Skip to content



Aa
A+
A++

Craigs-Classroom

Craigs-Classroom

  • EPAExpand
    • EPA REVISION SUPER GUIDE
    • EPA REVISION SUPER GUIDE
    • EPA REVISION SUPER GUIDE
    • EPA REVISION SUPER GUIDE
    • Acronyms
    • CyberExpand
      • Intro 2 Cyber
  • ModulesExpand
    • 01 – Cyber Security ConceptsExpand
      • 01 – Cyber Security Concepts
      • 02 – Cyber Security ConceptsExpand
        • Why Cyber Security Matters
        • The Impact
    • 02 – A – Professional BodiesExpand
      • FrameworksExpand
        • NIST
        • ISO 27001
        • PCI-DSS
        • Wassenaar Arrangement
    • 02 – Laws Regulations and StandardsExpand
      • Guide for Learners on the Public Interest Disclosure Act 1998
      • General Data Protection Regulation
      • Legal
      • Computer Misuse Act
      • Data Protection Act
      • RIPA
      • The Official Secrets Act
      • Freedom of Information Act
    • 03 – Programming, Scripting and AI
    • 04 – Networking Part 01Expand
      • Networking
      • Number SystemsExpand
        • BinaryExpand
          • Binary and Decimal Conversion
        • Hexa-Decimal
      • Inter-Connected Devices
      • Hubs
      • SwitchExpand
        • MAC
      • RouterExpand
        • IPv4
        • IPv6
      • TopologiesExpand
        • LAN – TopologyExpand
          • BUS
          • Star Topology
          • Tree Topology
          • Ring Topology
          • Partial Mesh Topology
          • Mesh
      • OSIExpand
        • OSI Model
        • OSI Model Layers
        • PortsExpand
          • Ports and Protocols
          • Protocols
          • BGP
      • TCP/IPExpand
        • TCP IP Model
        • TCP/IP Model Ports and Protocols GameExpand
          • TCP/IP OSI Match
        • TCP/IP Model Game
    • 05 – A – Networking Part 02
    • 06 – CryptographyExpand
      • Cryptography
      • Employment of Cryptography
      • Symmetric CryptographyExpand
        • Asymmetric
        • Diffie-Hellman
        • Hashing
        • Generate Prime Numbers, Shared Generator, Private Keys, and Public Keys
        • RSA
        • SHA 256
    • Study Guide: Understanding Cryptography in Cyber SecurityExpand
      • Section 1: Common Cryptography Techniques in UseExpand
        • Part 1: Symmetric Encryption
        • Part 2: Asymmetric Encryption
        • Part 3: Hash Functions
        • Part 4: Digital Signatures
        • Part 5: Cryptography Protocols
      • Section 2: Terminology and Concepts of CryptographyExpand
        • Part 1: Basic Terminology
        • Part 2: Cryptography Protocols
        • Part 3: Mathematical Foundations of Cryptography
        • Part 4: The Importance of Key Management in Cryptography
      • Section 3: The Importance of Effective Cryptography Key ManagementExpand
        • Part 1: Key Lifecycle Management
        • Part 2: Key Storage and Protection
        • Part 3: Cryptography Key Distribution
    • 07 – Attack Techniques and Cyber Security Threats
    • 08 – Risk Assessment
    • 09 – Security Management Systems
    • 10 – Security Architectures
    • 11 – Horizon Scanning and AI in Cyber Security
    • 12 – Incident Response and Service Management
    • 13 – Security Objectives and EPA Readiness
Craigs-Classroom
Craigs-Classroom
  • Home
  • All Courses

