
This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
Computing Fundamentals
The Computing Fundamentals Certificate covers the foundational concepts of computer hardware, operating systems, file systems, processes, virtualization, command-line literacy, and basic computing security — at the conceptual depth needed by anyone working in IT, audit, or technology-adjacent business roles.
Who Should Take This
Career-changers, business analysts, junior auditors, and IT support staff who need a working understanding of how computers work. Assumes baseline computer-use literacy. Learners finish able to discuss computing concepts with technical staff and navigate basic command-line tasks.
What's Included in AccelaStudy® AI
Course Outline
1Computer Architecture 3 topics
CPU and Memory
- Identify the CPU's role and identify common terms: cores, threads, clock speed, cache (L1/L2/L3), instruction sets (x86-64, ARM64).
- Identify the memory hierarchy: registers → cache → RAM → SSD → HDD → tape, and identify the latency/cost trade-offs.
- Apply memory-hierarchy reasoning: explain why an application that fits in cache runs much faster than one that constantly hits RAM.
Storage
- Distinguish HDD, SSD, NVMe, and tape and identify the typical use cases for each.
- Identify storage-redundancy concepts: RAID levels (0/1/5/6/10), erasure coding, replication.
I/O and Buses
- Identify common I/O interfaces: PCIe, USB, SATA, Ethernet, Thunderbolt and identify their typical bandwidth profiles.
- Identify the difference between memory-mapped I/O and port-mapped I/O at a conceptual level.
2Operating Systems 3 topics
Kernel and User Space
- Identify the kernel as the privileged core of an OS and identify the difference between kernel mode and user mode.
- Identify common kernel responsibilities: process scheduling, memory management, file system, device drivers, networking stack.
Processes and Threads
- Distinguish processes (separate address space) from threads (shared address space within a process).
- Identify common scheduler concepts: time slicing, preemption, priority, niceness/SCHED_OTHER.
- Apply process-list inspection (ps, Task Manager) to identify resource hogs and orphaned processes.
OS Variants
- Identify the major OS families (Linux distributions, Windows Server / 11, macOS, BSDs) and identify their typical enterprise roles.
- Identify cross-platform tooling: WSL, container runtimes, cross-compilers, common shells.
3File Systems and Permissions 3 topics
File-System Layout
- Identify the Linux Filesystem Hierarchy Standard (FHS): /etc, /var, /home, /usr, /opt, /tmp and identify what each contains.
- Identify the Windows directory structure: C:\Windows, Program Files, Users, ProgramData and identify what each contains.
Permissions
- Identify Unix permissions (rwx for owner/group/other) and identify chmod/chown semantics at a conceptual level.
- Identify Windows ACLs and identify the difference between standard and special permissions.
- Apply permissions-debugging steps when a script can read but not write a file: check file owner, file mode, parent-directory permissions, and SELinux/AppArmor labels.
File Systems
- Identify common file systems (ext4, XFS, NTFS, APFS, ZFS, Btrfs) and identify their notable features (journaling, snapshots, compression).
- Identify file-system journaling as the mechanism that prevents corruption from sudden power loss.
4Command Line 3 topics
Unix Shells
- Identify the major Unix shells (bash, zsh, fish) and identify common environment variables (PATH, HOME, SHELL).
- Apply common Unix commands: ls, cd, cp, mv, rm, cat, grep, find, less, head, tail.
- Apply pipes and redirection: combine commands with |, redirect output with >, append with >>, redirect stderr with 2>.
PowerShell and CMD
- Identify PowerShell as a structured (object-pipeline) shell and identify the difference from cmd.exe (text-stream).
- Apply common PowerShell verb-noun cmdlets: Get-Process, Get-Service, Get-EventLog, Set-ExecutionPolicy.
Scripting Basics
- Identify the role of shell scripting: automation of repeated tasks, glue between commands, system administration.
- Apply a tiny bash script that backs up a directory: archive with tar, copy to a remote with rsync, log the result.
5Virtualization and Containers 3 topics
Hypervisors
- Identify Type-1 (bare-metal: ESXi, Hyper-V, KVM) vs Type-2 (hosted: VirtualBox, VMware Workstation) hypervisors and identify their use cases.
- Identify VM concepts: virtual CPU, virtual NIC, virtual disk, snapshots, live migration.
Containers
- Distinguish containers from VMs at conceptual depth: shared kernel, image layers, faster startup, lower overhead.
