🚀 Early Adopter Price: $39/mo for lifeClaim Your Price →
Computing Fundamentals
Coming Soon
Expected availability announced soon

This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.

Notify me
ISACA CertificatesAssociateComing Soon

Computing Fundamentals

The Computing Fundamentals Certificate covers the foundational concepts of computer hardware, operating systems, file systems, processes, virtualization, command-line literacy, and basic computing security — at the conceptual depth needed by anyone working in IT, audit, or technology-adjacent business roles.

Who Should Take This

Career-changers, business analysts, junior auditors, and IT support staff who need a working understanding of how computers work. Assumes baseline computer-use literacy. Learners finish able to discuss computing concepts with technical staff and navigate basic command-line tasks.

What's Included in AccelaStudy® AI

Adaptive Knowledge Graph
Practice Questions
Lesson Modules
Console Simulator Labs
Exam Tips & Strategy
13 Activity Formats

Course Outline

1Computer Architecture
3 topics

CPU and Memory

  • Identify the CPU's role and identify common terms: cores, threads, clock speed, cache (L1/L2/L3), instruction sets (x86-64, ARM64).
  • Identify the memory hierarchy: registers → cache → RAM → SSD → HDD → tape, and identify the latency/cost trade-offs.
  • Apply memory-hierarchy reasoning: explain why an application that fits in cache runs much faster than one that constantly hits RAM.

Storage

  • Distinguish HDD, SSD, NVMe, and tape and identify the typical use cases for each.
  • Identify storage-redundancy concepts: RAID levels (0/1/5/6/10), erasure coding, replication.

I/O and Buses

  • Identify common I/O interfaces: PCIe, USB, SATA, Ethernet, Thunderbolt and identify their typical bandwidth profiles.
  • Identify the difference between memory-mapped I/O and port-mapped I/O at a conceptual level.
2Operating Systems
3 topics

Kernel and User Space

  • Identify the kernel as the privileged core of an OS and identify the difference between kernel mode and user mode.
  • Identify common kernel responsibilities: process scheduling, memory management, file system, device drivers, networking stack.

Processes and Threads

  • Distinguish processes (separate address space) from threads (shared address space within a process).
  • Identify common scheduler concepts: time slicing, preemption, priority, niceness/SCHED_OTHER.
  • Apply process-list inspection (ps, Task Manager) to identify resource hogs and orphaned processes.

OS Variants

  • Identify the major OS families (Linux distributions, Windows Server / 11, macOS, BSDs) and identify their typical enterprise roles.
  • Identify cross-platform tooling: WSL, container runtimes, cross-compilers, common shells.
3File Systems and Permissions
3 topics

File-System Layout

  • Identify the Linux Filesystem Hierarchy Standard (FHS): /etc, /var, /home, /usr, /opt, /tmp and identify what each contains.
  • Identify the Windows directory structure: C:\Windows, Program Files, Users, ProgramData and identify what each contains.

Permissions

  • Identify Unix permissions (rwx for owner/group/other) and identify chmod/chown semantics at a conceptual level.
  • Identify Windows ACLs and identify the difference between standard and special permissions.
  • Apply permissions-debugging steps when a script can read but not write a file: check file owner, file mode, parent-directory permissions, and SELinux/AppArmor labels.

File Systems

  • Identify common file systems (ext4, XFS, NTFS, APFS, ZFS, Btrfs) and identify their notable features (journaling, snapshots, compression).
  • Identify file-system journaling as the mechanism that prevents corruption from sudden power loss.
4Command Line
3 topics

Unix Shells

  • Identify the major Unix shells (bash, zsh, fish) and identify common environment variables (PATH, HOME, SHELL).
  • Apply common Unix commands: ls, cd, cp, mv, rm, cat, grep, find, less, head, tail.
  • Apply pipes and redirection: combine commands with |, redirect output with >, append with >>, redirect stderr with 2>.

PowerShell and CMD

  • Identify PowerShell as a structured (object-pipeline) shell and identify the difference from cmd.exe (text-stream).
  • Apply common PowerShell verb-noun cmdlets: Get-Process, Get-Service, Get-EventLog, Set-ExecutionPolicy.

Scripting Basics

  • Identify the role of shell scripting: automation of repeated tasks, glue between commands, system administration.
  • Apply a tiny bash script that backs up a directory: archive with tar, copy to a remote with rsync, log the result.
5Virtualization and Containers
3 topics

Hypervisors

  • Identify Type-1 (bare-metal: ESXi, Hyper-V, KVM) vs Type-2 (hosted: VirtualBox, VMware Workstation) hypervisors and identify their use cases.
  • Identify VM concepts: virtual CPU, virtual NIC, virtual disk, snapshots, live migration.

