Support and security of mobile devices
The course covers issues related to the use of mobile devices: IT security, teleconferences, computer networks, Internet and health, banking.
The course covers issues related to the use of mobile devices: IT security, teleconferences, computer networks, Internet and health, banking.
THE COURSE ENTRY REQUIREMENTS
For the purposes of the course, it is assumed that:
COURSE OBJECTIVES
The aim of the course is to equip the participant with the necessary knowledge and skills in the field of broadly understood cloud technology. The issues raised in it are aimed at building awareness in the field of information security and the principles that govern modern Internet security systems. The course deals with the basic configuration of mobile devices and PCs. The authors also present the participant with the knowledge of building a home local network, from the conscious selection of components to its basic configuration. After completing the course, the participant will not only be familiar with good practices regarding behavior on the Internet but will also be able to conduct substantive conversations with the technical support staff of selected IT services.
ISSUES DISCUSSED
Module 1. Internet introduction
The first module presents and explains the basic concepts of the Internet. Issues related to the effective search for information and safe use of Internet services were discussed. It shows what rules should be followed in communication with other users. The summary of this module is a discussion of the impact of intensive work on the computer, including the Internet, on the user's health.
Module 2. Internet selected services
The second module is related to the services available on the Internet. Issues relevant to the use of e-mail, payments, remote meetings, and discussion groups were discussed. Apps that are worth using are presented for each service. The prepared examples show how to configure and use the indicated software for your own needs.
Module 3. IT security
The third module contains the knowledge necessary to use the Internet safely. In the following lessons, concepts related to securing data using encryption algorithms were introduced. The importance of electronic signature was discussed. It shows how to prepare your devices to work on the Internet.
NOTE. The Trusted Profile (ePUAP) webpage (lesson 4) does not have an official English version. If You would like an English version please use the website translation option in the selected web browser.
Module 4. Cloud technology
The fourth module discusses issues related to working in cloud computing. Tools for creating data backups and exchanging files with other users were shown.
Module 5. Local network
The fifth module presents the structure and principle of operation of a home computer network. The principles of selection and configuration of network devices are shown and explained.
ASSESSMENT CONDITIONS
Realization of verification tests. For each test, the participant has 3 attempts. A minimum of 51% of the points must be obtained.
TERMS OF RECEIVING THE CERTIFICATE
To obtain a certificate, you must obtain 51% of the test points.
an employee of the Institute of Information Technology and Mechatronics of the WSG University
A specialist with extensive practical experience in programming embedded systems as well as control and robotics.
an employee of the Institute of Information Technology and Mechatronics of the WSG University
A specialist with extensive practical experience in programming in Windows and Android environments.