- Identify container tooling: Docker, Podman, containerd; image registries; Kubernetes as orchestration.
- Apply container-vs-VM selection for a sample workload: many small short-lived processes (containers) vs full-OS isolation requirement (VMs).
Cloud Compute
- Identify the spectrum from VMs → containers → serverless and identify the operational responsibility shift at each step.
- Identify the impact of virtualization on auditability: visibility into guest OS, host vs guest logs, snapshots as forensic artifacts.
6Boot, Firmware, and Computing Security 3 topics
Boot Process
- Identify the typical boot sequence: power-on → firmware (UEFI/BIOS) → bootloader → kernel → init/systemd → user space.
- Identify Secure Boot and Measured Boot and identify what each provides for system integrity.
Firmware and Drivers
- Identify firmware as low-level software stored in non-volatile memory and identify why firmware updates matter (vulnerability patching, hardware feature enablement).
- Identify driver-signing requirements on modern Windows and macOS and identify the security rationale.
Computing Security Basics
- Identify foundational computing security: strong passwords + manager, full-disk encryption (FileVault, BitLocker, LUKS), patching, host firewall.
- Identify common malware vectors and identify host defenses: signed apps, app sandboxing, EDR.
- Apply baseline laptop hardening for a knowledge worker: disk encryption, automatic updates, MFA on the cloud account, password manager, restricted local admin.
- Analyze a 'shared family computer' scenario and recommend appropriate separation (per-user accounts, no shared admin, parental-control / guest mode).
7Practical Computing and Operations 6 topics
Backups and Recovery
- Identify the 3-2-1 backup principle: 3 copies, 2 different media, 1 offsite.
- Apply 3-2-1 backup design for an individual knowledge worker (laptop) and a small business (file server) and identify the typical implementation.
- Analyze a 'backup never tested' scenario and identify the failure modes that surface only during a real restoration.
Performance and Diagnostics
- Identify common performance-diagnostics tools: top/htop, Activity Monitor, Task Manager, Resource Monitor, iostat, vmstat.
- Apply basic performance triage on a slow system: identify top processes, check disk I/O, check memory pressure (swap), check network bandwidth.
- Analyze a sustained-high-CPU scenario and trace from process → thread → system call to determine root cause.
Updates and Patch Management
- Identify the components of a patch-management process: inventory, classification, testing, deployment, validation, exceptions.
- Apply patch-prioritization for a small fleet: critical CVEs within 72h, high-severity within 30 days, routine quarterly.
Common Computing Workflows
- Identify common end-user workflows that an IT generalist supports: email, file sharing, printing, VPN access, password reset, MFA enrollment.
- Apply troubleshooting framing: gather facts, isolate variables, hypothesize, test, document — applied to a 'cannot print' ticket.
- Analyze a recurring-issue pattern (e.g., 30% of password resets are for the same legacy app) and propose a systemic fix vs continuing to reset.
Computing Career
- Identify common entry-level computing roles: helpdesk technician, junior sysadmin, junior cloud engineer, IT generalist.
- Apply career-progression mapping: helpdesk → sysadmin → senior sysadmin or DevOps engineer or SRE; junior cloud → cloud engineer → cloud architect.
Continuous Learning in Computing
- Identify reliable continuous-learning sources: vendor docs, Hacker News (filtered), r/sysadmin, r/devops, structured certification paths, lab-based home environments.
- Apply hands-on learning principles: rebuild a service in a home lab, contribute to an open-source project, write a postmortem of a real incident.
- Analyze a 'overwhelmed by changing technology' scenario and propose a focus strategy: pick a depth area, time-box exploration of new tools, accept that some technologies you will not master.
- Identify ergonomic and sustainability practices: keyboard/posture awareness, scheduled breaks, on-call sustainability, hardware lifecycle including recycling.
Scope
Included Topics
- Computer architecture: CPU, memory hierarchy, storage, I/O, buses.
- Operating systems: kernel, processes, threads, file systems, scheduling.
- Linux, Windows, and macOS at conceptual depth.
- File systems: hierarchical layout, permissions, journaling.
- Command-line literacy: shell, common Unix commands, PowerShell basics.
- Virtualization: hypervisors, containers, the difference between them.
- Boot process and firmware (UEFI/BIOS) at conceptual depth.
- Basic computing security: passwords, MFA, encryption, malware awareness.
Not Covered
- Detailed kernel internals beyond conceptual depth.
- Vendor-specific certification depth.
Computing Fundamentals is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified