/wiki/Border_Gateway_Protocol
11 | * https://www.ietf.org/
12 | * https://www.ietf.org/standards/rfcs/
13 | * https://en.wikipedia.org/wiki/April_Fools%27_Day_Request_for_Comments
14 | * https://tools.ietf.org/html/rfc1149
15 | * https://www.ietf.org/rfc/rfc3514.txt
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/2_network-and-infrastructure-services/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.techrepublic.com/blog/the-enterprise-cloud/side-by-side-comparisons-of-iaas-service-providers/
6 | * https://en.wikipedia.org/wiki/Network_as_a_service
7 | * http://www.businessinsider.com/the-most-popular-cloud-apps-used-at-work-2015-8
8 | * http://www.tomsitpro.com/articles/paas-providers,1-1517.html
9 | * https://www.pcworld.idg.com.au/article/151491/server_operating_systems/
10 | * https://en.wikipedia.org/wiki/OpenSSH
11 | * https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-clients
12 | * https://msdn.microsoft.com/en-us/library/aa384291(v=vs.85).aspx
13 | * https://en.wikipedia.org/wiki/PuTTY
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/Integer_factorization
6 | * http://www.rc4nomore.com/
7 | * https://nakedsecurity.sophos.com/2012/10/25/sony-ps3-hacked-for-good-master-keys-revealed/
8 | * https://www.theguardian.com/technology/gamesblog/2011/jan/07/playstation-3-hack-ps3
9 | * https://eprint.iacr.org/2005/010
10 | * https://www.schneier.com/blog/archives/2005/02/sha1_broken.html
11 | * https://eprint.iacr.org/2007/474
12 | * https://shattered.io/
13 | * https://www.ietf.org/rfc/rfc5280.txt
14 | * http://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html
15 | * https://tools.ietf.org/html/rfc3193
16 | * https://openvpn.net/index.php/open-source.html
17 | * https://gcn.com/Articles/2010/02/02/Black-Hat-chip-crack-020210.aspx
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/readme.md:
--------------------------------------------------------------------------------
1 | ## Software
2 |
3 | In the fifth week of this course, we'll learn about computer software. We'll learn about what software actually is and the different types of software you may encounter as an IT Support Specialist. We'll also explore how to manage software and revisit the concept of "abstraction." By the end of this module, you'll use the Qwiklabs environment to install, update and remove software on both Windows and Linux operating systems.
4 |
5 | ### Key Concepts
6 |
7 | * Be able to install software on Windows and Linux.
8 | * Understand the main components of software and how they work.
9 | * Describe how computers use instructions to process input and produce output.
10 | * Describe how a program breaks down into instructions for the CPU.
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://blogs.msdn.microsoft.com/powershell/2015/06/03/looking-forward-microsoft-support-for-secure-shell-ssh/
6 | * https://en.wikipedia.org/wiki/Comparison_of_SSH_clients
7 | * https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
8 | * https://technet.microsoft.com/en-us/library/hh750728(v=ws.11).aspx
9 | * https://en.wikipedia.org/wiki/Comparison_of_platform_virtualization_software
10 | * https://www.virtualbox.org/manual/ch01.html
11 | * https://en.wikipedia.org/wiki/Comparison_of_platform_virtualization_software
12 | * http://manpages.ubuntu.com/manpages/zesty/man8/logrotate.8.html
13 | * https://en.wikipedia.org/wiki/Comparison_of_disk_cloning_software
14 | * http://man7.org/linux/man-pages/man1/dd.1.html
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/readme.md:
--------------------------------------------------------------------------------
1 | ## Operating System
2 |
3 | In the third week of this course, we'll learn about operating systems. We'll discuss the common operating systems that are used today and understand how they work with the computer hardware. We'll learn about the "boot process" of an operating system and show you how to install Windows, Linux and Mac OSX operating systems from scratch. By the end of this module, you'll use the Qwiklabs environment to interact directly with the Windows and Linux operating systems.
4 |
5 | ### Key Concepts
6 |
7 | * Know what the main components that make up an operating system are.
8 | * Understand the boot process of an operating system.
9 | * Be able to install an operating system.
10 | * Create a file using the Windows and Linux operating systems.
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/practice-quiz-wireless-networking.md:
--------------------------------------------------------------------------------
1 | ## Wireless Networking
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | How many address fields does an 802.11 header have?
8 |
9 | * 1
10 | * 2
11 | * 3
12 | * **4**
13 |
14 | > There are four different address fields in an 802.11 header.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | A wireless channel is ____________.
21 |
22 | * **a portion of a frequency band.**
23 | * a point-to-point wireless connection.
24 | * a collision domain.
25 | * an example of an ad-hoc network.
26 |
27 | > A channel represents a portion of a frequency band.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Choose all of the frequencies that wireless networks typically operate on.
34 |
35 | * 88Mhz
36 | * 1.544Ghz
37 | * **2.4Ghz**
38 | * **5Ghz**
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/Point-to-Point_Protocol
6 | * https://tools.ietf.org/html/rfc1661
7 | * https://en.wikipedia.org/wiki/Point-to-point_protocol_over_Ethernet
8 | * https://tools.ietf.org/html/rfc2516
9 | * https://en.wikipedia.org/wiki/High-Level_Data_Link_Control
10 | * https://en.wikipedia.org/wiki/High-Level_Data_Link_Control
11 | * https://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode
12 | * https://en.wikipedia.org/wiki/IEEE_802.11
13 | * https://en.wikipedia.org/wiki/Internet_of_things
14 | * https://z-wavealliance.org/about_z-wave_technology/
15 | * https://z-wavealliance.org/about_z-wave_technology/
16 | * https://zigbee.org/zigbee-for-developers/zigbee-3-0/
17 | * https://www.threadgroup.org/What-is-Thread
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/2_network-and-infrastructure-services/readme.md:
--------------------------------------------------------------------------------
1 | ## Network and Infrastructure Services
2 |
3 | In the second week of this course, we'll learn about network and infrastructure services. We will cover what IT infrastructure services are and what their role is in system administration. We'll also learn about server operating systems, virtualization, network services, DNS for web services, and how to troubleshoot network services. By the end of this module, you will know the most common IT infrastructure services you'll encounter when handling system administration tasks.
4 |
5 | ### Key Concepts
6 |
7 | * Understand why DNS and DHCP servers are used and what is needed to set it up.
8 | * Learn about the physical infrastructure services in an organization that make server management easier.
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/readme.md:
--------------------------------------------------------------------------------
1 | ## Operating Systems in Practice
2 |
3 | Congratulations, you've made it to the final week in the course! In the last week of this course, we will cover some of the practical aspects of operating systems that you'll use all the time in IT Support. We will cover remote access and how to troubleshoot a computer from afar. We'll explore virtualization tools to manage and remove virtual instances, use logs for system monitoring, and show you a few different techniques for OS deployment. By the end of this module, you will apply all the skills from this course to debug some issues within Windows and Linux OS. Good luck!
4 |
5 | ### Key Concepts
6 |
7 | * Be able to remotely access a Windows or Linux machine.
8 | * Read and troubleshoot logs.
9 | * Utilize disk cloning tools to make an image.
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/practice-quiz-broadband-internet.md:
--------------------------------------------------------------------------------
1 | ## Broadband Internet
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | T1 is short for __________.
8 |
9 | * Transportation System 1.
10 | * **Transmission System 1.**
11 | * Transportation 1.
12 | * Transmission 1.
13 |
14 | > T1 is short for Transmission System 1.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | How fast is a T1 line?
21 |
22 | * **1.544 Mb/sec**
23 | * 44.763 Mb/sec
24 | * 1 Mb/sec
25 | * 128 Mb/sec
26 |
27 | > A T1 communicates at speeds of 1.544 Kb/sec.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Select all statements that are true of cable internet connections.
34 |
35 | * **They're broadband connections.**
36 | * They're dial-up connections.
37 | * **They're shared bandwidth connections.**
38 | * They're wireless connections.
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/practice-quiz-subnetting.md:
--------------------------------------------------------------------------------
1 | ## Subnetting
2 |
3 | ### Question 1
4 |
5 | What does CIDR stand for?
6 |
7 | * Classless Internet Destination Routing
8 | * Classfull Inter-Destination Routing
9 | * **Classless Inter-Domain Routing**
10 | * Classfull Identification Routing
11 |
12 | > CIDR stands for Classless Inter-Domain Routing.
13 |
14 | ### Question 2
15 |
16 | Which of the following is a correct form of CIDR notation?
17 |
18 | * 192.168.1.0:24
19 | * **192.168.1.0/24**
20 | * 192.168.1.0\24
21 | * 192.168.1.0 + 255.255.255.0
22 |
23 | > CIDR notation uses a forward slash and then lists the numbers of bits in the subnet mask.
24 |
25 | ### Question 3
26 |
27 | How many octets does a subnet mask have?
28 |
29 | * 1
30 | * 2
31 | * 3
32 | * **4**
33 |
34 | > A subnet mask is the same length as an IP address.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/practice-quiz-troubleshooting-platform-services.md:
--------------------------------------------------------------------------------
1 | ## Troubleshooting Platform Services
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | HTTP status codes that begin with 4xx, like 404, indicate errors on:
8 |
9 | * **The client-side**
10 | * The server-side
11 | * Nowhere; these codes are successful
12 | * Redirections
13 |
14 | > 4xx HTTP status codes indicate an issue with the client, like entering a bad URL or accessing something they aren't authorized to.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | HTTP status codes that begin with 5xx, like 501, indicate errors on:
21 |
22 | * The client-side
23 | * **The server-side**
24 | * Nowhere; these codes are successful
25 | * Redirections
26 |
27 | > 5xx HTTP status codes indicate an issue with the server serving the web content.
--------------------------------------------------------------------------------
/c5_it-security/1_understanding-security-threads/readme.md:
--------------------------------------------------------------------------------
1 | ## Understanding Security Threats
2 |
3 | Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.
4 |
5 | ### Key Concepts
6 |
7 | * Define and recognize security risks, vulnerabilities and threats.
8 | * Be able to identify the most common security attacks.
9 | * Understand how security revolves around the CIA principle.
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/readme.md:
--------------------------------------------------------------------------------
1 | ## Networking Services
2 |
3 | In the fourth week of this course, we'll explore networking services. We'll learn about why we need DNS and how it works. We'll also show you why DHCP makes network administration a simpler task. By the end of this module, you'll be able to do describe how DNS and DHCP work, how NAT technologies help keep networks secure, and how VPNs and proxies help users connect and stay secured.
4 |
5 | ### Key Concepts
6 |
7 | * Describe why name resolution is important.
8 | * Identify the steps involved with a DNS lookup.
9 | * Understand the most common DNS record types.
10 | * Explain how DHCP makes network administration a simpler task.
11 | * Demonstrate how NAT technologies help keep networks secure and preserve IP address space.
12 | * Describe how VPNs and proxies help users get connected and stay secure.
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/graded-assessments/qwiklabs-openssl.sh:
--------------------------------------------------------------------------------
1 | # generate a 2048-bit RSA private key
2 | openssl genrsa -out private_key.pem 2048
3 | cat private_key.pem
4 |
5 | # generate public key
6 | openssl rsa -in private_key.pem -outform PEM -pubout -out public_key.pem
7 | cat public_key.pem
8 |
9 | # creating a text file
10 | echo 'This is a secret message, for authorized parties only' > secret.txt
11 |
12 | # encrpyt the file using public key
13 | openssl rsautl -encrypt -pubin -inkey public_key.pem -in secret.txt -out secret.enc
14 |
15 | # decrpyt the message using private key
16 | openssl rsautl -decrypt -inkey private_key.pem -in secret.enc
17 |
18 | # create hash digest
19 | openssl dgst -sha256 -sign private_key.pem -out secret.txt.sha256 secret.txt
20 |
21 | # verification
22 | openssl dgst -sha256 -verify public_key.pem -signature secret.txt.sha256 secret.txt
23 |
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/practice-quiz-name-resolution.md:
--------------------------------------------------------------------------------
1 | ## Name Resolution
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What transport layer protocol does DNS normally use?
8 |
9 | * TCP
10 | * IP
11 | * ICMP
12 | * **UDP**
13 |
14 | > While DNS over TCP does exist, UDP is the most common protocol.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | A DNS TTL determines what?
21 |
22 | * How many steps there are in the resolution process
23 | * How far away a DNS can be from you
24 | * How many DNS resolutions can take place before the IP has to change
25 | * H**ow long a DNS entry is allowed to be cached**
26 |
27 | > TTL stands for Time to Live and determines how long a DNS entry can be cached.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | How many root servers are there?
34 |
35 | * 8
36 | * **13**
37 | * 16
38 | * 17
39 |
40 | > There are 13 root servers.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/readme.md:
--------------------------------------------------------------------------------
1 | ## Software and Platform Services
2 |
3 | In the third week of this course, we'll explore software and platform services. We'll cover what types of software and platform services you may encounter in a tech role and how to manage them. We'll learn how to configure email services, security services, file services, print services, and platform services. We'll explore ways to troubleshoot platform services and common issues to look out for. By the end of this module, you'll understand how to setup and manage the IT infrastructure services to help a business stay productive, keep information secure, and deliver applications to its users.
4 |
5 | ### Key Concepts
6 |
7 | * Know what communication services are available and what you need for an organization.
8 | * Run a local webserver and understand how a public webserver works.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/4_networking/quiz.md:
--------------------------------------------------------------------------------
1 | ## Course Quiz
2 |
3 |
4 |
5 | ### Basics of Networking
6 |
7 | A(n) ______ is an interconnection of computers.
8 |
9 | * service
10 | * packet
11 | * ethernet cable
12 | * **network**
13 |
14 | > You can connect many computers together to form a network.
15 |
16 | In an IT field, managing, building, and designing networks is known as ______.
17 |
18 | * coding
19 | * **networking**
20 | * engineering
21 | * management
22 |
23 | > The management and building of networks is known as networking.
24 |
25 |
26 |
27 | ### Internet of Things
28 |
29 | True or false: The Internet of Things is a concept that's allowing more devices to be connected to the Internet.
30 |
31 | * **True**
32 | * False
33 |
34 | > Common manual devices, like thermostats, kitchen appliances, and more, are being connected to the Internet thanks to the Internet of Things.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/6_troubleshooting/readme.md:
--------------------------------------------------------------------------------
1 | ## Troubleshooting
2 |
3 | Congratulations, you've made it to the last week of the course! In the final week, we'll learn about the importance of troubleshooting and customer support. We'll go through some real-world scenarios that you might encounter at a Help Desk or Desktop Support role. We'll learn why empathizing with a user is super important when working in a tech role. Finally, we'll learn why writing documentation is an important aspect of any IT role. By the end of this module, you will utilize soft skills and write documentation to communicate with others.
4 |
5 | ### Key Concepts
6 |
7 | * Be able to effectively troubleshoot an issue using the troubleshooting methods learned.
8 | * Be able to empathize with a user and utilize soft skills for an excellent customer service experience.
9 | * Understand why documentation is an important aspect of an IT role.
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/practice-quiz-managing-processes.md:
--------------------------------------------------------------------------------
1 | ## Managing Processes
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following tools can help you gather information about the processes running on a Windows operating system?
8 |
9 | * The Task Manager
10 | * The tasklist utility from a command prompt
11 | * The Get-Process commandlet from a PowerShell prompt
12 | * **All of the above**
13 |
14 | > All of these tools can help you gather information about processes running on a Windows OS.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | If you restart a process using the Process Explorer utility, what will the new parent of that process be?
21 |
22 | * cmd.exe
23 | * **Process Explorer**
24 | * windows.exe
25 | * momanddad.exe
26 |
27 | > Since Process Explorer is the process that initiated the restart, it makes sense that the new parent of the process will be Process Explorer.
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/readme.md:
--------------------------------------------------------------------------------
1 | ## Navigating the System
2 |
3 | Welcome to the Operating Systems course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of Windows and Linux operating systems (OS). We will learn about how directories and files work in Windows and Linux OS. You will also learn practical ways to manipulate files and directories in the Windows graphical user interface (GUI), Windows command line interface (CLI), and Linux shell. By the end of this module, you will interact with files and directories and perform basic text manipulation in Windows and Linux OS.
4 |
5 | ### Key Concepts
6 |
7 | * List, change, remove and make directories and files in the Windows GUI, Windows CLI and Linux shell.
8 | * Search for specific files and directories in Windows GUI, Windows CLI and Linux shell.
9 | * Manipulate text in the Windows GUI, Windows CLI and Linux shell.
--------------------------------------------------------------------------------
/c5_it-security/5_defense-in-depth/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://github.com/rsyslog/rsyslog
6 | * https://www.splunk.com/
7 | * https://www.ibm.com/security/security-intelligence/qradar
8 | * https://community.rsa.com/docs/DOC-41639
9 | * http://itknowledgeexchange.techtarget.com/security-corner/whats-your-systems-survival-time/
10 | * http://robert.ocallahan.org/2017/01/disable-your-antivirus-software-except.html
11 | * http://lock.cmpxchg8b.com/Sophail.pdf
12 | * http://www.crn.com/news/security/240148192/bit9-admits-systems-breach-stolen-code-signing-certificates.htm
13 | * https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview
14 | * https://support.apple.com/en-us/HT204837
15 | * https://wiki.archlinux.org/index.php/dm-crypt
16 | * https://www.symantec.com/products/encryption
17 | * http://truecrypt.sourceforge.net/
18 | * https://www.veracrypt.fr/en/Home.html
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/graded-assessment/how-to-count-in-binary.md:
--------------------------------------------------------------------------------
1 | ## How to Count in Binary
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | In this activity, you will use the tool below to help you convert a decimal number into binary form. When a 1 is used, we consider the value to be “ON.” When a 0 is used, we consider the value to be “OFF.”
8 |
9 | Click the binary bits necessary to compute the decimal value on the right column. You have 10 calculations to complete.
10 |
11 | 
12 |
13 |
14 |
15 | ### Some usefull script
16 |
17 | ```
18 | >>> decimals = [82,117,66,55,102,51,84,62,5,57] # change value
19 | >>> for num in decimals:
20 | ... print(f"{num}: {format(num, '08b')}")
21 | ...
22 | 82: 01010010
23 | 117: 01110101
24 | 66: 01000010
25 | 55: 00110111
26 | 102: 01100110
27 | 51: 00110011
28 | 84: 01010100
29 | 62: 00111110
30 | 5: 00000101
31 | 57: 00111001
32 | ```
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/practice-quiz-computer-architecture.md:
--------------------------------------------------------------------------------
1 | ## Computer Architecture
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the four layers of the computer architecture?
8 |
9 | * Hardware, Windows, Software, User
10 | * Computer, Operating System, Software, User
11 | * Binary, Hardware, Operating System, Software
12 | * **Hardware, Operating System, Software, User**
13 |
14 | > The layers of computer architecture are the hardware, operating system, software, and user layers.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Write a paragraph on examples of abstraction that you encounter in your day-to-day life. For example, driving a car is an example of abstraction, you don't need to understand how a car works underneath the hood in order to drive one.