Containers

  • Distinguish containers from VMs at conceptual depth: shared kernel, image layers, faster startup, lower overhead.
  • Identify container tooling: Docker, Podman, containerd; image registries; Kubernetes as orchestration.
  • Apply container-vs-VM selection for a sample workload: many small short-lived processes (containers) vs full-OS isolation requirement (VMs).

Cloud Compute

  • Identify the spectrum from VMs → containers → serverless and identify the operational responsibility shift at each step.
  • Identify the impact of virtualization on auditability: visibility into guest OS, host vs guest logs, snapshots as forensic artifacts.
6Boot, Firmware, and Computing Security
3 topics

Boot Process

  • Identify the typical boot sequence: power-on → firmware (UEFI/BIOS) → bootloader → kernel → init/systemd → user space.
  • Identify Secure Boot and Measured Boot and identify what each provides for system integrity.

Firmware and Drivers

  • Identify firmware as low-level software stored in non-volatile memory and identify why firmware updates matter (vulnerability patching, hardware feature enablement).
  • Identify driver-signing requirements on modern Windows and macOS and identify the security rationale.

Computing Security Basics

  • Identify foundational computing security: strong passwords + manager, full-disk encryption (FileVault, BitLocker, LUKS), patching, host firewall.
  • Identify common malware vectors and identify host defenses: signed apps, app sandboxing, EDR.
  • Apply baseline laptop hardening for a knowledge worker: disk encryption, automatic updates, MFA on the cloud account, password manager, restricted local admin.
  • Analyze a 'shared family computer' scenario and recommend appropriate separation (per-user accounts, no shared admin, parental-control / guest mode).
7Practical Computing and Operations
6 topics

Backups and Recovery

  • Identify the 3-2-1 backup principle: 3 copies, 2 different media, 1 offsite.
  • Apply 3-2-1 backup design for an individual knowledge worker (laptop) and a small business (file server) and identify the typical implementation.
  • Analyze a 'backup never tested' scenario and identify the failure modes that surface only during a real restoration.

Performance and Diagnostics

  • Identify common performance-diagnostics tools: top/htop, Activity Monitor, Task Manager, Resource Monitor, iostat, vmstat.
  • Apply basic performance triage on a slow system: identify top processes, check disk I/O, check memory pressure (swap), check network bandwidth.
  • Analyze a sustained-high-CPU scenario and trace from process → thread → system call to determine root cause.

Updates and Patch Management

  • Identify the components of a patch-management process: inventory, classification, testing, deployment, validation, exceptions.
  • Apply patch-prioritization for a small fleet: critical CVEs within 72h, high-severity within 30 days, routine quarterly.

Common Computing Workflows

  • Identify common end-user workflows that an IT generalist supports: email, file sharing, printing, VPN access, password reset, MFA enrollment.
  • Apply troubleshooting framing: gather facts, isolate variables, hypothesize, test, document — applied to a 'cannot print' ticket.
  • Analyze a recurring-issue pattern (e.g., 30% of password resets are for the same legacy app) and propose a systemic fix vs continuing to reset.

Computing Career

  • Identify common entry-level computing roles: helpdesk technician, junior sysadmin, junior cloud engineer, IT generalist.
  • Apply career-progression mapping: helpdesk → sysadmin → senior sysadmin or DevOps engineer or SRE; junior cloud → cloud engineer → cloud architect.

Continuous Learning in Computing

  • Identify reliable continuous-learning sources: vendor docs, Hacker News (filtered), r/sysadmin, r/devops, structured certification paths, lab-based home environments.
  • Apply hands-on learning principles: rebuild a service in a home lab, contribute to an open-source project, write a postmortem of a real incident.
  • Analyze a 'overwhelmed by changing technology' scenario and propose a focus strategy: pick a depth area, time-box exploration of new tools, accept that some technologies you will not master.
  • Identify ergonomic and sustainability practices: keyboard/posture awareness, scheduled breaks, on-call sustainability, hardware lifecycle including recycling.

Scope

Included Topics

  • Computer architecture: CPU, memory hierarchy, storage, I/O, buses.
  • Operating systems: kernel, processes, threads, file systems, scheduling.
  • Linux, Windows, and macOS at conceptual depth.
  • File systems: hierarchical layout, permissions, journaling.
  • Command-line literacy: shell, common Unix commands, PowerShell basics.
  • Virtualization: hypervisors, containers, the difference between them.
  • Boot process and firmware (UEFI/BIOS) at conceptual depth.
  • Basic computing security: passwords, MFA, encryption, malware awareness.

Not Covered

  • Detailed kernel internals beyond conceptual depth.
  • Vendor-specific certification depth.

Computing Fundamentals is coming soon

Adaptive learning that maps your knowledge and closes your gaps.

Create Free Account to Be Notified