Pomiń do głównej zawartości

Opis kursu

THE COURSE ENTRY REQUIREMENTS 

For the purposes of the course, it is assumed that: 

  • the participant has basic knowledge of operating Windows and Android systems,
  • the participant has a computer with Windows and a smartphone or tablet with Android (the course does not directly apply to macOS, iOS, or Linux users, although some issues are independent of operating systems).

COURSE OBJECTIVES 

The aim of the course is to equip the participant with the necessary knowledge and skills in the field of broadly understood cloud technology. The issues raised in it are aimed at building awareness in the field of information security and the principles that govern modern Internet security systems. The course deals with the basic configuration of mobile devices and PCs. The authors also present the participant with the knowledge of building a home local network, from the conscious selection of components to its basic configuration. After completing the course, the participant will not only be familiar with good practices regarding behavior on the Internet but will also be able to conduct substantive conversations with the technical support staff of selected IT services. 


ISSUES DISCUSSED 

Module 1. Internet introduction 

The first module presents and explains the basic concepts of the Internet. Issues related to the effective search for information and safe use of Internet services were discussed. It shows what rules should be followed in communication with other users. The summary of this module is a discussion of the impact of intensive work on the computer, including the Internet, on the user's health. 

Module 2. Internet selected services 

The second module is related to the services available on the Internet. Issues relevant to the use of e-mail, payments, remote meetings, and discussion groups were discussed. Apps that are worth using are presented for each service. The prepared examples show how to configure and use the indicated software for your own needs. 

Module 3. IT security 

The third module contains the knowledge necessary to use the Internet safely. In the following lessons, concepts related to securing data using encryption algorithms were introduced. The importance of electronic signature was discussed. It shows how to prepare your devices to work on the Internet.

NOTE. The Trusted Profile (ePUAP) webpage (lesson 4) does not have an official English version. If You would like an English version please use the website translation option in the selected web browser. 

Module 4. Cloud technology 

The fourth module discusses issues related to working in cloud computing. Tools for creating data backups and exchanging files with other users were shown. 

Module 5. Local network 

The fifth module presents the structure and principle of operation of a home computer network. The principles of selection and configuration of network devices are shown and explained. 


ASSESSMENT CONDITIONS 

Realization of verification tests. For each test, the participant has 3 attempts. A minimum of 51% of the points must be obtained. 


TERMS OF RECEIVING THE CERTIFICATE 

To obtain a certificate, you must obtain 51% of the test points. 


COURSE STAFF 

mgr inż. Tomasz Ocetkiewicz

an employee of the Institute of Information Technology and Mechatronics of the WSG University 

A specialist with extensive practical experience in programming embedded systems as well as control and robotics. 

mgr Cezary Uniszkiewicz 

an employee of the Institute of Information Technology and Mechatronics of the WSG University 

A specialist with extensive practical experience in programming in Windows and Android environments.