SlideShare una empresa de Scribd logo
1 de 1
CYC Fundamentals Training Courses & Modules<br />Approximately 15 hours of in class instruction provided to all participants by the CYC Corps Members. Hours per class will vary per site depending upon curriculum chosen, instructor style and students. The modules can be found in the Curriculum project on Basecamp. Each module begins with a slide presentation. Each module may include links to online activities, handouts and/or additional resources.<br />Course – Computer Basics    o Module 1A – Mouse Basics   o Module 1B – Keyboard Basics <br />   o Module 1C – Basic Hardware (Anatomy of a Computer)    o Module 1D – Windows Operating System    o Module 1E – Data Storage & File Extensions Internet Basics    o Module 2A – How to Use a Browser   o Module 2B – Web Based E-mail Course – Online Search and Information Literacy   o Module 3A – Search Techniques    o Module 3B – Evaluating Online Sources Course – Computer Security    o Module 4A – Viruses & Spyware Course – Personal Security    o Module 5A – Online Privacy    o Module 5B – Online Identity Course – Overview of Common Office Suites    o Module 6A – Microsoft Office    o Module 6B – Open Office <br />

Más contenido relacionado

Similar a Cyc fundamentals training courses

Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochurethinkict
 
Computer systems servicing nc ii study guide by brahms
Computer systems servicing nc ii   study guide by brahmsComputer systems servicing nc ii   study guide by brahms
Computer systems servicing nc ii study guide by brahmsbrahmschopin
 
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfFDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfgurukhade1
 
N3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoN3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoRafael Seg
 
Building Powerful and Intelligent Applications with Azure Machine Learning
Building Powerful and Intelligent Applications with Azure Machine LearningBuilding Powerful and Intelligent Applications with Azure Machine Learning
Building Powerful and Intelligent Applications with Azure Machine LearningDavid Walker, CSM,CSD,MCP,MCAD,MCSD,MVP
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...Susan Hannan
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...AVEVA
 
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxMN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabusLen Bass
 
Network Security LabNetwork Security Lab
Network Security LabNetwork Security LabNetwork Security LabNetwork Security Lab
Network Security LabNetwork Security LabKezialElizabeth
 
01 zero lecture lovely professional university CSE111.pptx
01 zero lecture lovely professional university CSE111.pptx01 zero lecture lovely professional university CSE111.pptx
01 zero lecture lovely professional university CSE111.pptxmexebi1971
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksEric Talamisan
 
Object oriented programming in java
Object oriented programming in javaObject oriented programming in java
Object oriented programming in javalaratechnologies
 
Artificial Intelligence for Unmanned Vehicles
Artificial Intelligence for Unmanned VehiclesArtificial Intelligence for Unmanned Vehicles
Artificial Intelligence for Unmanned VehiclesObject Automation
 

Similar a Cyc fundamentals training courses (20)

CYBRScore Course Catalog
CYBRScore Course CatalogCYBRScore Course Catalog
CYBRScore Course Catalog
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
 
Cis100 outline
Cis100 outlineCis100 outline
Cis100 outline
 
Computer systems servicing nc ii study guide by brahms
Computer systems servicing nc ii   study guide by brahmsComputer systems servicing nc ii   study guide by brahms
Computer systems servicing nc ii study guide by brahms
 
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfFDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdf
 
File000113
File000113File000113
File000113
 
N3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoN3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detallado
 
Building Powerful and Intelligent Applications with Azure Machine Learning
Building Powerful and Intelligent Applications with Azure Machine LearningBuilding Powerful and Intelligent Applications with Azure Machine Learning
Building Powerful and Intelligent Applications with Azure Machine Learning
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxMN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
 
Network Security LabNetwork Security Lab
Network Security LabNetwork Security LabNetwork Security LabNetwork Security Lab
Network Security LabNetwork Security Lab
 
Teit cloud 2017
Teit cloud 2017Teit cloud 2017
Teit cloud 2017
 
Teit cloud 2017
Teit cloud 2017Teit cloud 2017
Teit cloud 2017
 
01 zero lecture lovely professional university CSE111.pptx
01 zero lecture lovely professional university CSE111.pptx01 zero lecture lovely professional university CSE111.pptx
01 zero lecture lovely professional university CSE111.pptx
 
Scorm security
Scorm securityScorm security
Scorm security
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
 
Object oriented programming in java
Object oriented programming in javaObject oriented programming in java
Object oriented programming in java
 
Artificial Intelligence for Unmanned Vehicles
Artificial Intelligence for Unmanned VehiclesArtificial Intelligence for Unmanned Vehicles
Artificial Intelligence for Unmanned Vehicles
 

Más de ConnectYourCommunity

Más de ConnectYourCommunity (10)

5 module data storage
5 module data storage5 module data storage
5 module data storage
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
E2 module google docs and calendar
E2   module google docs and calendarE2   module google docs and calendar
E2 module google docs and calendar
 
E3 microsoft office
E3 microsoft officeE3 microsoft office
E3 microsoft office
 
E1 cyc elective advanced e mail
E1 cyc elective advanced e mailE1 cyc elective advanced e mail
E1 cyc elective advanced e mail
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
8 module search techniques
8 module search techniques8 module search techniques
8 module search techniques
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
5 module data storage 1
5 module data storage 15 module data storage 1
5 module data storage 1
 

Cyc fundamentals training courses

  • 1. CYC Fundamentals Training Courses & Modules<br />Approximately 15 hours of in class instruction provided to all participants by the CYC Corps Members. Hours per class will vary per site depending upon curriculum chosen, instructor style and students. The modules can be found in the Curriculum project on Basecamp. Each module begins with a slide presentation. Each module may include links to online activities, handouts and/or additional resources.<br />Course – Computer Basics o Module 1A – Mouse Basics o Module 1B – Keyboard Basics <br /> o Module 1C – Basic Hardware (Anatomy of a Computer) o Module 1D – Windows Operating System o Module 1E – Data Storage & File Extensions Internet Basics o Module 2A – How to Use a Browser o Module 2B – Web Based E-mail Course – Online Search and Information Literacy o Module 3A – Search Techniques o Module 3B – Evaluating Online Sources Course – Computer Security o Module 4A – Viruses & Spyware Course – Personal Security o Module 5A – Online Privacy o Module 5B – Online Identity Course – Overview of Common Office Suites o Module 6A – Microsoft Office o Module 6B – Open Office <br />