21 |
22 | ```
23 | Compiler is an example of abstraction, you don't need to understand how they convert your source code to a machine language
24 | ```
--------------------------------------------------------------------------------
/c2_computer-networking/3_the-transport-and-application-layer/practice-quiz-the-application-layer.md:
--------------------------------------------------------------------------------
1 | ## The Application Layer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below.
8 |
9 | * The interconnection layer
10 | * The encryption layer
11 | * **The presentation layer**
12 | * **The session layer**
13 | * The compression layer
14 |
15 |
16 |
17 | ### Question 2
18 |
19 | An example of something that operates at the application layer is:
20 |
21 | * A router
22 | * TCP
23 | * **A web browser**
24 | * UDP
25 |
26 | > Web browsers and server operate at the application layer.
27 |
28 |
29 |
30 | ### Question 3
31 |
32 | What's the standard number for a TTL field?
33 |
34 | 8
35 | 16
36 | 32
37 | **64**
38 |
39 | > While this value can be set to anything from 0 to 255, 64 is the recommended standard.
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/practice-quiz-pots-and-dial-up.md:
--------------------------------------------------------------------------------
1 | ## POTS and Dial-up
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Another term for POTS, or the Plain Old Telephone System, is _______________.
8 |
9 | * **Public Switched Telephone Network.**
10 | * Phone Switched Transport Network.
11 | * Public Switched Telephone Exchange.
12 | * Public Available Telephone Network.
13 | * Public Available Telephone Exchange.
14 |
15 | > POTS and PSTN refer to the same thing.
16 |
17 |
18 |
19 | ### Question 2
20 |
21 | A baud rate is a measurement of the number of ______________________.
22 |
23 | * data segments that can be sent across a telephone line every second.
24 | * **bits that can be sent across a telephone line every second.**
25 | * bytes that can be sent across a telephone line every second.
26 | * packets that can be sent across a telephone line every second.
27 |
28 | > A baud rate is equivalent to bits per second.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/readme.md:
--------------------------------------------------------------------------------
1 | ## Create a Folder with Windows
2 |
3 | This lab will introduce you to the Qwiklabs online learning platform, powered by the Google Cloud Console. You’ll interact with Qwiklabs in lots of courses of the IT Support Professional Certificate program, so it’s important that you follow these instructions carefully. We’ll give you some background information about what Qwiklabs are, how these labs will help train you as an IT Support Specialist, and how to setup your Google Cloud Console via Qwiklabs. Finally, you’ll interact with the lab materials themselves. Ready? Let’s get started!
4 |
5 | ### What you’ll do
6 |
7 | There are two learning objectives for this lab:
8 |
9 | * Familiarize yourself with the Qwiklabs environment and log into the Google Cloud Console.
10 | * Access a Windows VM instance and create a basic file using the graphical user interface (GUI).
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/practice-quiz-wans.md:
--------------------------------------------------------------------------------
1 | ## WANs
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | WAN stands for ______________.
8 |
9 | * **Wide Area Network.**
10 | * Wired Area Network.
11 | * Wireless Area Network.
12 | * Wireless Local Area Network.
13 |
14 | > WAN stands for Wide Area Network.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | In a WAN, the area between a demarcation point and the ISP's core network is known as ___________.
21 |
22 | * an access point
23 | * **a local loop**
24 | * a Local Area Network
25 | * a local link
26 |
27 | > A local loop is the name for the area between a demarcation point and an ISP's network.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | A point-to-point VPN is also known as a ______________.
34 |
35 | * **site-to-site VPN**
36 | * one-to-many VPN
37 | * port forwarding VPN
38 | * data link VPN
39 |
40 | > A point-to-point VPN can also be referred to as a site-to-site VPN.
--------------------------------------------------------------------------------
/c2_computer-networking/README.md:
--------------------------------------------------------------------------------
1 | ## [The Bits and Bytes of Computer Networking](https://www.coursera.org/learn/computer-networking?specialization=google-it-support)
2 |
3 | This course is designed to provide a full overview of computer networking. We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting.
4 |
5 | By the end of this course, you’ll be able to:
6 | * Describe computer networks in terms of a five-layer model
7 | * Understand all of the standard protocols involved with TCP/IP communications
8 | * Grasp powerful network troubleshooting tools and techniques
9 | * Learn network services like DNS and DHCP that help make computer networks run
10 | * Understand cloud computing, everything as a service, and cloud storage
11 |
12 | ### Skills you will gain
13 |
14 | * Domain Name System (DNS)
15 | * Ipv4
16 | * Network Model
17 | * Troubleshooting
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/quiz.md:
--------------------------------------------------------------------------------
1 | ### Introduction to Computer Hardware
2 |
3 | To extend the functionality of a computer, we can plug devices into connection points on it. What are these connection points known as?
4 |
5 | * Hardware
6 | * **Ports**
7 | * Desktops
8 |
9 | > Ports are used to plug devices into a computer.
10 |
11 |
12 |
13 | ### RAM
14 |
15 | True or false: If you turn off a machine that uses SDRAM, the data on the SDRAM will be wiped out.
16 |
17 | * **True**
18 | * False
19 |
20 | > SDRAM is volatile and will wipe its data if it loses power.
21 |
22 |
23 |
24 | ### Putting it All Together
25 |
26 | True or false: Before you work on the physical components of your machine, you should ground yourself to prevent electrostatic discharge.
27 |
28 | * **True**
29 | * False
30 |
31 | > Even the slightest bit of electricity can cause damage to delicate computer components, so you should always make sure to ground yourself.
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/readme.md:
--------------------------------------------------------------------------------
1 | ## Introduction to Networking
2 |
3 | Welcome to the Networking course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of computer networking. We will learn about the TCP/IP and OSI networking models and how the network layers work together. We'll also cover the basics of networking devices such as cables, hubs and switches, routers, servers and clients. We'll also explore the physical layer and data link layer of our networking model in more detail. By the end of this module, you will know how all the different layers of the network model fit together to create a network.
4 |
5 | ### Key Concepts
6 |
7 | * Describe how the TCP/IP five layer network model works.
8 | * Identify basic networking devices.
9 | * Label each of the five layers in the TCP/IP network model.
10 | * Describe how the physical layer works.
11 | * Describe how the data link layer works.
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/practice-quiz-name-resolution-in-practice.md:
--------------------------------------------------------------------------------
1 | ## Name Resolution in Practice
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | An A Record contains what?
8 |
9 | * A CNAME
10 | * **An IPv4 address**
11 | * An IPv6 address
12 | * A fully qualified domain name
13 |
14 |
15 |
16 | ### Question 2
17 |
18 | Select all that are true.
19 |
20 | * **One domain name can point to one IP.**
21 | * **One domain name can point to many IPs.**
22 | * **Many domain names can point to the same IP.**
23 |
24 |
25 |
26 | ### Question 3
27 |
28 | MX stands for ________.
29 |
30 | * Micro extreme
31 | * Micro exchange
32 | * **Mail exchange**
33 | * Meta exchange
34 |
35 | > MX stands for mail exchange.
36 |
37 |
38 |
39 | ### Question 4
40 |
41 | A fully qualified domain name can contain how many characters?
42 |
43 | * 63
44 | * 64
45 | * 127
46 | * **255**
47 |
48 | > An FQDN is limited to a total length of 255 characters.
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/practice-quiz-package-managers.md:
--------------------------------------------------------------------------------
1 | ## Package Managers
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following PowerShell commands will install the package "awesomesoftware" from the Chocolatey software source?
8 |
9 | * **Install-Package -Name awesomesoftware -Source chocolatey**
10 | * Install-Package -Name chocolatey -Source awesomesoftware
11 | * Install-Package -Name awesomesoftware -Source MicrosoftWindows
12 |
13 | > This command will install a (fictional) package, using chocolatey as the software source.
14 |
15 |
16 |
17 | ### Question 2
18 |
19 | Before you install software, which of the following commands should you run to get an updated version of your software?
20 |
21 | * apt install
22 | * **apt update**
23 | * apt remove
24 | * apt search
25 |
26 | > Before you install any software, always make sure you're pulling the latest software from your repositories with the apt update command.
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/graded-assesment/quiz-layers-in-networking-models.md:
--------------------------------------------------------------------------------
1 | ## Layers in Networking Models
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Let's test your knowledge of the five-layer networking model presented in this course!
8 |
9 | **Step 1**: Drag-and-drop a networking layer into the correct order on the right-hand side of the screen. Do this for all five layers represented. If you make a mistake, click the 'Reset' button to try again.
10 |
11 | **Step 2**: After you’ve identified the five networking layers, you will be presented with a networking hardware component. This component represents a different item in the networking model. Like you did in Step 1, drag-and-drop these into the correct order. If you make a mistake, click the 'Reset' button to try again.
12 |
13 | **Step 3**: When you’re done, close the quiz (if in fullscreen) and click the “Submit Quiz” button to earn a grade.
14 |
15 | 
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/1_what-is-system-administration/practice-quiz-system-administration-task.md:
--------------------------------------------------------------------------------
1 | ## Systems Administration Tasks
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following is a good policy to enforce on passwords? Check all that apply.
8 |
9 | * **A long password length**
10 | * The use of common words
11 | * **A mixture of symbols and numbers**
12 | * A short password length
13 |
14 | > Passwords are one of the first and biggest security policies that help prevent unauthorized access. A good policy for passwords is to make them long and with a mixture of symbols, numbers, uppercase, and lowercase characters.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Which of these is part of the hardware lifecycle? Check all that apply.
21 |
22 | * **Retirement**
23 | * **Procurement**
24 | * **Deployment**
25 | * Network Connectivity
26 |
27 | > The hardware lifecycle consists of four main stages: Procurement, Deployment, Maintenance, and Retirement.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/readme.md:
--------------------------------------------------------------------------------
1 | ## Introduction to IT
2 |
3 | Welcome to Technical Support Fundamentals, the first course of the IT Support Professional Certificate! By enrolling in this course, you are taking the first step to kickstarting your career in tech. In the first week of the course, we'll learn about how computers were invented, how they've evolved over time, and how they work today. We will also learn about what an "IT Support Specialist" is and what they do in their job. By the end of this module, you will know how to count like a computer using binary and understand why these calculations are so powerful for society. So let's get started!
4 |
5 | ### Key Concepts
6 |
7 | * Understand why and how humans went from counting using manual methods to calculating data with computers.
8 | * Describe what binary is and how we use it to communicate with computers.
9 | * Understand what the layers of computer architecture are.
10 | * Convert binary numbers into decimal form.
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/graded-assessments/qwiklabs-windows.md:
--------------------------------------------------------------------------------
1 | # Qwiklabs Windows
2 |
3 | ## Steps
4 |
5 | Complete the following steps:
6 |
7 | 1. Delete ultra_mega_large (9.38 GB) file, use search feature
8 | 2. Delete corrupted file in `C:\Users\Documents`
9 | 3. Update VLC, download installer: , install and choose update
10 | 4. End malicious processes, go to task manager, search for `"totaly_not_malicious"`, end task
11 | 5. Fix Permissions , go to `C:\Users\Temp`, open super_secret_file's properties, check write's box permission
12 |
13 | ## Screenshots
14 |
15 | ### Step 1 - Delete Large File
16 |
17 | 
18 |
19 | ### Step 3 - Update VLC
20 |
21 | 
22 |
23 | ### Step 4 - End Malicious Process
24 |
25 | 
26 |
27 | ### Step 5 - Fix Permissions
28 |
29 | 
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/about.md:
--------------------------------------------------------------------------------
1 | ## The Network Layer
2 |
3 | In the second week of this course, we'll explore the network layer in more depth. We'll learn about the IP addressing scheme and how subnetting works. We'll explore how encapsulation works and how protocols such as ARP allow different layers of the network to communicate. We'll also cover the basics of routing, routing protocols, and how the Internet works. By the end of this module, you'll be able to describe the IP addressing scheme, understand how subnetting works, perform binary math to describe subnets, and understand how the Internet works.
4 |
5 | ### Key Concepts
6 |
7 | * Describe the IP addressing scheme.
8 | * Describe how subnetting works.
9 | * Describe subnets by performing basic math in binary.
10 | * Demonstrate how encapsulation works.
11 | * Describe how ARP protocols allow different layers of the network to communicate.
12 | * Describe how the Internet works.
13 | * Understand the basics of routing and routing protocols.
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/practice-quiz-tcp-ip.md:
--------------------------------------------------------------------------------
1 | ## TCP/IP
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following is an example of a network layer (layer 3) protocol?
8 |
9 | * Ethernet
10 | * **IP**
11 | * UDP
12 | * TCP
13 |
14 | > IP, or Internet Protocol, is the most common network layer protocol.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What's the difference between a client and a server?
21 |
22 | * Clients and servers are different names for the same thing.
23 | * A server requests data, and a client responds to that request.
24 | * Clients operate on the data link layer, and servers operate on the network layer.
25 | * **A client requests data, and a server responds to that request.**
26 |
27 |
28 |
29 | ### Question 3
30 |
31 | Which of the following are examples of layers of our five-layer network model? Check all that apply.
32 |
33 | * **The physical layer**
34 | * **The application layer**
35 | * The presentation layer
36 | * **The transport layer**
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/practice-quiz-the-physical-layer.md:
--------------------------------------------------------------------------------
1 | ## The Physical Layer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What is the type of modulation used by twisted pair cable computer networks known as?
8 |
9 | * Line crimping
10 | * Simplex communication
11 | * **Line coding**
12 | * RJ45
13 |
14 | > Line coding is the modulation of an electrical charge so that each side of a connection knows what is a one and what is a zero.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What's the difference between full and half duplex?
21 |
22 | * Full duplex is slower than half duplex.
23 | * **Full duplex allows communications in two directions at the same time; half duplex means that only one side can communicate at a time.**
24 | * Full duplex is a form of simplex communications.
25 | * Half duplex occurs when hubs are in use; full duplex occurs when switches are in use.
26 |
27 | > A half duplex connection allows communication in both directions, but only one side can communicate at a time.
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/graded-assessments/qwiklabs-linux.md:
--------------------------------------------------------------------------------
1 | # Qwiklabs Linux
2 |
3 | ## viewing logs on Linux
4 |
5 | ```bash
6 | ls /var/log
7 | sudo cat /var/log/syslog
8 | ```
9 |
10 | ## finding and deleting files (Week 1 Labs)
11 |
12 | ```bash
13 | sudo du -a /home | sort -n -r | head -n 5
14 | sudo rm /home/lab/storage/ultra_mega_large.txt
15 | ```
16 |
17 | ## remove corrupted file
18 |
19 | ```bash
20 | sudo rm /home/lab/corrupted_file
21 | ```
22 |
23 | ## updating out-of-date software (Week 3 Labs)
24 |
25 | ### update vlc
26 |
27 | ```bash
28 | sudo apt update
29 | sudo apt upgrade
30 | ```
31 |
32 | ## finding and terminating specific processes (Week 5 Labs)
33 |
34 | ### end malicious processes
35 |
36 | ```bash
37 | ps ax | grep "totally_not_malicious"
38 | sudo kill [PID]
39 | ```
40 |
41 | ## modifying file permissions (Week 2 Labs)
42 |
43 | ### change permission of secret file to public (777)
44 |
45 | ```bash
46 | cd /home/lab
47 | sudo chmod 777 super_secret_file.txt
48 | ```
49 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/5_data-recovery-and-backups/practice-quiz-post-mortems.md:
--------------------------------------------------------------------------------
1 | ## Post-Mortems
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What's the intent behind writing a post-mortem?
8 |
9 | * To assign blame for mistakes
10 | * To assign legal liability
11 | * **To learn from mistakes and improve in the future**
12 | * To scare people into avoiding risky behavior
13 |
14 | > A post-mortem is meant to analyze what happened around an incident to identify what went wrong so it can be avoided in the future.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What should the timeline in a post-mortem include? Check all that apply.
21 |
22 | * **Actions taken before, during, and after the event**
23 | * A detailed analysis of the incident, including root cause and scope
24 | * **Detailed dates and times**
25 | * A summary of the incident and how long it lasted
26 |
27 | > The timeline should include actions taken leading up to, during, and after the incident, along with the dates and times when these actions were taken.
--------------------------------------------------------------------------------
/c5_it-security/4_securing-your-networks/readme.md:
--------------------------------------------------------------------------------
1 | ## Securing Your Networks
2 |
3 | In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!
4 |
5 | ### Key Concepts
6 |
7 | * Implement security measures on a network environment.
8 | * Understand the risks of wireless networks and how to mitigate them.
9 | * Understand how to monitor network traffic and read packet captures.
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/practice-quiz-data-link-layer.md:
--------------------------------------------------------------------------------
1 | ## The Data Link Layer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | How many octets are there in a MAC address?
8 |
9 | * 5
10 | * 8
11 | * 4
12 | * **6**
13 |
14 | > A MAC address is a 48-bit number consisting of 6 octets.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What address is used for Ethernet broadcasts?
21 |
22 | * 00:00:00:00:00:00
23 | * 11:11:11:11:11:11
24 | * **FF:FF:FF:FF:FF:FF**
25 | * FF:00:FF:00:FF:00
26 |
27 | > The address FF:FF:FF:FF:FF:FF is used for Ethernet broadcast traffic.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What is a cyclical redundancy check?
34 |
35 | * A technique that allows for multiple logical LANs to operate on the same equipment
36 | * The actual data being transported by an Ethernet frame
37 | * A way for two computers to synchronize their clocks
38 | * **A mathematical calculation used to ensure that all data arrived intact**
39 |
40 | > A cyclical redundancy check ensures that there was no data corruption.
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/practice-quiz-the-data-link-layer.md:
--------------------------------------------------------------------------------
1 | ## The Data Link Layer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | How many octets are there in a MAC address?
8 |
9 | * 5
10 | * 8
11 | * 4
12 | * **6**
13 |
14 | > A MAC address is a 48-bit number consisting of 6 octets.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What address is used for Ethernet broadcasts?
21 |
22 | * 00:00:00:00:00:00
23 | * 11:11:11:11:11:11
24 | * **FF:FF:FF:FF:FF:FF**
25 | * FF:00:FF:00:FF:00
26 |
27 | > The address FF:FF:FF:FF:FF:FF is used for Ethernet broadcast traffic.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What is a cyclical redundancy check?
34 |
35 | * A technique that allows for multiple logical LANs to operate on the same equipment
36 | * The actual data being transported by an Ethernet frame
37 | * A way for two computers to synchronize their clocks
38 | * **A mathematical calculation used to ensure that all data arrived intact**
39 |
40 | > A cyclical redundancy check ensures that there was no data corruption.
