Chevron Left
Back to Core 1: Hardware and Network Troubleshooting

Learner Reviews & Feedback for Core 1: Hardware and Network Troubleshooting by IBM

4.6
stars
114 ratings

About the Course

Prepare for a rewarding career in IT with IBM's Core 1: Hardware and Network Troubleshooting course. Gain the necessary skills and knowledge to set up, configure, and troubleshoot devices, networks, and systems in today's fast-paced world. You will gain a solid understanding of hardware and networking concepts, including troubleshooting techniques for laptops, mobile devices, and video and resolution issues. You will also learn to identify and troubleshoot storage and printer issues, configure BIOS settings, and summarize power supply basics. Our comprehensive curriculum covers hardware and network troubleshooting, laptop and printer components and settings, motherboard, and storage components. Whether you're starting your career in IT or seeking to advance in your current role, this course provides the knowledge and skills necessary to succeed in today's tech-driven world. In addition, this course is part of a series of courses designed to help you prepare for CompTIA A+ Certification and lays the foundation for advanced training in Core 1. Join us today on your journey toward becoming a highly sought-after IT professional!...

Top reviews

HK

Nov 12, 2024

Good to get updated with modern up to date hardware info. Lab exercise are useful to think about troubleshooting cases after watched videos.

PT

Aug 21, 2023

Very helpful course to provide a lot of knowledge and practices of basic hardware and network troubleshooting

Filter by:

1 - 25 of 27 Reviews for Core 1: Hardware and Network Troubleshooting

By Patrick F

Dec 30, 2023

A lot of the information seems to be very surface level. As far as the Core 1 exam for CompTIA's A+ certification goes, this is good as a primer but the test itself has some very real technical questions regarding things like port numbers, specifications for cables and other hardware, and identification of physical components which this course does not touch on. Still it can be appropriate for a refresh on some basic concepts but this alone is not suitable for tackling the exam.

By PHUONG V T

Aug 22, 2023

Very helpful course to provide a lot of knowledge and practices of basic hardware and network troubleshooting

By CESAR O

Nov 9, 2024

Loved IT! Straightforward with very precise and concise explanation without cumbersome concepts or material.

By Jason D

Apr 26, 2024

top class study information thank you so much for this opportunity for me to do this course

By Jean D P D J

Dec 17, 2023

Coursera is the Greatest and beyond the greatest......

By Shivansh K

Jul 13, 2023

This is a highly recommended course

By sam b

Nov 30, 2023

thanks

By Joshua C

Jun 9, 2024

This course was fairly helpful, but there was a few typos and some redundant information here and there. Would definitely recommend if you don't want to fork over 700 dollars to CompTIA for their CompTIA A+ exam course.

By Ali H

Aug 22, 2024

. Question 1 What is the primary goal of Footprinting in Ethical Hacking? 1 point To exploit vulnerabilities in the target's system To gain unauthorized access to the system To execute a denial-of-service attack on the target To gather as much information as possible about the target 2. Question 2 Which of the following activities are part of the Footprinting process? 1 point Gathering network and domain name information Conducting phishing attacks Identifying the target Scanning for open ports on the target 3. Question 3 Which of the following information cannot be collected during the Footprinting phase? 1 point The exact vulnerabilities present in the target's system IP addresses of servers in the target's network Names and positions of key employees in the target's organization The target's domain name 4. Question 4 Which of the following is a passive scanning technique? 1 point Sniffing Ping Sweep OS Fingerprinting Port Scanning 5. Question 5 Select the scanning techniques that can be used to determine the operating system of a target system. 1 point OS Fingerprinting UDP Scan ICMP Echo Scanning TCP Connect Scan TCP Null Scan 6. Question 6 Which scanning technique is most likely to go unnoticed by Intrusion Detection Systems (IDS)? 1 point TCP SYN Scan UDP Scan ACK Flag Probe Scan TCP Connect Scan

By William R M

Nov 4, 2024

It is a very good course in explaining technological concepts that may appear in the actual A+ exam. It was both comprehensive and beneficial with the accompanying labs. But unfortunately there is much missing that is actually covered in the actual A+ exam. This is just my own critique but I must also must admit that I found it of much value for me towards my prep work for the exam.

By Yogeesh K M

Nov 8, 2024

Really one of the wonderful course for the beginers with lots of practical hands on. Learn lots of troubleshooting that is basics for a real troubleshooter. Materials is prepared in sach a way even an non IT person can easily understand and learn. Thank you so much

By Hanen H

Sep 2, 2024

التعرف على الاجهزه ومشكلاتها والحل لم يخطر ببالي أن تكون هنالك معلومات دقيقه لهذه الدرجه مثل ماوجدت في هذه الدوره التدريبية... دوره ممتازه وبالتوفيق للجميع❤️

By Hung W K

Nov 13, 2024

Good to get updated with modern up to date hardware info. Lab exercise are useful to think about troubleshooting cases after watched videos.

By Phil C

Oct 23, 2024

Very detailed and I love the quizes for memory retention. Suggest to add more quizes

By ranses s

Apr 29, 2024

VERY GOOD INFO ON THE SUBJECT,LEARN WHAT I WANTED AND DIDN'T GET ME BORED

By Deleted A

Apr 11, 2024

Chiarissimo in ogni sua videolezione

By Saif A

Nov 12, 2024

Very good Modules and Instructor

By Lesly S

Apr 4, 2024

Me parecio excelente el curso!!!

By Israel G

Oct 21, 2024

Good introduction course

By Derek K

Mar 13, 2024

Great information.

By Michael C

Dec 11, 2024

Awesome course!

By OUSSAMA A

Apr 26, 2024

Very useful

By Ales A K

May 16, 2024

Great!

By Ben S

Aug 17, 2024

Good information, but a couple steps (i.e., having the user update adapter drivers) could be beyond the non-technical user's abilities. No mention of using a VNC to provide a secure connection to the inside network. Remote control software (e.g., Remote Desktop Connection, GoToMyPC, Dameware) is often used for remote support, as well.

By Mohammed J

Jun 17, 2024

Informative but lacks images and proper real world explanation , overuse of iconography to explain . Not very good for beginners , If i wasnt into computers i would not understand a thing