computer training image
Online Training Classes Purchased Securely
Shopping cart  Shopping cart
0 Product(s) in cart
Total $0.00
> Checkout
Online Payments

Benefits of Computer Coach's online computer training classes

  • Accessible 24 hours a day 7 days a week, so you can learn when you have time.
  • Cost-effective solutions, so you don’t go broke learning the skills you need.
  • Available Anytime, anywhere with an Internet connection, so you can study at your house, office, or where you feel comfortable.
  • Interactive & fun courses allow for greater retention of course topics.
  • Easy to use so you can start learning right away.
  • Full of hands-on labs so you can get the practice you need
  • HTML Based so you don’t need any additional downloads
  • Live Mentor Available to ask questions and get clarification

online computer training questions answered

Computing Concepts Online Course

12 Month Subscription - $35
Live Mentor +$30

Summary:
This series examines several basic computing concepts. Security issues are discussed, including administrative, physical, logical, and network security, and how to plan for security risks. The basic concepts of database functionality and selection are also discussed. Data processing and management is examined in detail, including teleprocessing, data transmission, and messages.

Audience:
This series is for anyone who is interested in learning about computer security.

Features:
●  A glossary
●  A Skill Assessment

Topics included in this course:
Computing Concepts Series: Types of Security
Computing Concepts Series: Security Risks
Computing Concepts Series: Database Basics
Computing Concepts Series: Selecting Databases
Computing Concepts Series: Data Processing
Computing Concepts Series: Managing Data
Computing Concepts Series: Teleprocessing
Computing Concepts Series: Transmitting Data
Computing Concepts Series: Messages

Computing Concepts Series: Types of Security
Summary: Time: 3.0 hour(s)
This course provides an advanced look at computer security features.

Objectives:
After completing this course, students will be able to:
Identify and understand the three classifications of computer security: administrative, physical and logical
Explain how access controls are used to restrict the number of people who have access to computers and sensitive data
Explain how access control software limits who can log onto computers and what information they may retrieve
Explain how networks and terminals communicate

Topics:
Choices in Security
Administrative Security
Physical Security
Environmental Threats
Logical Security
Network Security
Microcomputer Security
top

Computing Concepts Series: Security Risks
Summary: Time: 3.0 hour(s)
This course explains contingency planning and precautions against computer crime using the framework of administrative, physical and logical security.

Objectives:
After completing this course, students will be able to:
Apply the process of risk analysis
Explain the function of a Contingency Planning Committee
Describe the laws and pricliples of proviacy used to cover computer crimes
Describe the administrative, physical and logical controls used in the collection of data
Explain the purpose, process and tools used in EDP auditing

Topics:
Contingency Planning
Planning Example
Computer Crimes
The Effect of Computer Laws
EDP Auditing
top

Computing Concepts Series: Database Basics
Summary: Time: 3.0 hour(s)
This course provides an introduction to the basics of databases.

Objectives:
After completing this course, students will be able to:
Use data management functions
Explain paper based management
Describe file oriented management
Describe the database management system
Define three database models
Identify general principles
Describe the general principles of the network model
Explain the general principles of the relational model

Topics:
Data Management Systems
Paper-Based File System
File-Oriented Computer System
Database Models
The Hierarchical Model
The Network Model
The Relational Model
top

Computing Concepts Series: Selecting Databases
Summary: Time: 3.0 hour(s)
This course introduces the principles of database management systems (DBMSs).

Objectives:
After completing this course, students will be able to:
Distinguish the three models
Understand the criteria for comparison
Define transaction processing
Explain information retrieval
Identify change accommodation
Choose the appropriate model

Topics:
Evalutating the Three Models
Evaluating The Hierarchical Model
Evaluating The Network Model
Evaluating The Relational Model
Evaluation Summary
Selecting The Appropriate Model
top

Computing Concepts Series: Data Processing
Summary: Time: 2.0 hour(s)
This course provides an introduction to the concepts related to data processing.

Objectives:
After completing this course, students will be able to:
Describe the various components of a computer
Define the terms bits and bytes
Explain the various concepts related to data structures
Explain the concepts related to processing of data
Explain the various concepts related to programming

Topics:
The Computer System
Data Structures
Datasets and Files
Writing Programs
top

Computing Concepts Series: Managing Data
Summary: Time: 2.0 hour(s)
This course provides an overview of managing data.

Objectives:
After completing this course, students will be able to:
Define basic concepts
Explain an overview of JCL Statements
Explain how to use libraries
Explain how job processing works

Topics:
JCL Overview
JCL Statements
Libraries
Job Processing
top

Computing Concepts Series: Teleprocessing
Summary: Time: 2.0 hour(s)
This course provides an overview of various computing concepts related to teleprocessing.

Objectives:
After completing this course, students will be able to:
Define a teleprocessing system
Describe the functioning of various components of communication systems
Describe the functions of data communication systems
Distinguish between dumb and intelligent terminals
Describe the function of various network components

Topics:
Teleprocessing Systems
Communications Systems
Data Communications Systems
Terminals
Networks
top

Computing Concepts Series: Transmitting Data
Summary: Time: 3.0 hour(s)
This course covers the functions performed by a teleprocessing network.

Objectives:
After completing this course, students will be able to:
Explain an overview of functions performed by a teleprocessing network
Describe the control of a teleprocessing network
Explain the steps of the conversion process
Use software that edits the message content and checks for errors
Use and understand modems
Describe the flow of information paths in a telecommunications network
Explain information on the flow of characteristics, direction, mode, and speed in a network
Recognize and handle errors within a transmission channel
Recognize noise and how to correct noise errors

Topics:
The Teleprocessing Network
Assembling Data
Editing Software
Modems
Lines
Information Flow
Errors
top

Computing Concepts Series: Messages
Summary: Time: 2.0 hour(s)
This course explains the fourth element of telecommunications, the message.

Objectives:
After completing this course, students will be able to:
Define the fourth component of telecommunications
Describe some common data codes
Explain data transmission structures
Identify message protocols
Use the INW to communicate
Describe the cost of using the INW
Identify aspects of telecommunications history

Topics:
Coding Systems
Data Transmission Structures
Message Protocols
Using the INW
Communications History
top

12 Month Subscription - $35
Live Mentor +$30