--------------------------------------------------------------------------------
/c5_it-security/4_securing-your-networks/graded-assessments/qwiklabs-introducing-tcpdump.sh:
--------------------------------------------------------------------------------
1 | # Using tcpdump
2 | # fill terminal with a constant stream of text as new packets are read.
3 | sudo tcpdump -i eth0
4 | # the -v flag to enable more verbose output
5 | # the -n avoid generating additional traffic from the DNS lookups, and to speed up the analysis
6 | sudo tcpdump -i eth0 -vn
7 | # tcpdump's filter
8 | # we only want packets where the source or destination IP address matches what we specify (in this case 8.8.8.8)
9 | sudo tcpdump -i eth0 -vn host 8.8.8.8 and port 53
10 | # in second terminal
11 | dig @8.8.8.8 A example.com
12 |
13 | # Saving captured packets
14 | # capture on our eth0 interface that filters for only HTTP traffic by specifying port 80.
15 | # the -w flag indicates that we want to write the captured packets to a file named http.pcap.
16 | sudo tcpdump -i eth0 port 80 -w http.pcap
17 | # in second terminal
18 | curl example.com # generate some traffic
19 | # read from this file using tcpdump
20 | tcpdump -r http.pcap -nv
21 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-linux/readme.md:
--------------------------------------------------------------------------------
1 | ## Install, Update and Remove Software for Linux
2 |
3 | This lab will teach you how to perform basic software maintenance on Linux machines. This includes installing software that’s not already present on the machines, updating existing software to the newest version, and uninstalling software that‘s no longer needed. All of these tasks are very common in the IT world, so it’s important that you’re able to do them quickly and effectively.
4 | What you’ll do
5 |
6 | ### There are three learning objectives for this lab:
7 |
8 | * **Install** - You’ll install the Mozilla Firefox web browser. There’s currently no version of Firefox on the machine you’ll be using, so it will be a fresh installation.
9 | * **Update** - The machine you’ll be using comes preinstalled with an old version of the VLC Media Player. You’ll update VLC to the newest version.
10 | * **Uninstall** - You’ll uninstall the GIMP photo-editing tool from the machine, removing it entirely.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/graded-assessment/install-update-and-remove-software-from-windows/readme.md:
--------------------------------------------------------------------------------
1 | ## Install, Update and Remove Software for Windows
2 |
3 | This lab will teach you how to perform basic software maintenance on Windows machines. This includes installing software that’s not already present on the machines, updating existing software to the newest version, and uninstalling software that‘s no longer needed. All of these tasks are very common in the IT world, so it’s important that you’re able to do them quickly and effectively.
4 |
5 | ### What you’ll do
6 |
7 | There are three learning objectives for this lab:
8 |
9 | * **Install** - You’ll install the Mozilla Firefox web browser. There’s currently no version of Firefox on the machine you’ll be using, so it will be a fresh installation.
10 | * **Update** - The machine you’ll be using comes preinstalled with an old version of the VLC Media Player. You’ll update VLC to the newest version.
11 | * **Uninstall** - You’ll uninstall the GIMP photo-editing tool from the machine, removing it entirely.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/6_final-project/readme.md:
--------------------------------------------------------------------------------
1 | ## System Administration Consultation
2 |
3 |
4 |
5 | **Learning Goals**:
6 |
7 | 1. Use the systems administration concepts you learned in the course to provide technical improvements to current processes.
8 | 2. Implement solutions based on an organization’s restrictions, like financial resources, number of users, etc.
9 |
10 | **Overview**: You’ll take what you learned in the System Administration and IT Infrastructure Services course and apply that knowledge to real-world situations.
11 |
12 | **Assignment**: For this writing project, you’ll be presented with three scenarios for different companies. You’ll be doing the systems administration for each company’s IT infrastructure. For each scenario, present improvements to processes based on the company’s needs and current restrictions. There’s no right or wrong answer to your consultation, but your responses should explain the problem, the improvement, and the rationale behind them. Please write a 200-400 word process review for each company presented to you.
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/practice-quiz-vpns-and-proxies.md:
--------------------------------------------------------------------------------
1 | ## VPNs & Proxies
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Two-factor authentication is_________________________.
8 |
9 | * a method where you need two passwords.
10 | * a method that requires two usernames.
11 | * a method where you authenticate twice.
12 | * **a method where you need more than a username and a password.**
13 |
14 | > Two-factor authentication requires a username/password and something extra.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | VPNs are known as a _____ protocol.
21 |
22 | * connectionless
23 | * data link layer
24 | * **tunneling**
25 | * network layer
26 |
27 | > VPNs are tunneling protocols.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | A proxy is something that _______________________.
34 |
35 | * sends data across a single network segment.
36 | * **communicates on behalf of something else.**
37 | * encrypts traffic sent across the Internet.
38 | * allows for many devices to speak to one other device.
39 |
40 | > While proxies are many things, they primarily communicate on behalf of something else.
--------------------------------------------------------------------------------
/c3_os-power-user/README.md:
--------------------------------------------------------------------------------
1 | ## [Operating Systems and You: Becoming a Power User](https://www.coursera.org/learn/os-power-user?specialization=google-it-support)
2 |
3 | In this course -- through a combination of video lectures, demonstrations, and hands-on practice -- you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware.
4 |
5 | By the end of this course you’ll be able to:
6 | * Navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter
7 | * Set up users, groups, and permissions for account access
8 | * Install, configure, and remove software on the Windows and Linux operating systems
9 | * Configure disk partitions and filesystems
10 | * Understand how system processes work and how to manage them
11 | * Work with system logs and remote connection tools
12 | * Utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role
13 |
14 | ### Skills you will gain
15 |
16 | * Powershell
17 | * Linux File Systems
18 | * Linux
19 | * Command-Line Interface
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/practice-quiz-dynamic-host-configuration-protocol.md:
--------------------------------------------------------------------------------
1 | ## Dynamic Host Configuration Protocol
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the four things that all computers need configured in order to operate on a modern network? Check all that apply.
8 |
9 | * An NTP server
10 | * A TCP port
11 | * **A name server**
12 | * **An IP address**
13 | * **A default gateway**
14 | * **A subnet mask**
15 | * A MAC address
16 |
17 |
18 |
19 | ### Question 2
20 |
21 | When using Fixed Allocation DHCP, what's used to determine a computer's IP?
22 |
23 | * A record
24 | * Location
25 | * **A MAC address**
26 | * A subnet mask
27 |
28 | > Fixed Allocation DHCP ensures that computers receive an IP address reserved for it via its MAC address.
29 |
30 |
31 |
32 | ### Question 3
33 |
34 | The process by which a client configured to use DHCP attempts to get network configuration information is known as _________________.
35 |
36 | * **DHCP Discovery**
37 | * DHCP Request
38 | * DHCP Offer
39 | * DHCP Acknowledgement
40 |
41 | > DHCP Discovery is how a client determines configuration information.
42 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/5_data-recovery-and-backups/readme.md:
--------------------------------------------------------------------------------
1 | ## Data Recovery & Backups
2 |
3 | In the fifth week of this course, we'll learn about data recovery and backups. In any tech role, it's important to know how to backup and recover data -- it's even more important for system administration. We will also learn about common corporate practices like designing a disaster recovery plan and writing post-mortem documentation. By the end of this module, you'll know the tradeoffs between on-site and off-site backups, understand the value and importance of backup and recovery testing, know different options for data backup (as well as the risks) and understand the purpose and contents of a disaster recovery plan.
4 |
5 | ### Key Concepts
6 |
7 | * Understand tradeoffs between on-site vs off-site backups
8 | * Understand what characteristics to evaluate when designing a backup system
9 | * Understand the value and importance of backup and recovery testing
10 | * Understand the different options for data backup and the risks that each one protects against
11 | * Understand the purpose and contents of a disaster recovery plan
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2020 Elmo Allistair
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/practice-quiz-network-address-translation.md:
--------------------------------------------------------------------------------
1 | ## Network Address Translation
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | NAT addresses concerns over the dwindling IPv4 address space by ___________________.
8 |
9 | * allowing networks to use fewer IP addresses overall.
10 | * allowing users to move to IPv6 when they want.
11 | * **allowing computers using non-routable address space to communicate with the Internet.**
12 | * performing IP masquerading.
13 |
14 | > NAT allows networks to use non-routable address space for their internal devices.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What technique allows for inbound traffic through a NAT?
21 |
22 | * Port preservation
23 | * **Port forwarding**
24 | * Port authority
25 | * Ephemeral ports
26 |
27 | > Port forwarding is a technique that allows for inbound traffic through a router configured to NAT.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | The total number of IPv4 addresses is approximately:
34 |
35 | * 4.2 million
36 | * **4.2 billion**
37 | * 4.2 trillion
38 | * Uncountable
39 |
40 | > There are approximately 4.2 billion IPv4 addresses.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/practice-quiz-introduction-to-software.md:
--------------------------------------------------------------------------------
1 | ## Introduction to Software
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of these is application software? Check all that apply.
8 |
9 | * RAM
10 | * **Web browser**
11 | * **Email client**
12 | * CPU
13 |
14 | > Your web browser and email clients are considered application software.
15 |
16 | ### Question 2
17 |
18 | Which of these is system software? Check all that apply.
19 |
20 | * **Windows OS**
21 | * **BIOS**
22 | * CPU
23 | * Text editor
24 |
25 | > The Windows OS and the BIOS are considered system software.
26 |
27 | ### Question 3
28 |
29 | What is the difference between an interpreted and a compiled language? Check all that apply
30 |
31 | * **Interpreted languages are not broken into machine instructions beforehand.**
32 | * Interpreted languages are broken into machine instructions beforehand.
33 | * Compiled languages are not translated into machine instructions beforehand.
34 | * **Compiled languages are translated into machine instructions beforehand.**
35 |
36 | > Interpreted languages are not broken into machine instructions beforehand, like compiled languages are.
--------------------------------------------------------------------------------
/c2_computer-networking/1_introduction-to-networking/practice-quiz-networking-devices.md:
--------------------------------------------------------------------------------
1 | ## Networking Devices
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply.
8 |
9 | * **A hub is a physical layer device, and a switch is a data link layer device.**
10 | * **A hub causes larger collision domains.**
11 | * **A switch remembers which devices are connected on each interface, while a hub does not.**
12 | * Hubs are more sophisticated versions of switches.
13 |
14 |
15 |
16 | ### Question 2
17 |
18 | What does LAN stand for?
19 |
20 | * Locally available network
21 | * **Local area network**
22 | * Little area network
23 | * Large area network
24 |
25 | > LAN stands for Local Area Network.
26 |
27 |
28 |
29 | ### Question 3
30 |
31 | What's a router?
32 |
33 | * A network device used specially for fiber cables
34 | * A more advanced version of a switch
35 | * **A device that knows how to forward data between independent networks**
36 | * A physical layer device that prevents crosstalk
37 |
38 | > A router connects independent networks by forwarding data between them.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/graded-assessment/create-a-folder-with-windows/create-a-folder.md:
--------------------------------------------------------------------------------
1 | ## Creating a folder
2 |
3 | Creating a folder in Windows is super simple. Right-click anywhere on the desktop and you should see this menu appear:
4 |
5 | 
6 |
7 | Hover your cursor over "New," and another menu should appear that looks like this:
8 |
9 | 
10 |
11 | Move your cursor to the first option ("Folder"), and select it. If your cursor leaves the menus, they may disappear; if this happens, just repeat the steps again. A new folder should appear on the desktop. It'll be called "New folder" by default, and the text should already be highlighted for you to edit.
12 |
13 | 
14 |
15 |
16 | If you click anywhere before changing the name, you'll need to right-click the folder and select the "Rename" option to be able to edit it. Change the name to "My Super Cool Folder".
17 |
18 | 
19 |
20 | Your folder has been created and named! To verify, double-click on the folder and a Windows Explorer window should pop up, showing you the contents of your currently empty folder.
21 |
22 | 
23 |
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/graded-assessments/qwiklabs-hashing.sh:
--------------------------------------------------------------------------------
1 | # MD 5
2 | # creating a text file
3 | echo 'This is some text in a file, just so we have some data' > file.txt
4 | # generate the MD5 sum for the file and store it
5 | md5sum file.txt > file.txt.md5
6 | cat file.txt.md5
7 | # verify that the hash is correct
8 | # and that the original file hasn't been tampered with since the sum was made
9 | md5sum -c file.txt.md5
10 |
11 | # Verifying an invalid file
12 | # make a copy of file
13 | cp file.txt badfile.txt
14 | # generate new md5sum for the new file
15 | md5sum badfile.txt > badfile.txt.md5
16 | # check the resulting hash
17 | cat badfile.txt.md5
18 | cat file.txt.md5
19 | # edit file and add a space character to the end of the file
20 | nano badfile.txt
21 | # verify
22 | md5sum -c badfile.txt.md5
23 | # generate new hash
24 | md5sum badfile.txt > new.badfile.txt.md5
25 | cat new.badfile.txt.md5
26 |
27 | # SHA1
28 | # create sh1 sum
29 | shasum file.txt > file.txt.sha1
30 | cat file.txt.sha1
31 | # verify
32 | shasum -c file.txt.sha1
33 |
34 | # SHA256
35 | # generate sha256 sum
36 | shasum -a 256 file.txt > file.txt.sha256
37 | cat file.txt.sha256
38 | shasum -c file.txt.sha256
39 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/4_directory-services/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/Role-based_access_control
6 | * https://www.chef.io/chef/
7 | * https://puppet.com/
8 | * https://docs.microsoft.com/en-us/sccm/core/understand/introduction
9 | * https://en.wikipedia.org/wiki/LDAP_Data_Interchange_Format
10 | * https://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx
11 | * https://technet.microsoft.com/en-us/library/cc961936.aspx
12 | * https://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx
13 | * https://technet.microsoft.com/en-us/library/cc780957%28v=ws.10%29.aspx?f=255&MSPPError=-2147217396
14 | * https://technet.microsoft.com/en-us/library/cc962100.aspx
15 | * https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels
16 | * https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-openldap-and-phpldapadmin-on-ubuntu-16-04
17 | * https://www.openldap.org/doc/admin24/slapdconf2.html
18 | * https://en.wikipedia.org/wiki/LDAP_Data_Interchange_Format
19 | * https://www.digitalocean.com/community/tutorials/how-to-use-ldif-files-to-make-changes-to-an-openldap-system
--------------------------------------------------------------------------------
/c3_os-power-user/2_users-and-permissions/graded-assessments/qwiklabs-linux.sh:
--------------------------------------------------------------------------------
1 | # Checking permissions
2 | cd ../qwiklab/documents
3 | ls -l important_document
4 |
5 | # Changing file permissions
6 | sudo chmod 700 important_document
7 | ls -l important_document
8 |
9 | # Changing folder permissions
10 | cd ..
11 | ls -ld secret_folder/
12 | sudo chmod u+x secret_folder/
13 | ls -ld secret_folder/
14 | sudo chmod g+w secret_folder/
15 | sudo chmod g-r secret_folder/
16 | ls -ld secret_folder/
17 | sudo chmod o-r secret_folder/
18 | ls -ld secret_folder/
19 | sudo chmod 720 secret_folder/
20 |
21 | # Changing owners
22 | ls -ld taco/
23 | sudo chown cook /home/qwiklab/taco
24 | ls -ld taco/
25 |
26 | # More practices
27 | cd documents/
28 | ls -l not_so_important_document
29 | sudo chmod u+x not_so_important_document
30 | ls -l not_so_important_document
31 | sudo chmod g+w not_so_important_document
32 | ls -l not_so_important_document
33 | sudo chmod a+r not_so_important_document
34 | ls -l not_so_important_document
35 | sudo chmod 764 not_so_important_document
36 |
37 | # Adding multiple permissions at once
38 | ls -l public_document
39 | sudo chmod a+rwx public_document
40 | ls -l public_document
41 | sudo chmod 777 public_document
42 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/2_network-and-infrastructure-services/practice-quiz-intro-it-infra-services.md:
--------------------------------------------------------------------------------
1 | ## Intro to IT Infrastructure Services
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following is considered a physical infrastructure service? Check all that apply.
8 |
9 | * **Laptop**
10 | * **Desktop**
11 | * **Rack server**
12 | * Operating systems
13 |
14 | > Physical infrastructure services are comprised of the physical hardware that an organization uses in their IT environment.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Which of these is considered a network service? Check all that apply.
21 |
22 | * **Wireless Internet**
23 | * **DNS**
24 | * Blade server
25 | * Ethernet cables
26 |
27 | > Network services are comprised of networking components that an organization uses in their IT environment, like network protocols, network hardware, etc.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Which of these is considered a software service? Check all that apply.
34 |
35 | * **Chat applications**
36 | * **Word processors**
37 | * **Email applications**
38 | * Wireless Internet
39 |
40 | > Software services are comprised of the software that an organization uses in its IT environment.
--------------------------------------------------------------------------------
/c3_os-power-user/4_filesystems/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://support.microsoft.com/en-us/help/154997/description-of-the-fat32-file-system
6 | * https://support.microsoft.com/en-us/help/140365/default-cluster-size-for-ntfs--fat--and-exfat
7 | * https://technet.microsoft.com/en-us/library/cc766465(v=ws.10).aspx
8 | * https://en.wikipedia.org/wiki/Fstab
9 | * https://en.wikipedia.org/wiki/Paging#Windows_NT
10 | * https://support.microsoft.com/en-us/help/2860880/how-to-determine-the-appropriate-page-file-size-for-64-bit-versions-of
11 | * https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Installation_Guide/s2-diskpartrecommend-ppc.html#id4394007
12 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa365006(v=vs.85).aspx
13 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa363878(v=vs.85).aspx
14 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa365006(v=vs.85).aspx
15 | * https://docs.microsoft.com/en-us/sysinternals/downloads/du
16 | * https://support.microsoft.com/en-us/help/181701/how-to-start-disk-cleanup-by-using-the-command-line
17 | * https://www.howtogeek.com/115229/htg-explains-why-linux-doesnt-need-defragmenting/
18 | * https://en.wikipedia.org/wiki/Fsck
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/practice-quiz-device-software-management.md:
--------------------------------------------------------------------------------
1 | ## Device Software Management
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following is the piece of information that Windows will use to search for the right driver for a new piece of hardware connected to a Windows computer?
8 |
9 | * PnP code
10 | * **Hardware ID**
11 | * Drive Identification Number, or DiD
12 |
13 | > The Hardware ID will be used by the operating system to search for the appropriate driver for the newly connected hardware device.
14 |
15 |
16 |
17 | ### Question 2
18 |
19 | In Linux, in the /dev directory, devices that start with sd can be associated with what type of device? Check all that apply.
20 |
21 | * Speakers
22 | * **Hard drives**
23 | * **USB drives**
24 | * **Memory sticks**
25 |
26 | > The /dev/sd* devices are associated with mass storage devices.
27 |
28 |
29 |
30 | ### Question 3
31 |
32 | Which of the following correctly describes a "Security Patch?"
