The Business Process & IT Best Practices Specialist!
Contact Us
+91 9810609560

7S TP-101 Computer & Network Basics 24 hrs 3 Days


Course Description:

7S TP101 is designed as an introduction to computer basics. It has been created to be especially useful for law enforcement officers who may need the fundamental skills of computers. These concepts are especially useful for those planning to take the other basic classes.

Course Objective

This course teaches the delegate basics of personal computers and networking concepts and skills. Further, it helps the delegate understand networking terminology and technologies. This course is designed as prelude subsequent trainings for law enforcement officials and computer forensics professionals who require an understanding of data communications and networking.

Course Requirements

There are currently no prerequisites for this course.

Course Objectives:Upon completion of this course, the student will be able to:

  • list different types of networks
  • list the components of a network
  • list the components of the data transmission model
  • describe the methods of encoding data
  • describe the role of bandwidth in data transmission
  • differentiate between point-to-point and broadcast transmission technologies
  • describe the use of cables in a wired network
  • list various wireless technologies
  • list the primary physical topologies list the primary logical topologies
  • list different categories of protocols
  • list the commonly used protocols
  • describe the need for standards list the primary standards organizations
  • describe the OSI reference model
  • list the layers of the OSI reference model

Course Topics:Understanding the Personal Computer

  • Terminology
  • A Short History of Computing
  • Software Evolution
  • Installing a New Computer
  • Hardware Components
  • the Function of the CPU 
  • Memory
  • Input Devices
  • Output Devices
  • Storage Devices and Options
  • Overview of Operating Systems
  • the Internet and Online Services
  • Troubleshooting PC Problems and Errors

Using Windows XP and Vista Windows XP

  • Windows Basics
  • Using the Mouse, the Start Menu, and the Taskbar
  • Help! Finding Answers Fast
  • Opening, Closing, and Rearranging Windows
  • Icons, Folders, and Shortcuts

Customizing Windows XP

  • Windows Basics
  • Views in Windows
  • XP's Little Programs That Do Big Things
  • The Clipboard
  • Installing Software
  • Finding Lost Files
  • Fun with Fonts
  • The Clipboard
  • Printing in Windows XP
  • Surfing with Internet Explorer
  • A Healthy System
  • User Accounts

Windows Vista

  • Hardware Requirement and Software Versions
  • The Desktop
  • Visual Differences between XP and Vista
  • Vista’s New and Improved Programs
  • Security and Search Features in Vista

Software & Hardware Applications

  • Application Software
  • Operating Systems
  • Common Features of Software Applications
  • Productivity Software
  • Classroom Uses
  • Graphics and Multimedia Software
  • Examples of Graphics and Multimedia Software
  • Using Graphics and Multimedia Software in the Classroom
  • Using Web Authoring Software
  • The System Unit
  • Components of the System Unit
  • Data Representation
  • Input
  • Input Devices
  • Input Devices for Challenged Delegates
  • Output
  • Output Devices
  • Output Devices for Challenged Delegates
  • Storage
  • Storage Devices

Using Multimedia, Security Issues and Ethics

  • Multimedia
  • The Components of Multimedia
  • Multimedia vs. Other Types of Software Applications
  • Multimedia Applications
  • Presentation
  • Authoring
  • Virtual Reality
  • The World Wide Web
  • Computer Security
  • Viruses
  • Software Piracy
  • Ethics and the Information Age
  • Copyright
  • Fair Use
  • Publishing Web Pages
  • Safety on the Internet
  • Filtering Software
  • Acceptable Use Policies (AUP)
  • Emerging Technologies
  • Basic Networking and TCP/IP Refresher
  • Basics of Networking
  • Basics of TCP/IP
  • Routing Concepts
  • Information Security Management System
  • Security Essentials
  • Information Security Standards
  • Risks Analysis
  • Security Organizations
  • Developing Information Security Policies
  • Security Mechanisms
  • Physical Security
  • Internet Vulnerability Hacking Exploits
  • Internet Vulnerabilities
  • Types of Attacks
  • Target Identification
  • Risk Assessment Techniques
  • Gaining Control over System
  • Recording Keystroke
  • Hiding Evidence of Attacks
  • Designing and Configuring Firewalls
  • Basics of Firewall
  • Designing Firewall
  • Firewall Policy
  • Configuring Firewall
  • Implementing IP Tables
  • Designing and Configuring IDS
  • Basics of IDS
  • IDS Design
  • Goals of IDS
  • IDS Signatures
  • IDS Limitations
  • Configuring IDS
  • Configuring Secure VPN
  • VPN Concepts
  • VPN Implementation
  • Securing Windows
  • Introduction to Operating Systems
  • Features of Windows
  • Technologies of Windows
  • Authentication Security
  • NTFS Permission
  • Implementing Encryption File systems
  • Enlightening Vulnerability
  • Penetrating Windows
  • Active Directory – Windows
  • Windows – PKI components

Course Benefits :

On the completion of this course, the delegate will be familiar with basic computer concepts which are necessary for a computer forensics investigator. Furthermore, they will be able to perform useful computer tasks.

Completion Conditions :

A delegate is considered to have completed this course if he/she attends all days, and satisfactorily completes the assigned exercises/tasks/tests. On completion each delegate is presented with a certificate of completion for 7S TP-101