Introduction to Computers

Curriculum

  • 3 Sections
  • 42 Lessons
  • 52 Weeks
Expand all sectionsCollapse all sections
  • Section 01 - Computer Hardware
    14
    • 1.0
      Lesson 01 – Introduction to Computing
    • 1.1
      Monitor
    • 1.2
      Keyboard
    • 1.3
      Mouse
    • 1.4
      Speakers
    • 1.5
      Microphone / Headset
    • 1.6
      Central Processing Unit – CPU
    • 1.7
      Motherboard
    • 1.8
      Random Access Memory
    • 1.9
      Hard Drives
    • 1.10
      Solid State Drives
    • 1.11
      NvMe and M.2
    • 1.12
      Graphics Cards
    • 1.13
      Power Supply Unit (PSU)
  • Section 02 - Operating Systems Basics (Windows, MacOS, Linux) for Beginners
    5
    • 2.0
      Windows
    • 2.1
      Windows 10
    • 2.2
      Windows 11
    • 2.3
      MacOS
    • 2.4
      Linux
  • Section 03 - Internet, Email, and Office Applications for Beginners
    23
    • 3.1
      What is the Internet
    • 3.2
      Online Safety
    • 3.3
      Firewalls
    • 3.4
      Anti-Virus
    • 3.5
      All in one Security
    • 3.6
      Windows Defender
    • 3.7
      Browsers
    • 3.8
      Microsoft Edge
    • 3.9
      Google Chrome
    • 3.10
      Firefox
    • 3.11
      Email
    • 3.12
      Getting an email account
    • 3.13
      setting up my email client
    • 3.14
      Web based email
    • 3.15
      Microsoft Office
    • 3.16
      Word
    • 3.17
      Excel
    • 3.18
      PowerPoint
    • 3.19
      Office Alternatives
    • 3.20
      Google Docs
    • 3.21
      Open Office
    • 3.22
      Libre Office
    • 3.23
      WPS Office
This content is protected, please login and enroll in the course to view this content!
All in one Security
Prev
Browsers
Next

© 2026 Craigs-Classroom - WordPress Theme by Kadence WP

  • EPA
    • EPA REVISION SUPER GUIDE
    • EPA REVISION SUPER GUIDE
    • EPA REVISION SUPER GUIDE
    • EPA REVISION SUPER GUIDE
    • Acronyms
    • Cyber
      • Intro 2 Cyber
  • Modules
    • 01 – Cyber Security Concepts
      • 01 – Cyber Security Concepts
      • 02 – Cyber Security Concepts
        • Why Cyber Security Matters
        • The Impact
    • 02 – A – Professional Bodies
      • Frameworks
        • NIST
        • ISO 27001
        • PCI-DSS
        • Wassenaar Arrangement
    • 02 – Laws Regulations and Standards
      • Guide for Learners on the Public Interest Disclosure Act 1998
      • General Data Protection Regulation
      • Legal
      • Computer Misuse Act
      • Data Protection Act
      • RIPA
      • The Official Secrets Act
      • Freedom of Information Act
    • 03 – Programming, Scripting and AI
    • 04 – Networking Part 01
      • Networking
      • Number Systems
        • Binary
          • Binary and Decimal Conversion
        • Hexa-Decimal
      • Inter-Connected Devices
      • Hubs
      • Switch
        • MAC
      • Router
        • IPv4
        • IPv6
      • Topologies
        • LAN – Topology
          • BUS
          • Star Topology
          • Tree Topology
          • Ring Topology
          • Partial Mesh Topology
          • Mesh
      • OSI
        • OSI Model
        • OSI Model Layers
        • Ports
          • Ports and Protocols
          • Protocols
          • BGP
      • TCP/IP
        • TCP IP Model
        • TCP/IP Model Ports and Protocols Game
          • TCP/IP OSI Match
        • TCP/IP Model Game
    • 05 – A – Networking Part 02
    • 06 – Cryptography
      • Cryptography
      • Employment of Cryptography
      • Symmetric Cryptography
        • Asymmetric
        • Diffie-Hellman
        • Hashing
        • Generate Prime Numbers, Shared Generator, Private Keys, and Public Keys
        • RSA
        • SHA 256
    • Study Guide: Understanding Cryptography in Cyber Security
      • Section 1: Common Cryptography Techniques in Use
        • Part 1: Symmetric Encryption
        • Part 2: Asymmetric Encryption
        • Part 3: Hash Functions
        • Part 4: Digital Signatures
        • Part 5: Cryptography Protocols
      • Section 2: Terminology and Concepts of Cryptography
        • Part 1: Basic Terminology
        • Part 2: Cryptography Protocols
        • Part 3: Mathematical Foundations of Cryptography
        • Part 4: The Importance of Key Management in Cryptography
      • Section 3: The Importance of Effective Cryptography Key Management
        • Part 1: Key Lifecycle Management
        • Part 2: Key Storage and Protection
        • Part 3: Cryptography Key Distribution
    • 07 – Attack Techniques and Cyber Security Threats
    • 08 – Risk Assessment
    • 09 – Security Management Systems
    • 10 – Security Architectures
    • 11 – Horizon Scanning and AI in Cyber Security
    • 12 – Incident Response and Service Management
    • 13 – Security Objectives and EPA Readiness

Modal title

Main Content