33 |
34 | * **A piece of software that's meant to fix up a security hole.**
35 | * A piece of fabric that's meant to patch a broken cable.
36 | * An entirely new, more secure, version of an operating system.
37 |
38 | > That's the purpose of a security patch!
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/README.md:
--------------------------------------------------------------------------------
1 | ## [Technical Support Fundamentals](https://www.coursera.org/learn/technical-support-fundamentals?specialization=google-it-support)
2 |
3 | This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist. In this course, you’ll be introduced to the world of Information Technology, or IT. You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, troubleshooting, and customer service. This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this certificate program.
4 |
5 | By the end of this course, you’ll be able to:
6 | * understand how the binary system works
7 | * assemble a computer from scratch
8 | * choose and install an operating system on a computer
9 | * understand what the Internet is, how it works, and the impact it has in the modern world
10 | * learn how applications are created and how they work under the hood of a computer
11 | * utilize common problem-solving methodologies and soft skills in an Information Technology setting
12 |
13 | ### Skills you will gain
14 |
15 | * Binary Code
16 | * Customer Support
17 | * Linux
18 | * Troubleshooting
19 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/6_troubleshooting/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * [Resume Example 1_Google IT Support.pdf](https://d3c33hcgiwev3.cloudfront.net/Wq_49IADQrKv-PSAAyKySg_5b6029aa3cd94c36b6be61f775f78477_Resume-Example-1_Google-IT-Support.pdf?Expires=1597881600&Signature=MgGpdrgcdAjZrjEDoVh5Ef-ENskHiKF3JvrAjsZmn2WtrMOQ01lONtRd3bdOZtcpiM-t1iDRD6E94VpIz2WIUufw5Uv7txNUMBL1-2Jefw~-nvKFpX3JDweBFH9RWStBovp-7Sk7x9STX0GUkQwJiQYaagQfyypbWqICpcpwH0w_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)
6 | * [Resume Example 2_Google IT Support.pdf](https://d3c33hcgiwev3.cloudfront.net/QkoWidoNQ2aKFonaDcNmyA_834dd92a40464a87a5c52c14a0944334_Resume-Example-2_Google-IT-Support.pdf?Expires=1597881600&Signature=S6~8IC0UcKh3xUR2ISp5jgFFI0~hmICTcboTraS6FFBBzzqD-0nTakgafyrxudLJHIYoVhZ7PmrELTVL-ps7Msqa-38rSlzWQiMFYFfkXczIa5PT7vWM7v6tORBOePmPxMBy~LuriS73SzZU3hZRiG3V1bOY0WgNO2A4~bG~iXg_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)
7 | * [Resume Example 3_Google IT Support.pdf](https://d3c33hcgiwev3.cloudfront.net/i1TzQIl3SuaU80CJd9rmqQ_6a076e336e39414ab9f8720ab0c78d49_Resume-Example-3_Google-IT-Support-1-.pdf?Expires=1597881600&Signature=H1Fvo3nx8NGzui33mur2iK7wXiUgD8moRv6o7FzWRhvnAEzEDnJm1JqvJanD27msJo0AHCw0zjZAZqfrrqpDSsa0WfRIyVTp0F-xmGlANCAHC2~LnXZdALadmnkzS5FpX7qoyp3sZ6BjxD7WP71T7TPA6obo3EctGn~2wVhrW34_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)
--------------------------------------------------------------------------------
/c5_it-security/3_aaa_security/practice-quiz-authorization-and-accounting.md:
--------------------------------------------------------------------------------
1 | ## Authorization and Accounting
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What role does authorization play?
8 |
9 | * **It determines whether or not an entity has access to a resource.**
10 | * It verifies an entity's identity.
11 | * It verifies passwords.
12 | * It provides strong encryption.
13 |
14 | > Authorization has to do with what resource a user or account is permitted or not permitted to access.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What does OAuth provide?
21 |
22 | * Confidentiality
23 | * Integrity
24 | * **Access delegation**
25 | * Secure communications
26 |
27 | > OAuth is an open authorization protocol that allows account access to be delegated to third parties, without disclosing account credentials directly.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | How is auditing related to accounting?
34 |
35 | * They're not related.
36 | * They're the same thing.
37 | * Accounting is reviewing records, while auditing is recording access and usage.
38 | * **Accounting is recording access and usage, while auditing is reviewing these records.**
39 |
40 | > Accounting involves recording resource and network access and usage. Auditing is reviewing these usage records by looking for any anomalies.
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/graded-assessments/quiz-ipv6-compression.md:
--------------------------------------------------------------------------------
1 | ## IPv6 Compression
2 |
3 | | IP Address | Compressed |
4 | |-----------------------------------------|----------------------------------------|
5 | | 00c8:b434:06ee:ec2f:03c9:01ce:765d:a66b | c8:b434:6ee:ec2f:3c9:1ce:765d:a66b |
6 | | 8bfa:99f0:d4c5:0b8c:0f6f:04df:2804:283d | 8bfa:99f0:d4c5:b8c:f6f:4df:2804:283d |
7 | | 5d66:5ec9:0046:0000:2576:004f:7159:0639 | 5d66:5ec9:46:0:2576:4f:7159:639 |
8 | | 558c:0000:0000:d367:7c8e:1216:0000:66be | 558c::d367:7c8e:1216:0:66be |
9 | | 7d2b:00a9:a0c4:0000:a772:00fd:a523:0358 | 7d2b:a9:a0c4:0:a772:fd:a523:358 |
10 | | 00eb:0000:0000:0000:d8c1:0946:0272:879 | eb::d8c1:946:272:879 |
11 | | 0e56:11c2:0e75:8d23:3528:7e0d:419b:bdce | e56:11c2:e75:8d23:3528:7e0d:419b:bdce |
12 | | ad93:a0e4:a9ce:32fc:cba8:15fe:ed90:d768 | ad93:a0e4:a9ce:32fc:cba8:15fe:ed90:d768 |
13 | | 2b06:0000:0000:1f2b:d77f:0000:0000:89ce | 2b06::1f2b:d77f:0:0:89ce |
14 | | 9930:cafa:0000:0052:04cc:7b7a:0037:27e6 | 9930:cafa:0:52:4cc:7b7a:37:27e6 |
15 |
16 | **Resources:**
17 | * https://www.omnisecu.com/tcpip/ipv6/how-to-simplify-ipv6-addresses.php
18 | * https://findipv6.com/ipv6-compress/
19 |
--------------------------------------------------------------------------------
/c3_os-power-user/2_users-and-permissions/graded-assessments/qwiklabs-windows.txt:
--------------------------------------------------------------------------------
1 | # Example 1
2 | ICACLS C:\Users\Qwiklab\Documents\important_document
3 | ICACLS C:\Users\Qwiklab\Documents\important_document /remove "Kara"
4 | ICACLS C:\Users\Qwiklab\Documents\important_document /remove "Kara"
5 | ICACLS C:\Users\Qwiklab\Documents\important_document /remove "Kara"
6 | ICACLS C:\Users\Qwiklab\Documents\important_document
7 |
8 | # Example 2
9 | ICACLS C:\Users\Qwiklab\Documents\important_document
10 | ICACLS C:\Users\Qwiklab\Secret\ /grant "Phoebe:(r)"
11 | ICACLS C:\Users\Qwiklab\Secret\
12 | ICACLS C:\Users\Qwiklab\Secret\ /grant "Kara:(w)"
13 | ICACLS C:\Users\Qwiklab\Secret\
14 |
15 | # Example 3
16 | ICACLS C:\Users\Qwiklab\Music\
17 | ICACLS C:\Users\Qwiklab\Music\ /remove "Everyone"
18 | ICACLS C:\Users\Qwiklab\Music\ /grant "Everyone:(r)"
19 | ICACLS C:\Users\Qwiklab\Music\
20 |
21 | # Example 4
22 | ICACLS C:\Users\Qwiklab\Documents\not_so_important_document
23 | ICACLS C:\Users\Qwiklab\Documents\not_so_important_document /grant "Authenticated Users:(w)"
24 | ICACLS C:\Users\Qwiklab\Documents\not_so_important_document
25 |
26 | # Example 5
27 | ICACLS C:\Users\Qwiklab\Documents\public_document
28 | ICACLS C:\Users\Qwiklab\Documents\public_document /grant "Everyone:(r)"
29 | ICACLS C:\Users\Qwiklab\Documents\public_document
30 |
--------------------------------------------------------------------------------
/c5_it-security/4_securing-your-networks/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/4-1/user/guide/CSMUserGuide_wrapper/fwaccess.html
6 | * https://www.juniper.net/documentation/en_US/junos/topics/usage-guidelines/services-configuring-stateful-firewall-rules.html
7 | * https://www.digitalocean.com/community/tutorials/iptables-essentials-common-firewall-rules-and-commands
8 | * https://www.digitalocean.com/community/tutorials/ufw-essentials-common-firewall-rules-and-commands
9 | * https://en.wikipedia.org/wiki/IEEE_802.1X
10 | * http://www.haproxy.org/#docs
11 | * http://cbonte.github.io/haproxy-dconv/1.8/intro.html#3.3.1
12 | * http://nginx.org/en/docs/
13 | * http://nginx.org/en/docs/beginners_guide.html#proxy
14 | * http://httpd.apache.org/docs/
15 | * https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html
16 | * https://doi.org/10.1007/3-540-45537-X_1
17 | * https://www.kb.cert.org/vuls/id/723755
18 | * https://it.awroblew.biz/linux-how-to-checkenable-promiscuous-mode/
19 | * https://danielmiessler.com/blog/entering-promiscuous-mode-os-x/
20 | * http://lifeofageekadmin.com/how-to-manually-change-your-nic-to-promiscuous-mode-on-windows-72008-r2/
21 | * https://www.snort.org/
22 | * https://suricata-ids.org/
23 | * https://www.zeek.org/
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/CPU_cache
6 | * https://www.digitaltrends.com/computing/how-to-overclock-your-cpu/3/
7 | * https://support.microsoft.com/en-us/help/15056/windows-7-32-64-bit-faq
8 | * https://en.wikipedia.org/wiki/64-bit_computing#32-bit_vs_64-bit%E2%80%A6
9 | * https://en.wikipedia.org/wiki/Kilobyte
10 | * https://en.wikipedia.org/wiki/Inductive_charging
11 | * https://docs.microsoft.com/windows-hardware/design/device-experiences/powercfg-command-line-options#option_batteryreport
12 | * https://support.apple.com/HT201585
13 | * https://www.osha.gov/dts/shib/shib011819.html
14 | * https://www.apple.com/batteries/maximizing-performance/
15 | * https://support.google.com/android/answer/7664358
16 | * https://en.wikipedia.org/wiki/USB
17 | * https://en.wikipedia.org/wiki/VGA_connector
18 | * https://en.wikipedia.org/wiki/Digital_Visual_Interface#Connector
19 | * https://en.wikipedia.org/wiki/HDMI#Connectors
20 | * https://en.wikipedia.org/wiki/DisplayPort#Full-size_DisplayPort_connector
21 | * https://support.microsoft.com/help/27911/windows-10-connect-to-a-projector-or-pc
22 | * https://support.apple.com/guide/mac-help/mchl5fdd37ce/mac
23 | * https://help.ubuntu.com/stable/ubuntu-help/display-dual-monitors.html
24 | * https://en.wikipedia.org/wiki/Keystone_effect
--------------------------------------------------------------------------------
/c2_computer-networking/3_the-transport-and-application-layer/practice-quiz-the-transport-layer.md:
--------------------------------------------------------------------------------
1 | ## The Transport Layer
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What ordering of TCP flags makes up the Three-way Handshake?
8 |
9 | * FIN, FIN/ACK, ACK
10 | * **SYN, SYN/ACK, ACK**
11 | * SYN, ACK, SYN, ACK
12 | * SYN, ACK, FIN
13 |
14 | > The computer that wants to establish a connection sends a packet with the SYN flag set. Then, the server responds with a packet with both the SYN and ACK flags set. Finally, the original computer sends a packet with just the ACK flag set.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field?
21 |
22 | * 4 bits
23 | * 8 bits
24 | * **16 bits**
25 | * 32 bits
26 |
27 | > A TCP or UDP port is a 16-bit number, meaning there are theoretically 65,535 possible values it can have.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Please select all valid TCP control flags.
34 |
35 | * WAIT
36 | * LISTEN
37 | * CLOSE
38 | * **ACK**
39 | * **RST**
40 | * **URG**
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | A device that blocks traffic that meets certain criteria is know as a ________.
47 |
48 | * **Firewall**
49 | * Router
50 | * Switch
51 | * Hub
52 |
53 | > A firewall is used to block certain defined types of traffic.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/4_directory-services/practice-quiz-intro-to-directory-services.md:
--------------------------------------------------------------------------------
1 | ## Introduction to Directory Services
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What does a directory server provide?
8 |
9 | * A real-time communication service
10 | * A network time service
11 | * **A lookup service for an organization**
12 | * A replication service
13 |
14 | > A directory service allows members of an organization to lookup information about the organization, like network resources and their addresses.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What benefits does replication provide? Check all that apply.
21 |
22 | * **Redundancy**
23 | * Enhanced security
24 | * Increased capacity
25 | * **Decreased latency**
26 |
27 | > Directory server replication grants you redundancy by having multiple copies of the database being served by multiple servers. The added servers that provide lookup services also reduce the latency for clients querying the service.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What's the most popular directory services protocol used today?
34 |
35 | * Directory Access Protocol
36 | * Directory System Protocol
37 | * **Lightweight Directory Access Protocol**
38 | * Directory Operational Binding Management Protocol
39 |
40 | > LDAP is the most popular and widely used directory access protocol today.
--------------------------------------------------------------------------------
/c5_it-security/README.md:
--------------------------------------------------------------------------------
1 | ## [IT Security: Defense against the digital dark arts](https://www.coursera.org/learn/it-security/)
2 |
3 | This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
4 |
5 | At the end of this course, you’ll understand:
6 |
7 | * How various encryption algorithms and techniques work as well as their benefits and limitations.
8 | * Various authentication systems and types.
9 | * The difference between authentication and authorization.
10 | * How to evaluate potential risks and recommend ways to reduce risk.
11 | * Best practices for securing a network.
12 | * How to help others to grasp security concepts and protect themselves.
13 |
14 | ### Skills you will gain
15 |
16 | * Cybersecurity
17 | * Wireless Security
18 | * Cryptography
19 | * Network Security
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/qwiklabs-managing-cloud-resources.sh:
--------------------------------------------------------------------------------
1 | # crate an instances
2 | gcloud compute instances create linux-instance --zone=us-central1-f --machine-type=n1-standard-1 --subnet=default --tags=http-server --image=ubuntu-1604-xenial-v20190628 --image-project=ubuntu-os-cloud --boot-disk-size=10GB
3 | gcloud compute firewall-rules create default-allow-http --direction=INGRESS --priority=1000 --network=default --action=ALLOW --rules=tcp:80 --source-ranges=0.0.0.0/0 --target-tags=http-server
4 | # create windows instances
5 | gcloud compute instances create windows-instance --zone=us-central1-f --machine-type=n1-standard-1 --subnet=default --image=windows-server-2016-dc-v20190709 --image-project=windows-cloud --boot-disk-size=50GB
6 | gcloud compute instances list # list all instances
7 | # using your newly created instances
8 | gcloud compute ssh linux-instance --zone us-central1-f # connect to linux-instance
9 | # in linux instance
10 | sudo apt update # update packages
11 | sudo apt install nginx # install nginx
12 | # creating an additional disk
13 | gcloud compute disks create additional-disk --type=pd-standard --size=500GB --zone=us-central1-f
14 | # attaching a disk to an instance
15 | gcloud compute instances attach-disk windows-instance --disk additional-disk
16 | # create new user to access windows-instance
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/practice-quiz-basic-commands.md:
--------------------------------------------------------------------------------
1 | ## Basic Commands
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Using a Linux machine, you have the following directory tree:
8 |
9 | ```
10 | /
11 | |-- home
12 | | |-- cindy
13 | | |-- Pictures
14 | | |--Alaska
15 | | |--Canada
16 | | |-- Movies
17 | |-- var
18 | ```
19 |
20 | If your current path is /home/cindy/Pictures/Canada, and you want to change to the Alaska directory, which of the following commands can you use? Check all that apply.
21 |
22 | * **cd ~/Pictures/Alaska**
23 | * **cd ../Alaska**
24 | * cd /Pictures/Alaska
25 | * **cd /home/cindy/Pictures/Alaska**
26 |
27 |
28 |
29 | ### Question 2
30 |
31 | In Bash, which of the following commands can you use to view a long list of all files in the /home directory? Check all that apply.
32 |
33 | * list -a /home
34 | * **ls -la /home**
35 | * **ls -l -a /home**
36 | * ls -la ~
37 |
38 |
39 |
40 | ### Question 3
41 |
42 | In Bash, which of the following commands can you use to remove a directory named: "Miscellaneous Directory?"
43 |
44 | * rm Miscellaneous Directory
45 | * rm -r Miscellaneous Directory
46 | * rm Miscellaneous\ Directory
47 | * **rm -r Miscellaneous\ Directory**
48 |
49 | > To remove a directory you have recursively remove the files with -r. Don't forget that folders with spaces in the name have to be escaped with an \.
--------------------------------------------------------------------------------
/c3_os-power-user/6_operating-system-in-practice/practice-quiz-logging.md:
--------------------------------------------------------------------------------
1 | ## Logging
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?
8 |
9 | * System
10 | * Application and Services
11 | * **Security**
12 |
13 | > The Security log would be a good place to start when troubleshooting login issues.
14 |
15 |
16 |
17 | ### Question 2
18 |
19 | In what log files can you find information about bootup errors? Check all that apply.
20 |
21 | * **/var/log/syslog**
22 | * /var/log/auth.log
23 | * **/var/log/kern.log**
24 | * /var/log/mail.log
25 |
26 | > You can find log information about bootup issues in kern.log as well as the syslog.
27 |
28 |
29 |
30 | ### Question 3
31 |
32 | In what log files can you find information about authentication errors?
33 |
34 | * /var/log/syslog
35 | * **/var/log/auth.log**
36 | * /var/log/kern.log
37 | * /var/log/mail.log
38 |
39 | > The auth.log file contains authentication log messages.
40 |
41 |
42 |
43 | ### Question 4
44 |
45 | For an ssh connection to work, which of the following need to be true? Check all that apply.
46 |
47 | * **SSH is installed on client.**
48 | * **The SSH server is running on the host you want to connect to.**
49 | * VPN needs to be set up.
50 | * **You need to specify a hostname to SSH into.**
51 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/qwiklabs-managing-web-with-apache2.sh:
--------------------------------------------------------------------------------
1 | ls -l /opt/devel/ourcompany # look at the content of developed website directory
2 |
3 | # installing apache2
4 | sudo apt update
5 | sudo apt install apache2
6 |
7 | # configuring sites
8 | ls -l /etc/apache2/sites-available # list of sites that are available
9 | cat /etc/apache2/sites-available/000-default.conf # look at the contents of the 000-default.conf
10 | sudo mv /opt/devel/ourcompany /var/www/ourcompany # move files into /var/www/ourcompany
11 | ls -l /var/www # look at the contents of /var/www
12 | cd /etc/apache2/sites-available # change directory
13 | sudo cp 000-default.conf 001-ourcompany.conf # make a copy of the default site
14 | sudo nano 001-ourcompany.conf # edit the new file
15 | ls -l /etc/apache2/sites-available # check enabled sites
16 | sudo a2ensite 001-ourcompany.conf # enable the new site
17 | sudo a2dissite 000-default.conf # disable the default site
18 |
19 | # additional configuration
20 | cat /var/www/ourcompany/index.html # look at the contents of the index.html
21 | ls /etc/apache2/mods-available # look at the list of available modules
22 | sudo a2enmod include # enable include module
23 | sudo service apache2 restart # restart apache2
24 | sudo nano /etc/apache2/sites-available/001-ourcompany.conf # add the necessary lines
25 | sudo service apache2 reload # reload configuration
26 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/2_network-and-infrastructure-services/practice-quiz-physical-infrastructure-services.md:
--------------------------------------------------------------------------------
1 | ## Physical Infrastructure Services
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | If you're running a server, which one of the follow operating systems would be best suited for your server?
8 | * Windows 10
9 | * **Ubuntu Server**
10 | * MacOS
11 | * Ubuntu
12 |
13 | > When running a server, it's best to use a server operating system that's been specifically optimized for server performance.
14 |
15 |
16 |
17 | ### Question 2
18 |
19 | What are the benefits of virtualizing servers? Check all that apply.
20 |
21 | * **Better hardware resource utilization**
22 | * **Easier maintenance**
23 | * **Lower costs**
24 | * Better performance than a dedicated server
25 |
26 | > Virtualizing servers offer lots of benefits, like enabling hardware to be better utilized, easier to maintain, and generally lower in cost.
27 |
28 |
29 |
30 | ### Question 3
31 |
32 | Which of the following do you need in order to SSH to a machine? Check all that apply.
33 |
34 | * **An SSH client on the machine you want to connect from**
35 | * A VPN connection
36 | * An SSH server on the machine you want to connect to
37 | * A virtual server to connect to
38 |
39 | > To make an SSH connection from one machine to another, you need to have an SSH client on the machine you want to connect from, along with an SSH server on the machine you want to connect to.
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/practice-quiz-digging-into-dns.md:
--------------------------------------------------------------------------------
1 | ## Digging into DNS
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | One of Level 3's public DNS servers is ____________.
8 |
9 | * **4.2.2.3**
10 | * 8.8.8.8
11 | * 127.0.0.1
12 | * 192.168.1.1
13 |
14 | > Level 3's public DNS servers are 4.2.2.1 through 4.2.2.6
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | A DNS resolver tool available on all major desktop operating systems is __________.
21 |
22 | * host
23 | * tracert
24 | * ping
25 | * **nslookup**
26 |
27 | > nslookup is available by default on Windows, macOS, and Linux.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | The organization responsible for DNS at a global level is ________.
34 |
35 | * Google
36 | * RFC
37 | * **ICANN**
38 | * IANA
39 |
40 | > ICANN is responsible for DNS at a global level.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | Which of the following commands displays the current network configuration information?
47 |
48 | * Net user
49 | * Pathping
50 | * **Ipconfig**
51 | * Winver
52 |
53 | > ipconfig displays the network configuration information.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | An organization responsible for assigning individual domain names to other organizations or individuals is known as a(n) ______.
60 |
61 | * Internet authority
62 | * **DNS registrar**
63 | * Government
64 | * Autonomous system
65 |
66 | > You can use a registrar to register a domain name!
67 |
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/practice-quiz-cryptography-applications.md:
--------------------------------------------------------------------------------
1 | ## Cryptography Applications
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What information does a digital certificate contain? Check all that apply.
8 |
9 | * **Public key data**
10 | * **Identifying information of the certificate owner**
11 | * **Digital signature**
12 | * Private key data
13 |
14 | > A digital certificate contains the public key information, along with a digital signature from a CA. It also includes information about the certificate, like the entity that the certificate was issued to.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Which type of encryption does SSL/TLS use?
21 |
22 | * Asymmetric encryption
23 | * Symmetric encryption
24 | * Neither
25 | * **Both**
26 |
27 | > SSL/TLS use asymmetric algorithms to securely exchange information used to derive a symmetric encryption key.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What are some of the functions that a Trusted Platform Module can perform? Check all that apply.
34 |
35 | * **Remote attestation**
36 | * Malware detection
37 | * Secure user authentication
38 | * **Data binding and sealing**
39 |
40 | > A TPM can be used for remote attestation, ensuring that a host is a known good state and hasn't been modified or tampered (from a hardware and a software perspective). TPMs can also seal and bind data to them, encrypting data against the TPM. This also allows it to be decrypted by the TPM, only if the machine is in a good and trusted state.
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/practice-quiz-ipv6.md:
--------------------------------------------------------------------------------
1 | ## IPv6
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | An IPv6 address is how many bits long?
8 |
9 | * 16
10 | * 32
11 | * 64
12 | * **128**
13 |
14 | > An IPv6 address is 128 bits long
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | The very first field in an IPv6 header is the _______.
21 |
22 | * data payload field
23 | * **version field**
24 | * source address field
25 | * traffic class field
26 |
27 | > This field is used to indicate what version of IP is being used.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | The IPv6 header field that indicates how many routers can forward a packet before it's discarded is called the ________.
34 |
35 | * next header field
36 | * router forward field
37 | * **hop limit field**
38 | * TTL
39 |
40 | > The hop limit field configures how many routers can try to forward a packet before it's discarded.
41 |
42 |
43 |
44 | ### Questions 4
45 |
46 | The IPv4 mapped address space within IPv6 always starts with _______ zeroes.
47 |
48 | * 32
49 | * 64
50 | * 128
51 | * **80**
52 |
53 | > 80 zeroes, followed by 16 ones, followed by the IPv4 address itself.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | For IPv6 traffic to travel on an IPv4 network, which two technologies are used? Select all that apply.
60 |
61 | * **Datagrams**
62 | * IPv4 Tunnels
63 | * Packets
64 | * **IPv6 Tunnels**
65 |
66 | > An IPv6 tunnel is used to encapsulate data between IPv6 tunnel servers.
67 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/practice-quiz-installing-an-operating-system.md:
--------------------------------------------------------------------------------
1 | ## Installing an Operating System
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.
8 |
9 | * TRUE
10 | * **FALSE**
11 |
12 | > To have better compatibility with your OS and CPU, you should be using the same CPU and OS architecture.
13 |
14 |
15 |
16 | ### Question 2
17 |
18 | If you want to boot into a USB drive, how do you change your boot settings?
19 |
20 | * **Go into the BIOS settings and change the boot settings**
21 | * Login to the machine.
22 | * Wipe the computer.
23 | * Replace the CPU.
24 |
25 | > To change any boot settings, you'll need to modify your BIOS settings before the computer loads up the operating system.
26 |
27 |
28 |
29 | ### Question 3
30 |
31 | What is the file manager in macOS called?
32 |
33 | * **Finder**
34 | * File Explorer
35 | * Konqueror
36 | * Midnight Commander
37 |
38 | > The file manager in MacOS is called Finder.
39 |
40 |
41 |
42 | ### Question 4
43 |
44 | What command can you use to create a file using bash?
45 |
46 | * cat
47 | * ls
48 | * **touch**
49 | * mkfile
50 |
51 | You got it! You can use the touch command to create a file using bash.
52 |
53 |
54 |
55 | ### Question 5
56 |
57 | A ____ is an emulation of a physical machine.
58 |
59 | * BIOS
60 | * **virtual machine**
61 | * driver
62 | * kernel
63 |
64 | > A virtual machine is used to emulate a physical machine.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/practice-quiz-components.md:
--------------------------------------------------------------------------------
1 | ## Components
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply.
8 |
9 | **Smaller form factor**
10 | * Uses Disk Platters
11 | * **Non-moving parts**
12 | * High RPMs
13 |
14 | > SSDs have non-moving parts, are a smaller form factor, and also utilize non-volatile memory.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged.
21 |
22 | * **TRUE**
23 | * FALSE
24 |
25 | > While plugging a 220v appliance into a 120v outlet won't cause immediate harm to your appliance, it could still cause appliance deterioration.
26 |
27 |
28 |
29 | ### Question 3
30 |
31 | How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?
32 |
33 | * ~17 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
34 | * ~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
35 | * **~ 17 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive**
36 | 8 ~ 20 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
37 | Correct
38 |
39 | > Theoretically, USB 2.0 has a bandwidth of 480 Mb/s, which is roughly 60 MB/s. It would take around 17 seconds to transfer 1024 MB of data.
40 |
41 |
42 |
43 | ### Question 4
44 |
45 | Which of these is used to charge devices? Check all that apply.
46 |
47 | * **USB A.**
48 | * HDMI Port.
49 | * DisplayPort.
50 | * **USB C.**
51 |
52 | > These are types of USB ports.
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/graded-assessments/quiz-accessing-qwiklabs.md:
--------------------------------------------------------------------------------
1 | ## Accessing Qwiklabs
2 |
3 | **Latest Submission Grade: 100%**
4 |
5 |
6 |
7 | ### Question 1
8 |
9 | How long do you have to complete each Qwiklab?
10 |
11 | * 20 minutes
12 | * **1 hour**
13 | * 24 hours
14 | * As long as you need.
15 |
16 | > You’ll have one hour to complete every lab in this program.
17 |
18 |
19 |
20 | ### Question 2
21 |
22 | True or false: It can take some time for the labs to load once you click “start lab.”
23 |
24 | * **True**
25 | * False
26 |
27 | > The labs can take some time to load. You can use this time to review the lab instructions.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | True or false: It can take some time for the working instance of Linux and Windows OS to load.
34 |
35 | * **True**
36 | * False
37 |
38 | > We’re loading a working instance of the OS for you. Each time you open the OS, we’ll need to download some key software for you, which can take some time.
39 |
40 |
41 |
42 | ### Question 4
43 |
44 | What do you need to do to finish a lab and have your grade posted to Coursera?
45 |
46 | * Close all lab windows
47 | * Refresh the Coursera course page
48 | * **Click the red “End Lab” button**
49 |
50 | > Once you click the red “End Lab” button, your grade will post to Coursera.
51 |
52 |
53 |
54 | ### Question 5
55 |
56 | True or false: You are able to access your work once you click the “End Lab” button.
57 |
58 | * True
59 | * **False**
60 |
61 | > Once you click “End Lab,” you won’t be able to access your work.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/practice-quiz-file-print-and-platform-service.md:
--------------------------------------------------------------------------------
1 | ## File, Print, and Platform Services
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the benefits of setting up an NFS server? Check all that apply.
8 |
9 | * Connecting to printers
10 | * **Storing files on a network drive**
11 | * **Enabling files to be shared over a network**
12 | * Serving web content
13 |
14 | > A network file storage, or NFS, server is used to store files on a network, and allow them to be shared with others.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What methods could you use to set up printing in an organization? Check all that apply.
21 |
22 | * **Directly connecting a printer**
23 | * **Setting up a print server**
24 | * **Using a cloud service to set up printers**
25 | * Setting up an NFS server
26 |
27 | > From small to large organizations, you have lots of ways to set up a printer.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | When you have a web server, what service is used to enable HTTP requests to be processed?
34 |
35 | * **An HTTP server**
36 | * The web server
37 | * HTTP status codes
38 | * A database server
39 |
40 | > HTTP servers, like Apache web server, are used to process HTTP requests.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | You can use a(n) ______________to store large amounts of customer data for a website.
47 |
48 | * NFS server
49 | * HTTP server
50 | * **database server**
51 | * DNS server
52 |
53 | > Databases, like MySQL and PostgresSQL, are widely used to store data.
--------------------------------------------------------------------------------
/c2_computer-networking/5_connecting-to-the-internet/graded-assessments/quiz-wireless-channels.md:
--------------------------------------------------------------------------------
1 | ## Wireless Channels
2 |
3 | **Latest Submission Grade: 100%**
4 |
5 | ### Question 1
6 |
7 | Let’s see how much you learned about wireless channels and how to select the optimal setup!
8 |
9 | Here’s the scenario: You’re an IT Support Specialist that has setup three wireless channels for a company. As time goes on, neighboring companies have their own wireless networks coming into operation. This causes network interference between your networks and their network.
10 |
11 | **Step 1**: You’ll see three wireless channels with access points that you control. These are represented by the orange bubbles on the screen. You can drag these around on the screen using the grey rectangle at the top of the bubble.
12 |
13 | **Step 2**: After a few seconds, a new wireless network will appear, which is represented by a different colored bubble. This represents the competing wireless networks.
14 |
15 | **Step 3**: Minimize network interference by moving your wireless channels so there’s as little overlap as possible for all wireless channels.
16 |
17 | **Step 4**: Once you’ve best positioned the wireless channels, click “Submit.”
18 |
19 | **Step 5**: If you successfully minimized network interference, click the “Next” button and you’ll respond to a new scenario based on your previous answer. You have 5 scenarios to complete for this activity. If your answer is wrong, click “Reset” and try again.
20 |
21 |
22 |
23 | 
24 | 
25 | 
26 | 
27 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/quiz.md:
--------------------------------------------------------------------------------
1 | ### From Abacus to Analytical Engine
2 |
3 | What cards had holes in them that were historically used to store data?
4 |
5 | * Floppy disks
6 | * Hard drive platters
7 | * **Punch cards**
8 | * Magnetic tape
9 |
10 | > Punch cards were the first binary system used for machines.
11 |
12 | A(n) ____ is a series of steps that solve specific problems.
13 |
14 | * recipe
15 | * automated system
16 | * combination
17 | * **algorithm**
18 |
19 | > Algorithms are a series of steps that solve specific problems.
20 |
21 |
22 |
23 | ### The Path to Modern Computers
24 |
25 | What are the three main desktop operating systems used today? Check all that apply.
26 |
27 | * **Windows**
28 | * **MacOS**
29 | * **Linux**
30 | * Chrome OS
31 |
32 | > The main desktop operating systems in use today are Windows, Macintosh, and Linux.
33 |
34 | What is software called when it can be freely distributed, modified, and shared?
35 |
36 | * **Open-source**
37 | * Closed-source
38 | * Commercial
39 | * Proprietary
40 |
41 | > Commercial software is paid for, while open-source software can be freely distributed, modified, and shared.
42 |
43 |
44 |
45 | ### Computer Language
46 |
47 | What does the following binary code translate to? Tip: Use an ASCII "character to binary" chart to help you find an answer.
48 |
49 | 01101000 01100101 01101100 01101100 01101111
50 |
51 | > Answer: hello
52 |
53 |
54 |
55 | ### Binary
56 |
57 | In punch card systems, a hole represents the number ____.
58 |
59 | * **1**
60 | * 0
61 |
62 | > We use the number 1 to represent a hole in a punch card.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://zapier.com/blog/best-team-chat-app/
6 | * https://www.digitalocean.com/community/tutorials/why-you-may-not-want-to-run-your-own-mail-server
7 | * https://blog.servermania.com/what-protocols-send-receive-email-with-the-mail-server/
8 | * https://technet.microsoft.com/en-us/library/hh831795(v=ws.11).aspx
9 | * http://www.linuxfromscratch.org/blfs/view/cvs/basicnet/nfs-utils.html
10 | * https://en.wikipedia.org/wiki/Inkjet_printing
11 | * https://computer.howstuffworks.com/inkjet-printer.htm
12 | * https://support.microsoft.com/help/4028622/windows-10-how-to-set-a-default-printer
13 | * https://support.apple.com/guide/mac-help/change-default-printer-a-printers-mac-mchlp1036/mac
14 | * https://help.ubuntu.com/stable/ubuntu-help/printing-setup-default-printer.html
15 | * https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831468(v=ws.11)
16 | * https://help.ubuntu.com/lts/serverguide/cups.html
17 | * https://stackshare.io/stackups/apache-httpd-vs-microsoft-iis-vs-nginx
18 | * https://www.bls.gov/ooh/computer-and-information-technology/database-administrators.htm
19 | * https://www.digitalocean.com/community/tutorials/sqlite-vs-mysql-vs-postgresql-a-comparison-of-relational-database-management-systems
20 | * https://developer.chrome.com/devtools
21 | * https://en.wikipedia.org/wiki/List_of_HTTP_status_codes
22 | * https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/
23 | * https://aws.amazon.com/getting-started/
24 | * https://cloud.google.com/docs/overview/
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/practice-quiz-verifying-connectivity.md:
--------------------------------------------------------------------------------
1 | ## Verifying Connectivity
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | The protocol used to communicate network errors is known as __________.
8 |
9 | * Traceroute
10 | * UDP
11 | * **ICMP**
12 | * TCP
13 |
14 | > ICMP is used to communicate errors back to the client.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | The ping utility sends what message type?
21 |
22 | * Destination Network Unknown
23 | * Destination Network Unreachable
24 | * **Echo Request**
25 | * Echo Reply
26 |
27 | > By default, the ping utility sends an Echo Request ICMP message type.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | On Windows, one of the tools you can use to verify connectivity to a specific port is ________.
34 |
35 | * nc (netcat)
36 | * **Test-NetConnection**
37 | * tracert
38 | * ping
39 |
40 | > Test-NetConnection lets you test many things, including connectivity to a specific port on a remote host.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | Traceroute uses UDP packets on which of the following operating systems? Select all that apply.
47 |
48 | * Windows 10
49 | * **Mac OS**
50 | * **Linux**
51 | * Windows 7
52 |
53 | > On Linux and macOS, traceroute sends UDP packets to very high port numbers.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | During a traceroute, which action does a router perform to the value in the Time To Live (TTL) field?
60 |
61 | * **Substraction**
62 | * Multiplication
63 | * Division
64 | * Addition
65 |
66 | > The TTL field is decremented (subtracted) by one by every router that forwards the packet.
67 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/qwiklabs-001-ourcompany.conf:
--------------------------------------------------------------------------------
1 |
2 | # The ServerName directive sets the request scheme, hostname and port that
3 | # the server uses to identify itself. This is used when creating
4 | # redirection URLs. In the context of virtual hosts, the ServerName
5 | # specifies what hostname must appear in the request's Host: header to
6 | # match this virtual host. For the default virtual host (this file) this
7 | # value is not decisive as it is used as a last resort host regardless.
8 | # However, you must set it for any further virtual host explicitly.
9 | #ServerName www.example.com
10 |
11 | ServerAdmin webmaster@localhost
12 | DocumentRoot /var/www/ourcompany
13 |
14 |
15 | Options +Includes
16 | XBitHack on
17 |
18 |
19 | # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
20 | # error, crit, alert, emerg.
21 | # It is also possible to configure the loglevel for particular
22 | # modules, e.g.
23 | #LogLevel info ssl:warn
24 |
25 | ErrorLog ${APACHE_LOG_DIR}/error.log
26 | CustomLog ${APACHE_LOG_DIR}/access.log combined
27 |
28 | # For most configuration files from conf-available/, which are
29 | # enabled or disabled at a global level, it is possible to
30 | # include a line for only one particular virtual host. For example the
31 | # following line enables the CGI configuration for this host only
32 | # after it has been globally disabled with "a2disconf".
33 | #Include conf-available/serve-cgi-bin.conf
34 |
35 |
36 | # vim: syntax=apache ts=4 sw=4 sts=4 sr noet
--------------------------------------------------------------------------------
/c2_computer-networking/3_the-transport-and-application-layer/graded-assessments/quiz-five-layer-network-model.md:
--------------------------------------------------------------------------------
1 | ## The Five-Layer Network Model
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | **Overview**: As an IT Support Specialist, it’s important that you fully grasp how networks work. You may need to troubleshoot different aspects of a network, so it’s important that you know how everything fits together. This assignment will help you demonstrate this knowledge by describing how networks function.
8 |
9 | **What You’ll Do**: In your own words, describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.
10 |
11 |
12 |
13 | > **Five-Layer Network Model**
14 | >
15 | > **Physical layer** sends and receives signals on the physical wire or antenna to transmit the bits found in frames then the **data link layer** is used to determine if the frame received by the host contains the host’s MAC address. If it does, the data is forwarded up to the Network layer. When receiving data, **network layer** is used to determine if the packet received by the host contains the host’s IP address. If it does, the data is forwarded up to the Transport layer. **The Transport layer** establishes the connection between applications running on different hosts. It uses TCP for reliable connections and UDP for fast connections. It keeps track of the processes running in the applications above it by assigning port numbers to them and uses the Network layer to access the TCP/IP network, and the **Application layer** is where applications requiring network communications live.
--------------------------------------------------------------------------------
/c2_computer-networking/2_the-network-layer/graded-assessments/quiz-routing-paths-and-subnets.md:
--------------------------------------------------------------------------------
1 | ## Routing Paths and Subnets
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Let’s see how much you’ve learned about routing paths and subnetting! In this activity, you are given a bunch of source and destination IP address pairs. Your task is to route each of these packets from the correct source network to the correct destination network.
8 |
9 | **Step 1**: You will be presented 8 source and destination IP address pairs in the table below.
10 |
11 | **Step 2**: You will mimic how the packets travel from the source IP address to the destination IP address within the network. Click the network source (the corresponding orange bubble) and click all the networks it needs to use in order to reach the destination network. You will need to click each network in the right order.
12 |
13 | **Step 3**: After you’ve selected the source and destination networks, click the “Check” button. Some of these address pairs may not be represented by the networks available. If that’s the case, click the “Source or destination not present” button. If you make a mistake, click the “Reset” button to try again.
14 |
15 | **Step 4**: Once you have correctly answered a question, move on to the next question by clicking on the next question arrow. There are 8 different questions.
16 |
17 | **Step 5**: After you’ve completed all routing paths listed in the table, close the quiz and click the “Submit Quiz” button for a grade.
18 |
19 |
20 |
21 | 
22 | 
23 | 
24 | 
25 | 
26 | 
27 | 
28 | 
29 |
--------------------------------------------------------------------------------
/c5_it-security/4_securing-your-networks/practice-quiz-wireless-security.md:
--------------------------------------------------------------------------------
1 | ## Wireless Security
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are some of the weaknesses of the WEP scheme? Check all that apply.
8 |
9 | * **Its small IV pool size**
10 | * Its use of ASCII characters for passphrases
11 | * **Its use of the RC4 stream cipher**
12 | * **Its poor key generation methods**
13 |
14 | > The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What symmetric encryption algorithm does
21 | WPA2 use?
22 |
23 | * DES
24 | * DSA
25 | * RSA
26 | * **AES**
27 |
28 | > WPA2 uses CCMP. This utilizes AES in counter mode, which turns a block cipher into a stream cipher.
29 |
30 |
31 |
32 | ### Question 3
33 |
34 | How can you reduce the likelihood of WPS brute-force attacks? Check all that apply.
35 |
36 | * **Implement lockout periods for incorrect attempts.**
37 | * Update firewall rules.
38 | * Use a very long and complex passphrase.
39 | * **Disable WPS.**
40 |
41 |
42 |
43 | ### Question 4
44 |
45 | Select the most secure WiFi security configuration from below:
46 |
47 | * **WPA2 enterprise**
48 | * WEP 128 bit
49 | * WPA personal
50 | * WPA enterprise
51 | * WPA2 personal
52 | * None
53 |
54 | > WPA2 Enterprise would offer the highest level of security for a WiFi network. It offers the best encryption options for protecting data from eavesdropping third parties, and does not suffer from the manageability or authentication issues that WPA2 Personal has with a shared key mechanism. WPA2 Enterprise used with TLS certificates for authentication is one of the best solutions available.
--------------------------------------------------------------------------------
/c5_it-security/1_understanding-security-threads/practice-quiz-other-attacks.md:
--------------------------------------------------------------------------------
1 | ## Other Attacks
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | How can you protect against client-side injection attacks? Check all that apply.
8 |
9 | * **Use data sanitization**
10 | * Use a SQL database
11 | * Utilize strong passwords
12 | * **Use input validation**
13 |
14 | > By checking user-provided input and only allowing certain characters to be valid input, you can avoid injection attacks. You can also use data sanitization, which involves checking user-supplied input that's supposed to contain special characters to ensure they don't result in an injection attack.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | True or false: A brute-force attack is more efficient than a dictionary attack.
21 |
22 | * TRUE
23 | * **FALSE**
24 |
25 | > A brute-force attack tries out every possible valid combination of characters to guess the password, while a dictionary attack only tries passwords contained in a dictionary file. This means the dictionary attack is more efficient, since it doesn't generate the passwords and has a smaller number of guesses to attempt.
26 |
27 |
28 |
29 | ### Question 3
30 |
31 | Which of the following scenarios are social engineering attacks? Check all that apply.
32 |
33 | * An attacker performs a DNS Cache poisoning attack.
34 | * **Someone uses a fake ID to gain access to a restricted area.**
35 | * An attacker performs a man-in-the-middle attack.
36 | * **You receive an email with an attachment containing a virus.**
37 |
38 | > A malicious spam email is a form of social engineering; the email is designed to trick you into opening a malicious payload contained in the attachment. Using a fake ID to gain entry to somewhere you're not permitted is impersonation, a classic social engineering technique.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/practice-quiz-binary.md:
--------------------------------------------------------------------------------
1 | ## Binary
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of these is a valid byte? Check all that apply.
8 |
9 | * **11011011**
10 | * **00000000**
11 | * 11100
12 | * 10022011
13 |
14 | > A byte is composed of eight bits of zeros and ones.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | How many possible values can we have with 8 bits?
21 |
22 | * 127
23 | * 8
24 | * **256**
25 | * 1 byte
26 |
27 | > Bits use the binary system, which is also known as the base-2 numeral system. So 2^8 allows us 256 values from 0 to 255.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Why did UTF-8 replace the ASCII character-encoding standard?
34 |
35 | * UTF-8 only uses 128 values.
36 | * ASCII can represent emoji.
37 | * **UTF-8 can store a character in more than one byte.**
38 | * ASCII can store a character in more than one byte.
39 |
40 | > UTF-8 replaced the ASCII character-encoding standard because it can store a character in more than a single byte. This allowed us to represent a lot more character types, like emoji.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | What is the highest decimal value we can represent with a byte?
47 |
48 | * **255**
49 | * 256
50 | * 2
51 | * Any number
52 |
53 | > There are 256 values in a byte, from the decimal number 0 to 255.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | The binary value of the ASCII letter "c" is 0110 0011. Using the handy chart that we learned in the lesson, convert this number to its decimal value. You'll need to use some math for this question.
60 |
61 | * **99**
62 | * 123
63 | * 45
64 | * 100
65 |
66 | > The decimal value 99 is same as the binary value 0110 0011. So the numbers that are turned ON are 64, 32, 2, and 1 and added up together. In other words, 64 + 32 + 2 + 1 = 99.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/README.md:
--------------------------------------------------------------------------------
1 | ## [System Administration and IT Infrastructure Services](https://www.coursera.org/learn/system-administration-it-infrastructure-services?specialization=google-it-supports)
2 |
3 | This course will transition you from working on a single computer to an entire fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. We’ll deep dive on cloud so that you’ll understand everything from typical cloud infrastructure setups to how to manage cloud resources. You'll also learn how to manage and configure servers and how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.
4 |
5 | By the end of this course you’ll be able to:
6 | * Utilize best practices for choosing hardware, vendors, and services for your organization
7 | * Understand how the most common infrastructure services that keep an organization
8 | running work, and how to manage infrastructure servers
9 | * Understand how to make the most of the cloud for your organization
10 | * Manage an organization’s computers and users using the directory services, Active
11 | Directory, and OpenLDAP
12 | * Choose and manage the tools that your organization will use
13 | * Backup your organization’s data and know how to recover your IT infrastructure in the case of
14 | a disaster
15 | * Utilize systems administration knowledge to plan and improve processes for IT environments
16 |
17 | ### Skills you will gain
18 |
19 | * Directory Service
20 | * Lightweight Directory Access Protocol (LDAP)
21 | * Backup
22 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/2_hardware/practice-quiz-starting-it-up.md:
--------------------------------------------------------------------------------
1 | ## Starting It Up
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What is the difference between a ROM chip and a RAM chip? Check all that apply.
8 |
9 | * A ROM chip stores temporary data. A RAM chip stores permanent data.
10 | * **A ROM chip stores permanent data. A RAM chip stores temporary data.**
11 | * **A ROM chip is non-volatile and will keep its data in the case of a power failure**
12 | * A RAM chip is volatile and will wipe its data in the case of a power failure.
13 |
14 | > A ROM chip stores permanent data and will keep its data if there is a power failure. A RAM chip stores temporary data and will wipe its data in a power failure.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Which of these functions does the BIOS perform? Check all that apply.
21 |
22 | * **Checks what devices are connected to the computer**
23 | * **POST**
24 | * Installs drivers
25 | * **Initializes hardware**
26 |
27 | > The BIOS performs a POST to check what devices are connected to the computer. It also initializes hardware on boot.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Where are your BIOS settings stored?
34 |
35 | * **CMOS chip**
36 | * RAM
37 | * Hard drive
38 | * Flash drive
39 |
40 | > Your BIOS settings are stored in the CMOS chip.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | What is the difference between a traditional BIOS and UEFI? Check all that apply.
47 |
48 | * **UEFI is meant to become the new standard for BIOS.**
49 | * A traditional BIOS has better compatibility with newer hardware.
50 | * **UEFI has become the default BIOS on new systems.**
51 | * **UEFI has better compatiblity with newer hardware.**
52 |
53 | > UEFI is the new standard for BIOS. It has become the default BIOS on new systems and it has better compatibility with newer hardware.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/3_software-and-platform-services/practice-quiz-software-services.md:
--------------------------------------------------------------------------------
1 | ## Software Services
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are some communication services you can utilize in your organization? Check all that apply.
8 |
9 | * **Email**
10 | * **Chat applications**
11 | * DNS
12 | * **Phones**
13 |
14 | > Communication services, like chat applications, emails, and phone calls, allow you to communicate with others in an organization.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What's the difference between POP3 and IMAP? Check all that apply.
21 |
22 | * **POP3 can only download email to one local device.**
23 | * IMAP can only download email to one local device.
24 | * POP3 is used for sending emails.
25 | * **IMAP can download emails onto multiple devices.**
26 |
27 | > POP3 allows you to only download email to one device, which you may want to use if you want added privacy with your emails. IMAP allows you to download email onto multiple devices, which is the email protocol that's widely used today.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | True or false: Commercial-use and personal-use software licenses are essentially the same thing.
34 |
35 | * True
36 | * **False**
37 |
38 | > Most software distributors have separate agreements for businesses. Before purchasing or installing any software, you should check the license agreement for the software.
39 |
40 |
41 |
42 | ### Question 4
43 |
44 | What are the differences between TLS and SSL? Check all that apply.
45 |
46 | * **TLS is the successor to SSL.**
47 | * **TLS is more secure than SSL.**
48 | * SSL is more secure than TLS.
49 | * SSL is the successor to TLS.
50 |
51 | > While TLS and SSL are used interchangeably, they do have differences. For example, the latest versions of TLS are more secure than SSL.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/4_networking/highlights.md:
--------------------------------------------------------------------------------
1 | ## Course Highlights
2 |
3 |
4 |
5 | ### What is Networking?
6 |
7 | * **Internet**: The physical connection of computers and wires around the world.
8 | * **Web**: The information on the Internet.
9 | * Computer on a network have an identifier called an **IP address**.
10 | * Devices that can connect to a network have
11 | another unique identifier called a **MAC address**.
12 | MAC addresses are generally permanent and hard-coded onto a device
13 | * When you send or receive data through a network you need to have both an **IP** and **MAC** address.
14 | * **Router**: Connects lots of different devices together and helps route network traffic.
15 | * **Network stack**: A set of hardware or software that provides the infrastructure for a computer.
16 | * There are rules that make sure our packets are routed efficiently:
17 | * Routed efficiently.
18 | * Aren't corrupted.
19 | * Secure.
20 | * Right machine.
21 | * Named appropriately.
22 | * **IP**: Responsible for delivering our packets to the right computers.
23 | * **TCP**: Protocol that handles reliable delivery of information from one network to another.
24 | * **Uniform Resource Locator (URL)**: Web address similar to a home address.
25 |
26 | ### Limitations of the Internet
27 |
28 | * **IPv4**: Address that consists of 32 bits separated into four groups, something like 172.14.24.1
29 | * **IPv6**: Address that consist of a 128 bits, four times the amount that IPv4 uses, something like 379f:3e7d:4860:0370:7334:0000
30 | * **Network Address Translation (NAT)**: Lets organizations use one public IP address and many private IP addresses within the network.
31 |
32 | ### Impact of the Internet
33 |
34 | * **Globalization**: The movement that lets governments, businesses, and organizations communicate and integrate together on an international scale.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/6_troubleshooting/graded-assignment/quiz-writing-effective-documentation.md:
--------------------------------------------------------------------------------
1 | ## Writing Effective Documentation
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | **Overview**: Documentation is an important part of an IT Support Specialist role. It’s vital to document processes and policies not only for yourself but for your teammates that may encounter the same issue. This writing assessment will help you get in the habit of writing good documentation.
8 |
9 | **What You'll Do**: For this writing project, you will write documentation to explain the process of making a peanut butter and jelly sandwich to someone who has never seen one before. You’ll want to be detailed yet concise. Specifically, the documentation should have:
10 |
11 | 1) A description of the problem.
12 | 2) A description of the end result.
13 | 3) The solution detailed in a step-by-step manner.
14 |
15 |
16 |
17 | ```
18 | Making a peanut butter and jelly sandwich.
19 |
20 | Problem Description:
21 | Explain the process of making a peanut butter and jelly sandwich to someone who has never seen one before.
22 |
23 | Solutions:
24 | User want me to explain how to make a peanut butter and jelly sandwich. so i write to him following instructions:
25 |
26 | Step 1: Gather Your Ingredients for the Sandwich.
27 | Step 2: Put Gloves on (optional).
28 | Step 3: Pull Out Two Slices of Bread.
29 | Step 4: Open Peanut Butter and Jelly.
30 | Step 5: Spread the Peanut Butter Onto One Slice of Bread.
31 | Step 6: Spread the Jelly Onto the Other Slice of Bread.
32 | Step 7: Combine the Two Slices.
33 | Step 8: Cut Off the Crusts (optional).
34 | Step 10: Clean Up Your Workspace.
35 | Step 11: Enjoy Your Sandwich.
36 | ```
37 |
38 | Reference: https://www.instructables.com/id/How-to-Make-a-Peanut-Butter-and-Jelly-Sandwich-4/
39 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/1_introduction-to-it/highlights.md:
--------------------------------------------------------------------------------
1 | ## Course Highlights
2 |
3 |
4 |
5 | ### Introduction to IT Support
6 |
7 | * **Information Technology (IT)**: The use of digital technology, like computers and the Internet, to store and process data into useful information.
8 | * There are thousands of **companies** around the world searching for **IT professionals** like **you**!.
9 |
10 |
11 |
12 | ### History of Computing
13 |
14 | * **Computer**: A device that stores and processes data by performing calculations.
15 | * **Algorithm**: A series of steps that solve specific problems.
16 | * **Cryptography**: The art of writing and solving codes.
17 | * **Open source**: Anyone could modify and share it.
18 |
19 |
20 |
21 | ### Digital Logic
22 |
23 | * **Binary system**: The communication that a computer uses, also known as a base-2 numeral system.
24 | * We group binary into 8 number or **bits**. Technically, a **bit** is a binary digit.
25 | * A group of 8 bits is referred to as a **byte**.
26 | * Each byten can store one character, and we can have 256 possible values thanks to the base-2 system (28).
27 | * **Character encoding**: Assigns our binary values to characters, so that we as humans can read them.
28 | * The first character in the ASCII to binary table -- a lowercase 'a' -- maps to 01100001 in binary.
29 | * **Logic gates**: Allow our transistors to do more complex tasks, like decide where to send electrical signals depending on logical conditions.
30 |
31 |
32 |
33 | ### Computer Architecture Layer
34 |
35 | * **Abstraction**: To take a relatively complex system and simplify it for our use.
36 | * **Hardware layer**: Made up of the physical components of a computer.
37 | * **Operating system**: Allows hardware to communicate with the system.
38 | * **Software layer**: How we as humans interact with our computer.
39 | * **User**: Interacts with the computer.
--------------------------------------------------------------------------------
/c2_computer-networking/6_troubleshooting-the-future-of-internet/practice-quiz-the-cloud.md:
--------------------------------------------------------------------------------
1 | ## The Cloud
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | A piece of software that runs and manages virtual machines is known as a __________.
8 |
9 | * cloud storage device
10 | * **hypervisor**
11 | * cloud computing device
12 | * virtual instance
13 |
14 | > A hypervisor manages many virtual instances running on a single host.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Office 365 Outlook is an example of _______.
21 |
22 | * IaaS
23 | * PaaS
24 | * FttH
25 | * **SaaS**
26 |
27 | > Office 365 Outlook is an example of Software as a Service (SaaS).
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | A hybrid cloud is ________________.
34 |
35 | * a combination of virtual hosts and virtual guests
36 | * **a combination of a public cloud and a private cloud**
37 | * a combination of a public cloud and hardware virtualization
38 | * a combination of a private cloud and a mesh network
39 |
40 | > A hybrid cloud runs some services on a cloud provider and some services in-house.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | Which of the following are additional cloud services? Select all that apply.
47 |
48 | * **Blockchain as a Service (BAAS)**
49 | * Python as a Service
50 | * **VPN as a Service (VPNaaS)**
51 | * **Data as a Service**
52 |
53 | > BaaS uses encrypted, connected blocks of information for higher security than standard cloud services. VPNaaS secures networks through a cloud-based connection between the employee and the organization’s network. DaaS provides data access as a service to a business.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | Which cloud service provides access to things like virtual machines, containers, networks, and storage?
60 |
61 | * FaaS
62 | * **IaaS**
63 | * Saas
64 | * Paas
65 |
66 | > Infrastructure as a Service (IaaS) provides access to things like virtual machines, containers, networks, and storage.
67 |
--------------------------------------------------------------------------------
/c3_os-power-user/5_process-management/practice-quiz-process-utilization.md:
--------------------------------------------------------------------------------
1 | ## Process Utilization
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of the following PowerShell commands will tell you which process on your system is using the most CPU resources?
8 |
9 | * **Get-Process | Sort CPU -descending | Select -first 1 -Property ID,ProcessName,CPU**
10 | * Get-Process | Sort RAM -descending | Select -first 1 -Property ID,ProcessName,CPU
11 | * cpu_usage.exe | top -1
12 |
13 | > That command will do the trick. It will filter the output of the Get-Process commandlet to determine the top user of the CPU resource, and give its Process ID, name, and the amount of CPU used.
14 |
15 |
16 |
17 | ### Question 2
18 |
19 | If you have a slow computer, what are some possible culprits that could be causing this?
20 |
21 | * **High CPU usage**
22 | * **Lots of I/O activity**
23 | * **High RAM usage**
24 | * **Too many processes running**
25 |
26 | > A slow computer could be a sign of lots of things, but it's always smart to first check the utilization of your resources.
27 |
28 |
29 |
30 | ### Question 3
31 |
32 | In a Linux machine, what command can you use to safely terminate a process with a PID of 342?
33 |
34 | * **kill 342**
35 | * kill -KILL 342
36 | * kill -TSTP 342
37 | * kill -CONT 342
38 |
39 | > To terminate a process safely, send the SIGTERM signal.
40 |
41 |
42 |
43 | ### Question 4
44 |
45 | In a Linux machine, what command can you use to absolutely kill a process with a PID of 342?
46 |
47 | * kill 342
48 | * **kill -KILL 342**
49 | * kill -TSTP 342
50 | * kill -CONT 342
51 |
52 | > To kill a process, you'd use the SIGKILL signal.
53 |
54 |
55 |
56 | ### Question 5
57 |
58 | In a Linux machine, what command can you use to suspend a process with a PID of 342?
59 |
60 | * kill 342
61 | * kill -KILL 342
62 | * **kill -TSTP 342**
63 | * kill -CONT 342
64 |
65 | > To stop or suspend a running process, you'd send the SIGTSTP signal.
--------------------------------------------------------------------------------
/c3_os-power-user/1_navigating-the-system/practice-quiz-file-and-text-manipulation.md:
--------------------------------------------------------------------------------
1 | ## File and Text Manipulation
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | In Bash, which of the following commands can you use to view the contents of a document. Check all that apply.
8 |
9 | * open
10 | * **cat**
11 | * **less**
12 | * dog
13 |
14 | > You can use the cat and less command to view the contents of a file.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | In a Linux machine, you have the following files:
21 |
22 | * *apple.txt*
23 | * *banana.jpg*
24 | * *chocolate.txt*
25 | * *orange.txt*
26 |
27 | What command can you use to search for the word "fruit" in the text files in the above directory? Check all that apply.
28 |
29 | * **grep fruit apple.txt chocolate.txt orange.txt**
30 | * **grep fruit \*.txt**
31 | * find fruit apple.txt chocolate.txt
32 | * find fruit apple.txt chocolate.txt orange.txt
33 |
34 | > You can use the grep command to search files for certain words. You can also use the * wildcard command to filter by a specific pattern.
35 |
36 |
37 |
38 | ### Question 3
39 |
40 | In a Linux machine, you have a file named "types_of_fish.txt" and you want to append the word "trout" to the file contents. Which of the following commands can you use?
41 |
42 | * echo trout < types_of_fish.txt
43 | * echo trout > types_of_fish.txt
44 | * **echo trout >> types_of_fish.txt**
45 | * echo trout 2> types_of_fish.txt
46 |
47 | > The >> is used as an append redirector.
48 |
49 |
50 |
51 | ### Question 4
52 |
53 | In a Linux machine, you want to list through a directory called /home/ben/Documents and search for the word "important" in the filenames in that directory. Which of the following commands can you use?
54 |
55 | * **ls /home/ben/Documents | grep important**
56 | * ls /home/ben/Documents >> grep important
57 | * ls /home/ben/Documents < grep important
58 | * ls /home/ben/Documents > grep important
59 |
60 | > You can use the | command to pipe the output of one command into another.
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/practice-quiz-symmetric-encryption.md:
--------------------------------------------------------------------------------
1 | ## Symmetric Encryption
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the components that make up a cryptosystem? Check all that apply.
8 |
9 | * **Decryption algorithms**
10 | * **Encryption algorithms**
11 | * Transmission algorithms
12 | * **Key generation algorithms**
13 |
14 | > A cryptosystem is a collection of algorithms needed to operate an encryption service. This involves generating encryption keys, as well as encryption and decryption operations.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What is steganography?
21 |
22 | * The study of languages
23 | * The practice of encoding messages
24 | * The study of stegosauruses
25 | * **The practice of hiding messages**
26 |
27 | > Steganography involves hiding messages, but not encoding them.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What makes an encryption algorithm symmetric?
34 |
35 | * High speed
36 | * Different keys used for encryption and decryption
37 | * **The same keys used for encryption and decryption**
38 | * Very large key sizes
39 |
40 | > The symmetry of a symmetric algorithm refers to one key being used for both encryption and decryption.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | What's the difference between a stream cipher and a block cipher?
47 |
48 | * Block ciphers are only used for block device encryption.
49 | * Stream ciphers can't save encrypted data to disk.
50 | * **Stream ciphers encrypt data as a continuous stream, while block ciphers operate on chunks of data.**
51 | * There is no difference.
52 |
53 | > A stream cipher takes data in as a continuous stream, and outputs the ciphertext as a continuous stream, too. A block cipher encrypts the data in chunks, or blocks.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | True or false: The smaller the encryption key is, the more secure the encrypted data is.
60 |
61 | * TRUE
62 | * **FALSE**
63 |
64 | > The reverse is true. The larger the key, the more secure the encrypted data will be.
--------------------------------------------------------------------------------
/c3_os-power-user/3_package-and-software-managemenet/resources.md:
--------------------------------------------------------------------------------
1 | ## Resources
2 |
3 |
4 |
5 | * https://en.wikipedia.org/wiki/Portable_Executable
6 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa369294(v=vs.85).aspx
7 | * https://en.wikipedia.org/wiki/Windows_Store
8 | * https://msdn.microsoft.com/en-us/library/windows/desktop/hh446767(v=vs.85).aspx
9 | * https://support.microsoft.com/en-us/help/912203/description-of-the-command-line-switches-that-are-supported-by-a-softw
10 | * https://developer.apple.com/business/custom-apps/
11 | * https://developers.google.com/android/work/play/custom-app-api/get-started
12 | * https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.archive/compress-archive?view=powershell-5.0
13 | * http://www.linfo.org/tar.html
14 | * https://en.wikipedia.org/wiki/Dynamic-link_library
15 | * https://en.wikipedia.org/wiki/DLL_Hell
16 | * https://msdn.microsoft.com/en-us/library/aa376307.aspx
17 | * http://www.powershellgallery.com/
18 | * https://help.ubuntu.com/lts/serverguide/dpkg.html
19 | * https://en.wikipedia.org/wiki/NuGet
20 | * https://chocolatey.org/packages
21 | * https://help.launchpad.net/Packaging/PPA
22 | * https://docs.microsoft.com/en-us/sysinternals/downloads/procmon
23 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa372837(v=vs.85).aspx
24 | * https://msdn.microsoft.com/en-us/library/windows/desktop/aa370557(v=vs.85).aspx
25 | * https://docs.microsoft.com/en-us/windows-hardware/drivers/kernel/introduction-to-plug-and-play
26 | * https://docs.microsoft.com/en-us/windows-hardware/drivers/install/step-1--the-new-device-is-identified
27 | * https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hardware-ids
28 | * https://docs.microsoft.com/en-us/windows-hardware/drivers/install/step-2--a-driver-for-the-device-is-selected
29 | * https://en.wikipedia.org/wiki/Device_file
30 | * https://en.wikipedia.org/wiki/Udev
31 | * https://en.wikipedia.org/wiki/Windows_Update
32 | * https://en.wikipedia.org/wiki/Linux_kernel
33 | * https://www.linux.com/learn/linux-101-updating-your-system
--------------------------------------------------------------------------------
/c2_computer-networking/4_network-services/graded-assessments/quiz-networking-services-simulation.md:
--------------------------------------------------------------------------------
1 | ## Networking Services Simulation
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Let’s test your knowledge of networking services! You’re an IT Support Specialist at a new company. As your company grows, your manager asks you to solve various networking problems. Your task is to select the correct network device or server to solve the manager’s request.
8 |
9 | Step 1: Read the manager’s request in the top-left corner of the screen. Her request will be highlighted in green.
10 |
11 | Step 2: Drag and drop the correct network device or server icon (e.g. DHCP) into the "drop here" area of the screen. If you make a mistake, click the “Reset” or "try again" button and try again.
12 |
13 | Step 3: After you have completed all requests, close the quiz window and click the “Submit Quiz” button.
14 |
15 |
16 |
17 | | Manager's request | Network device or server |
18 | |-------------------------------------------------------------------------------------------------|:------------------------:|
19 | | "We need to be connected to the Internet!" | Router |
20 | | "I’m worried people are going to break into our network." | Firewall |
21 | | "We need to reduce internal collision domains!" | Switch |
22 | | "Configuring the network setting for every desktop is becoming a real problem!" | DHCP |
23 | | "We’re running out of IP addresses. We’ll need to have a way to use non-routable address space!" | NAT |
24 | | "Our traveling sales people need to access internal resources on the road!" | VPN |
25 | | "People can’t remember so many IP addresses!" | DNS |
--------------------------------------------------------------------------------
/c5_it-security/1_understanding-security-threads/practice-quiz-network-attacks.md:
--------------------------------------------------------------------------------
1 | ## Network Attacks
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the dangers of a man-in-the-middle attack? Check all that apply.
8 |
9 | * **An attacker can block or redirect traffic.**
10 | * An attacker can destroy data at rest.
11 | * **An attacker can eavesdrop on unencrypted traffic.**
12 | * **An attacker can modify traffic in transit.**
13 |
14 | > A man-in-the-middle attack means that the attacker has access to your network traffic. This allows them to eavesdrop, modify traffic in transit, or block traffic entirely. Yikes!
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Why is a DNS cache poisoning attack dangerous? Check all that apply.
21 |
22 | * **It allows an attacker to redirect targets to malicious webservers.**
23 | * Errrr...it's not actually dangerous.
24 | * **It affects any clients querying the poisoned DNS server.**
25 | * It allows an attacker to remotely control your computer.
26 |
27 | > By inserting fake DNS records into a DNS server's cache, every client that queries this record will be served the fake information. This allows an attacker to redirect clients to a web server of their choosing.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Which of the following is true of a DDoS attack?
34 |
35 | * This type of attack causes a significant loss of data.
36 | * An attacker sends attack traffic directly to the target.
37 | * **Attack traffic comes from lots of different hosts.**
38 | * Attack traffic is encrypted.
39 |
40 | > The "Distributed" in DDoS means that the attack traffic is distributed across a large number of hosts, resulting in the attack coming from many different machines.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | Which of the following result from a denial-of-service attack? Check all that apply.
47 |
48 | * Malware infection
49 | * Data destruction
50 | * **Slow network performance**
51 | * **Service unreachable**
52 |
53 | > A denial-of-service attack is meant to prevent legitimate traffic from reaching a service. This is usually done by flooding the victim with attack traffic, degrading network and system performance, and rendering services unreachable.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/4_networking/practice-quiz-limitations-of-the-internet.md:
--------------------------------------------------------------------------------
1 | ## Limitations of the Internet
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | True or false: The Internet is the World Wide Web.
8 |
9 | * TRUE
10 | * **FALSE**
11 |
12 | > The Internet is mistakenly referred to as the World Wide Web, but it's just the physical connection of computers and wires around the world. The Web is the information on the Internet.
13 |
14 |
15 |
16 | ### Question 2
17 |
18 | What is the fundamental protocol that the Internet uses today?
19 |
20 | * DHCP
21 | * **TCP/IP**
22 | * FTP
23 | * HTTP
24 |
25 | > The TCP/IP protocol is what allowed computers to share information outside their network, which stemmed the creation of the Internet as we know it today.
26 |
27 |
28 |
29 | ### Question 3
30 |
31 | Free text: In what other ways has the Internet changed the way society functions?
32 |
33 | ```
34 | Business, healthcare, education, etc.
35 | ```
36 |
37 | > It's crazy to think about how the Internet has completely changed our lives. Thank you for submitting your response to this prompt. In the future, you may even see the Internet change things that we have yet to imagine.
38 |
39 |
40 |
41 | ### Question 4
42 |
43 | True or false: You should only worry about computer security if you work in a computer security role.
44 |
45 | * TRUE
46 | * **FALSE**
47 |
48 | > Computer security affects everyone whether it's in your personal life or work life. You and everyone around you should exercise good computer security practices.
49 |
50 |
51 |
52 | ### Question 5
53 |
54 | There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte?
55 |
56 | * 128
57 | * **255**
58 | * 256
59 | * 512
60 |
61 | > There are 256 available values in a byte with decimal values ranging from 0 to 255.
62 |
63 |
64 |
65 | ### Question 6
66 |
67 | Which of the following protocols is the primary infrastructure that creates the Internet?
68 |
69 | * DNS
70 | * NAT
71 | * HTML
72 | * **TCP/IP**
73 |
74 | > The TCP/IP protocol is what allowed computers to share information outside their network, which stemmed the creation of the Internet as we know it today.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/2_network-and-infrastructure-services/qwiklabs-service-manag-linux.sh:
--------------------------------------------------------------------------------
1 | # stopping and starting services
2 | sudo service rsyslog status # checking the status of the service
3 | logger This is a test log entry # send the text to the rsyslog service and the service will then write it into /var/log/syslog
4 | sudo tail -1 /var/log/syslog # looking at the last lines in /var/log/syslog
5 | sudo service rsyslog stop # stop the rsyslog service
6 | sudo service rsyslog status # see the service current state
7 | sudo tail -5 /var/log/syslog # see what the command logged to /var/log/syslog
8 | logger This is another test log entry # try sending text with our logger command again
9 | sudo tail /var/log/syslog # check the contents of /var/log/syslog
10 | sudo service rsyslog start # start the rsyslog service
11 | sudo service rsyslog status # check status
12 |
13 | # fixing a failing service
14 | sudo systemctl --state=failed # list services that are in a failed state
15 | sudo service cups status # get more information about failure services
16 | sudo ls -l /etc/cups # look at the contents of /etc/cups directory
17 | sudo mv /etc/cups/cupsd.conf.old /etc/cups/cupsd.conf # move file
18 | sudo ls -l /etc/cups # look at the contents of /etc/cups directory
19 | sudo service cups start # start cups
20 | sudo service cups status # check the status
21 |
22 | # restarting services
23 | sudo service ntp status # look at the service that is keeping the date and time of the machine accurate: NTP.
24 | sudo date -s '2017-01-01 00:00:00' # manually change the date
25 | date # check the date
26 | sudo tail /var/log/syslog # look at the last lines in syslog
27 | sudo service ntp restart # restart ntp, the service will notice the change in time and fix it to the current time
28 | date # check the date
29 |
30 | # reloading Services
31 | sudo ls -l /var/log/cups # see the content of /var/log/cups directory
32 | sudo nano /etc/cups/cupsd.conf # edit /etc/cups/cupsd.conf using nano, replace warn with debug
33 | sudo service cups reload # reload cups
34 | sudo cat /var/log/cups/error_log # see that there's now a lot of content in /var/log/cups/error_log
35 | sudo service cups reload # reload cups
36 |
--------------------------------------------------------------------------------
/c3_os-power-user/2_users-and-permissions/practice-quiz-permissions.md:
--------------------------------------------------------------------------------
1 | ## Permissions
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the basic linux file permissions? Check all that apply.
8 |
9 | * **Read**
10 | * **Write**
11 | * Modify
12 | * **Execute**
13 |
14 | > The three basic file permissions in Linux are read, write, and execute.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | You're given the output of an ls -l of a file in Linux.
21 |
22 | Answer the following question: What does the first character of output signify?
23 |
24 | * **books_file is a directory**
25 | * books_file is a disk device
26 | * The file owner has delete permissions
27 | * The file owner is a class D user
28 |
29 | > The first character in output reflects the type of directory entry; in this case, a directory.
30 |
31 |
32 |
33 | ### Question 3
34 |
35 | You're given the output of an ls -l of a file in Linux.
36 |
37 | Answer the following question: Who does the last trio of bits (r--) in the file permission and attributes refer to?
38 |
39 | * **All other users**
40 | * Group file belongs to
41 | * Regular file
42 | * File owner
43 |
44 | > The last trio of permission bits refers to the permission of all other users on the machine.
45 |
46 |
47 |
48 | ### Question 4
49 |
50 | You're given the output of an ls -l of a file in Linux.
51 |
52 | Answer the following question: What permissions does the second trio of bits (-wx) give you? Check all that apply.
53 |
54 | * Read
55 | * **Execute**
56 | * **Write**
57 | * Group file belongs to
58 |
59 | > Great work! w and x are the write and execute permissions.
60 |
61 |
62 |
63 | ### Question 5
64 |
65 | If I wanted to change permissions of a file called honey_bears, what command could I use to grant write access to the owner of the file without changing other permissions? The owner currently only has read access to the file. Check all that apply.
66 |
67 | * **chmod u+w honey_bears**
68 | * chmod o+w honey_bears
69 | * chmod 644 honey_bears
70 | * chmod 400 honey_bears
71 |
72 | > You can use the symbolic or numerical form of chmod to modify permissions, but to use the numerical form you need to know what all of the existing permissions are to avoid unintended changes
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/highlights.md:
--------------------------------------------------------------------------------
1 | ## Course Highlights
2 |
3 |
4 |
5 | ### Introduction to Software
6 |
7 | * **Software**: How we, as users directly interact with our computer.
8 | * If **hardware** is the physical stuff that you can pick up and hold, **software** is the intangible instructions that tell the hardware what to do.
9 | * **Coding**: Translating one language to another.
10 | * **Scripting**: Coding in a scripting language.
11 | * **Scripts**: Mainly used to perform a single or limited range task.
12 | * **Programming**: Coding in a programming language.
13 | * **Programming languages**: Special languages that software developers use to write instructions for computers to execute.
14 | * **Copyright**: Used when creating original work.
15 | * **Application software**: Any software created to fulfill a specific need, like a text editor, web browser, or graphic editor.
16 | * **System software**: Software used to keep our core system running, like operating system tools and utilities.
17 | * **Firmware**: Software that's permanently store on a computer component.
18 | * Binary code instructions would be translated to this:
19 | * Grab some input data from this location in memory.
20 | * Using the input data, do some math.
21 | * Then put some output data into this location in memory.
22 | * **Assembly language**: Allowed computer scientiests to use human readable instructions, assembled into code, that the machines could understand.
23 | * Program using machine instructions:
24 | * Take integer from register 1.
25 | * Take integer from register 2.
26 | * Add integer from register1, and register 2, and output to register 4.
27 | * **Compiled programming languages**: Uses human readable instructions, then send them through a compiler.
28 | * The **script** is run by an interpreter, which interprets the code into CPU instructions just in time to run them.
29 |
30 | ### Interacting with Software
31 |
32 | * **Software bug**: An error in software that cause unexpected results.
33 | * **Git**: A version control system that helps keep track of changes made to files and directories.
34 | * **.exe**: A file extension found in Windows for an executable file.
35 | * **Automation**: Makes processes work automatically.
36 |
--------------------------------------------------------------------------------
/c5_it-security/5_defense-in-depth/practice-quiz-application-hardening.md:
--------------------------------------------------------------------------------
1 | ## Application Hardening
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Why is it important to keep software up-to-date?
8 |
9 | * **To address any security vulnerabilities discovered**
10 | * To ensure compatibility with other systems
11 | * It's not important. It's just annoying.
12 | * To ensure access to the latest features
13 |
14 | > As vulnerabilities are discovered and fixed by the software vendor, applying these updates is super important to protect yourself against attackers.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What are some types of software that you'd want to have an explicit application policy for? Check all that apply.
21 |
22 | * Software development kits
23 | * **Video games**
24 | * **Filesharing software**
25 | * Word processors
26 |
27 | > Video games and filesharing software typically don't have a use in business (though it does depend on the nature of the business). So, it might make sense to have explicit policies dictating whether or not this type of software is permitted on systems.
28 |
29 | ### Question 3
30 |
31 | What does applying software patches protect against?
32 |
33 | * **Undiscovered vulnerabilities & newly found vulnerabilities**
34 | * MITM attacks
35 | * Suspicious network traffic.
36 | * Data tampering
37 |
38 | > Software updates or patches can fix recently discovered vulnerabilities or close ones that you weren't aware of.
39 |
40 | ### Question 4
41 |
42 | What should be considered when implementing software policies and guidelines?
43 |
44 | * The company’s technical debt
45 | * **What the users need in order to do their jobs**
46 | * The local weather forecast
47 | * Your reputation within the company
48 |
49 | > If there's a common use case for a certain type of software, it would be helpful to select a specific software implementation and require the use of that solution.
50 |
51 | ### Question 5
52 |
53 | What is one way to check whether or not a website can be trusted?
54 |
55 | * The webpage design
56 | * The company logo
57 | * **Check for SSL certificates**
58 | * The quality of pictures on the website
59 |
60 | > Secure Socket Layer (SSL) certificates are issued by trusted certificate authorities (CA), such as DigiCert. An SSL certificate indicates that any data submitted through a website will be encrypted.
61 |
62 |
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/4_directory-services/practice-quiz-centralized-management-and-ldap.md:
--------------------------------------------------------------------------------
1 | ## Centralized Management and LDAP
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | Which of these are examples of centralized management? Check all that apply.
8 |
9 | * **Role-based access control**
10 | * **Centralized configuration management**
11 | * Copying configurations to various systems
12 | * Local authentication
13 |
14 | > Role-based access control makes it easier to administer access rights by changing role membership and allowing for inheritance to grant permissions (instead of granting each permission individually for each user account). Centralized configuration management is an easier way to manage configurations for services and hardware. By centralizing this, it becomes easier to push changes to multiple systems at once.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Which of these are components of an LDAP entry? Check all that apply.
21 |
22 | * Uncommon Name
23 | * **Common Name**
24 | * Organizational User
25 | * **Distinguished Name**
26 |
27 | > The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What's does the LDAP Bind operation do exactly?
34 |
35 | * Modifies entries in a directory server
36 | * Looks up information in a directory server
37 | * **Authenticates a client to the directory server**
38 | * Changes the password for a user account on the directory server
39 |
40 | > The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.
47 |
48 | * **Anonymous**
49 | * **Simple**
50 | * Complex
51 | * **SASL**
52 |
53 | > Bind operations support three different mechanisms for authentication: (1) Anonymous, which doesn't actually authenticate at all, and allows anyone to query the server; (2) Simple, which involves sending the password in plaintext; and (3) SASL, or Simple Authentication and Security Layer, which involves a secure challenge-response authentication mechanism.
--------------------------------------------------------------------------------
/c4_system-administration-it-infrastructure-services/5_data-recovery-and-backups/practice-quiz-disaster-recovery-plans.md:
--------------------------------------------------------------------------------
1 | ## Disaster Recovery Plans
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What elements should a disaster recovery plan cover? Check all that apply.
8 |
9 | * **Detection measures**
10 | * **Preventative measures**
11 | * **Recovery measures**
12 | * Drastic measures
13 |
14 | > A disaster recovery plan shouldn't only have recovery procedures; it should include detection measures so that you can be made aware of an incident, along with preventative measures to help avoid a disaster in the first place.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | Why are detection measures included in a disaster recovery plan?
21 |
22 | * They aren't
23 | * **Because it's important to know when a disaster occurs**
24 | * Because they prevent data loss
25 | * Because they make recovering from data loss easier
26 |
27 | > The sooner you can be alerted that an incident is going on, the quicker you can take measures to stop it.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What are good preventative measures to incorporate in your organization? Check all that apply.
34 |
35 | * Monitoring and alerting systems
36 | * **Redundant systems**
37 | * **Regular backups**
38 | * **Accessible and up-to-date documentation**
39 |
40 | > Good documentation is considered a preventative measure, since it can avoid costly mistakes and make handling outages or system failures easier.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | What are good detection measures to incorporate in your organization? Check all that apply.
47 |
48 | * **Environmental monitoring**
49 | * Backing up firewall rules
50 | * Redundant power supplies
51 | * **System performance monitoring**
52 |
53 | > Monitoring the environmental conditions in a server room will alert you if things might cause problems for your equipment. System performance monitoring can also alert you to anomalies in requests or traffic to a server.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | What are good recovery measures to incorporate in your organization? Check all that apply.
60 |
61 | * **Restoring server configs from backup**
62 | * **Following detailed recovery plan documentation**
63 | * Monitoring for internet line outages
64 | * Maintaining redundant servers
65 |
66 | > Maintaining backups of server configs will make restoring a damaged system much quicker and easier. Detailed documentation on how exactly to do this will also speed up this process.
--------------------------------------------------------------------------------
/c5_it-security/2_pelgbyblt/practice-quiz-hashing.md:
--------------------------------------------------------------------------------
1 | ## Hashing
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | How is hashing different from encryption?
8 |
9 | * **Hashing operations are one-directional.**
10 | * Hashing is meant for large amounts of data, while encryption is meant for small amounts of data.
11 | * It's less secure.
12 | * It's faster.
13 |
14 | > Hash functions, by definition, are one-way, meaning that it's not possible to take a hash and recover the input that generated the hash. Encryption, on the other hand, is two-directional, since data can be both encrypted and decrypted.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What's a hash collision?
21 |
22 | * When two identical files generate different hash digests
23 | * When a hash digest is reversed to recover the original
24 | * When two different hashing algorithms produce the same hash
25 | * **When two different files generate the same hash digest**
26 |
27 | > If two different files result in the same hash, this is referred to as a hash collision. Hash collisions aren't awesome, as this would allow an attacker to create a fake file that would pass hash verification.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)?
34 |
35 | * **A MIC only hashes the message, while a MAC incorporates a secret key.**
36 | * A MAC requires a password, while a MIC does not.
37 | * They're the same thing.
38 | * A MIC is more reliable than a MAC.
39 |
40 | > A MIC can be thought of as just a checksum or hash digest of a message, while a MAC uses a shared secret to generate the checksum. This also makes it authenticated, since the other party must also have the same shared secret, preventing a third party from forging the checksum data.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | How can you defend against brute-force password attacks? Check all that apply.
47 |
48 | * Store passwords in a rainbow table.
49 | * **Incorporate salts into password hashing.**
50 | * **Run passwords through the hashing function multiple times.**
51 | * **Enforce the use of strong passwords.**
52 |
53 | > A brute-force password attack involves guessing the password. So, having complex and long passwords will make this task much harder and will require more time and resources for the attacker to succeed. Incorporating salts into password hashes will protect against rainbow table attacks, and running passwords through the hashing algorithm lots of times also raises the bar for an attacker, requiring more resources for each password guess.
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | ## [Google IT Support Professional Certificate](https://www.coursera.org/professional-certificates/google-it-support)
2 |
3 |
4 |
5 | 
6 |
7 |
8 | * This repository written for reference and self-documentation purpose
9 | * Feel free to contribute!
10 |
11 |
12 |
13 |
14 | ### About this Professional Certificate
15 |
16 | This 5-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. The program is part of Grow with Google, a Google initiative to help create economic opportunity for all. [Learn More](https://www.youtube.com/watch?v=5ZjTX0GC944&t=1s).
17 |
18 | Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, Hulu, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. You can also earn a CompTIA and Google [dual credential](https://www.blog.google/outreach-initiatives/grow-with-google/-it-support-comptia/) when you complete the Google certificate and pass the CompTIA A+ certification exams.
19 |
20 | Through a mix of video lectures, quizzes, and hands-on labs and widgets, the program will introduce you to troubleshooting, customer service, networking, operating systems, system administration and security. You’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating ~5 hours a week, you can complete in under six months.
21 |
22 | ### Applied Learning Project
23 |
24 | Through this Professional Certificate program you'll have access to a variety of hands-on assessments which will help you to simulate many of the experiences of IT support that are critical for success in the workplace.
25 |
26 | Examples of virtual assessments include Assembling a Computer, Networking simulation, Writing Effective Support Documentation, Routing Paths and Subnets, Wireless Networking, Device Software Management, Public Key or Asymmetric Encryption, Incident Handling, among many other hands-on learning application.
27 |
28 | ### Skills you will gain
29 |
30 | * Binary Code
31 | * Customer Support
32 | * Linux
33 | * Troubleshooting
34 | * Domain Name System (DNS)
35 | * Ipv4
36 | * Network Model
37 | * Powershell
38 | * Linux File Systems
39 | * Command-Line Interface
40 | * Directory Service
41 | * Lightweight Directory Access Protocol (LDAP)
42 |
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/3_operating-system/practice-quiz-what-is-operating-system.md:
--------------------------------------------------------------------------------
1 | ## What is an Operating System?
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What are the two main parts that make up an operating system?
8 |
9 | * Windows and Mac
10 | * **Kernel and Userspace**
11 | * Users and Software
12 | * Kernel and Packages
13 |
14 | > The two parts that make up an operating system are the kernel and the user space.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What are the main components of file management? Check all that apply.
21 |
22 | * **File data**
23 | * NTFS
24 | * **File system**
25 | * **Metadata**
26 |
27 | > The main components of file management are the storage of data, the file metadata, and the filesystem.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | Which of these are true? Check all that apply.
34 |
35 | * **You can have many processes running for one program.**
36 | * A program is initially stored in RAM. A process is initially stored in the hard drive.
37 | * **A program is an application that we can run. A process is a program that is executed.**
38 | * A program is a process that is executed. A process is a program that we can run.
39 |
40 | > A program is an application, and a process is an application that is executed. You can have many processes running for the same program.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | What are the characteristics of virtual memory? Check all that apply.
47 |
48 | * **Allows our computer to have more memory than it physically has.**
49 | * **Combination of RAM and hard drive space.**
50 | * **Stores pages that are currently not in use by physical memory.**
51 | * It is where we store pages that are being executed
52 |
53 | > Virtual memory allows us to extend the physical memory on our machine.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | Which of these is a GUI? Check all that apply.
60 |
61 | * Option One
62 | * **Option Two**
63 | * **Option Three**
64 | * Option Four
65 |
66 | > These are all examples of a GUI.
67 |
68 |
69 |
70 | ### Question 6
71 |
72 | Which of these are considered I/O devices? Check all that apply.
73 |
74 | * **Hard disk drives**
75 | * **Web cams**
76 | * **Monitors**
77 | * **Speakers**
78 |
79 | > Any devices that receive input or send out output are considered I/O devices.
80 |
81 |
82 |
83 | ### Question 7
84 |
85 | What is the last step in booting a computer?
86 |
87 | * Load up drivers.
88 | * **User space is launched.**
89 | * Execute the bootloader.
90 | * Perform a POST.
91 |
92 | > The last step in booting a computer is launching the user space, like a login window, GUI, and more.
--------------------------------------------------------------------------------
/c5_it-security/4_securing-your-networks/practice-quiz-network-monitoring.md:
--------------------------------------------------------------------------------
1 | ## Network Monitoring
2 |
3 |
4 |
5 | ### Question 1
6 |
7 | What does tcpdump do? Select all that apply.
8 |
9 | * Encrypts your packets
10 | * **Analyzes packets and provides a textual analysis**
11 | * **Captures packets**
12 | * Generates packets
13 |
14 | > Tcpdump is a packet capture and analysis utility, not a packet generator.
15 |
16 |
17 |
18 | ### Question 2
19 |
20 | What does wireshark do differently from tcpdump? Check all that apply.
21 |
22 | * It can write packet captures to a file.
23 | * **It has a graphical interface.**
24 | * **It understands more application-level protocols.**
25 | * It can capture packets and analyze them.
26 |
27 | > tcpdump is a command line utility, while wireshark has a powerful graphical interface. While tcpdump understands some application-layer protocols, wireshark expands on this with a much larger complement of protocols understood.
28 |
29 |
30 |
31 | ### Question 3
32 |
33 | What factors should you consider when designing an IDS installation? Check all that apply.
34 |
35 | * Internet connection speed
36 | * **Storage capacity**
37 | * OS types in use
38 | * **Traffic bandwidth**
39 |
40 | > It's important to understand the amount of traffic the IDS would be analyzing. This ensures that the IDS system is capable of keeping up with the volume of traffic. Storage capacity is important to consider for logs and packet capture retention reasons.
41 |
42 |
43 |
44 | ### Question 4
45 |
46 | What is the difference between an Intrusion Detection System and an Intrusion Prevention System?
47 |
48 | * An IDS can actively block attack traffic, while an IPS can only alert on detected attack traffic.
49 | * **An IDS can alert on detected attack traffic, but an IPS can actively block attack traffic.**
50 | * An IDS can detect malware activity on a network, but an IPS can't
51 | * They are the same thing.
52 |
53 | > An IDS only detects intrusions or attacks, while an IPS can make changes to firewall rules to actively drop or block detected attack traffic.
54 |
55 |
56 |
57 | ### Question 5
58 |
59 | What factors would limit your ability to capture packets? Check all that apply.
60 |
61 | * **Network interface not being in promiscuous or monitor mode**
62 | * Anti-malware software
63 | * Encryption
64 | * **Access to the traffic in question**
65 |
66 | > If your NIC isn't in monitor or promiscuous mode, it'll only capture packets sent by and sent to your host. In order to capture traffic, you need to be able to access the packets. So, being connected to a switch wouldn't allow you to capture other clients' traffic.
--------------------------------------------------------------------------------
/c1_technical-support-fundamentals/5_software/quiz.md:
--------------------------------------------------------------------------------
1 | ### What is Software?
2 |
3 | ____ is translating one language to another.
4 |
5 | * **Coding**
6 | * Transcribing
7 | * Encrypting
8 | * Transforming
9 |
10 | > Coding is translating one language to another.
11 |
12 | When writing code, a(n) ____ is usually used to perform a single- or limited-range task.
13 |
14 | * program
15 | * software
16 | * application
17 | * **script**
18 |
19 | > Scripts are used as a way to perform a single or limited task.
20 |
21 |
22 |
23 | ### Types of Software
24 |
25 | A type of software that can allow freedom of use, modification, and sharing is known as:
26 |
27 | * Commercial software
28 | * **Open-source software**
29 | * Application software
30 | * System software
31 |
32 | > Software that can be free to use, modified, and shared is known as open-source software.
33 |
34 | Which of these software is firmware?
35 |
36 | * Windows Operating System
37 | * Calculator app
38 | * **BIOS**
39 | * Web browser
40 |
41 | > The BIOS is software that is stored permanently on hardware.
42 |
43 | Which of the following software versions is the highest?
44 |
45 | * **4.1.2**
46 | * 3.0.9
47 |
48 | > A software version of 4.1.2 is greater than the software version 3.0.9.
49 |
50 |
51 |
52 | ### Revisiting Abstraction
53 |
54 | The concept of taking a complex system and simplifying it for use is known as ____.
55 |
56 | * coding
57 | * **abstraction**
58 | * obsfucation
59 | * encryption
60 |
61 | > In all facets of computing, we use the concept of abstraction to help make our lives easier.
62 |
63 |
64 |
65 | ### Recipe for Computing
66 |
67 | Before we had compilers, what language was used to allow human readable instructions to be assembled into machine code?
68 |
69 | * **Assembly**
70 | * C++
71 | * Cobol
72 | * Basic
73 |
74 | > Assembly language was used to make semi-human readable instructions into machine code.
75 |
76 |
77 |
78 | ### Managing Software
79 |
80 | True or false: When managing software, you should only be worried about how to install software.
81 |
82 | * True
83 | * **False**
84 |
85 | > Managing software includes many tasks such as installing, updating, and removing software.
86 |
87 |
88 |
89 | ### Installing, Updating, and Removing Software on Windows
90 |
91 | True or false: When using a 64-bit OS, you should install 64-bit applications.
92 |
93 | * **True**
94 | * False
95 |
96 | > Remember with CPU architecture, you want to use the same application and OS architecture for better compatibility.
97 |
98 |
99 |
100 | ### Software Automation
101 |
102 | ____ makes processes work automatically.
103 |
104 | * Software management
105 | * Compilation
106 | * **Automation**
107 | * Abstraction
108 |
109 | > With the help of automation, we can make processes work automatically.
--------------------------------------------------------------------------------