Section 1 : Introduction
|
Lecture 1 | About Certification | |
|
Lecture 2 | 0102 How To Use This Course | |
|
Lecture 3 | Working Files - Download These First |
Section 2 : Review
|
Lecture 1 | 0201 Installing OS X Mavericks | 00:05:12 Duration |
|
Lecture 2 | Installing OS X Yosemite For OS X V10.10 | 00:04:11 Duration |
|
Lecture 3 | Navigating The Desktop - Part 1 Menubar | 00:04:12 Duration |
|
Lecture 4 | Navigating The Desktop - Part 2 Finder Windows | 00:07:39 Duration |
|
Lecture 5 | Navigating The Desktop - Part 3 Dock | 00:05:54 Duration |
|
Lecture 6 | Navigating The Desktop - Part 1 Menubar For OS X V | 00:04:32 Duration |
|
Lecture 7 | Navigating The Desktop - Part 2 Finder Windows For | 00:08:37 Duration |
|
Lecture 8 | Navigating The Desktop - Part 3 Dock For OS X V10 | 00:08:33 Duration |
|
Lecture 9 | Controlling The Desktop | 00:07:45 Duration |
|
Lecture 10 | Configuring The Desktop | 00:07:52 Duration |
|
Lecture 11 | Configuring The Desktop For OS X V10.10 | 00:10:32 Duration |
|
Lecture 12 | Getting System Information | 00:06:54 Duration |
|
Lecture 13 | Getting System Information For OS X V10.10 | 00:06:31 Duration |
Section 3 : Exploring The Native Mac OS X File System
|
Lecture 1 | Introduction To Disk Utility App | 00:07:53 Duration |
|
Lecture 2 | File System Locations At The Top Level Of The Star | |
|
Lecture 3 | Home Folder Organization And Template | 00:07:24 Duration |
|
Lecture 4 | Understanding Multiple Libraries | 00:04:58 Duration |
Section 4 : File System Permissions And Metadata
|
Lecture 1 | Introduction To Permissions And Ownership_1 | 00:08:21 Duration |
|
Lecture 2 | The Lock Permission Copy | 00:04:27 Duration |
|
Lecture 3 | Examining Ownership On External Volumes | 00:03:28 Duration |
|
Lecture 4 | Aliases | 00:07:49 Duration |
|
Lecture 5 | File System Metadata | 00:04:31 Duration |
Section 5 : Exploring The Command Line Interface
|
Lecture 1 | Introduction To The Terminal App | 00:06:30 Duration |
|
Lecture 2 | Navigating In The File System | |
|
Lecture 3 | Manipulating Files | 00:07:20 Duration |
|
Lecture 4 | Inspecting And Editing Files | 00:07:45 Duration |
|
Lecture 5 | Using Change Commands | 00:07:45 Duration |
|
Lecture 6 | Links | 00:05:44 Duration |
|
Lecture 7 | 0507 Examining File And Folder Metadata | 00:04:27 Duration |
|
Lecture 8 | Examining File And Folder Metadata For OS X V10.10 | 00:08:18 Duration |
|
Lecture 9 | Using Special Characters In The Command Line | 00:05:45 Duration |
|
Lecture 10 | sing Sudo With Care | 00:04:31 Duration |
|
Lecture 11 | Commands Unique To Apple | 00:07:14 Duration |
|
Lecture 12 | Introduction To Diskutil | 00:07:09 Duration |
|
Lecture 13 | Introduction To System Profiler_1 | 00:05:33 Duration |
Section 6 : Updating, Installing And Managing Software
|
Lecture 1 | Apple Software Updates | 00:06:48 Duration |
|
Lecture 2 | Installing And Removing Software From The App Stor | 00:04:06 Duration |
|
Lecture 3 | Installing Package And Drag And Drop Software | 00:03:29 Duration |
|
Lecture 4 | Examining Software Installation List | 00:05:05 Duration |
|
Lecture 5 | Examining Package Receipts | 00:04:04 Duration |
Section 7 : Reliability
|
Lecture 1 | 0701 Creating A Mirrored RAID Set | 00:05:51 Duration |
|
Lecture 2 | Managing A RAID Set | 00:03:04 Duration |
|
Lecture 3 | Creating An External Recovery Volume | 00:03:46 Duration |
|
Lecture 4 | Archiving Data With Disk Utility | 00:05:00 Duration |
|
Lecture 5 | Archiving Data With Archive Utility | 00:04:44 Duration |
|
Lecture 6 | Archiving Data With Tar In The Command Line | 00:03:52 Duration |
|
Lecture 7 | Configuring Time Machine | 00:03:49 Duration |
|
Lecture 8 | Managing Time Machine | 00:05:08 Duration |
|
Lecture 9 | Managing Time Machine For OS X V10.10 | 00:10:44 Duration |
Section 8 : Data Security
|
Lecture 1 | Encrypting A Disk Volume | |
|
Lecture 2 | Configuring Filevault2 | 00:06:07 Duration |
|
Lecture 3 | Configuring FileVault2 For OS X V10.10 | 00:08:34 Duration |
Section 9 : Data Removal
|
Lecture 1 | Emptying Trash Securely | 00:04:11 Duration |
|
Lecture 2 | Erasing Files Securely With Command Line Tools | 00:03:10 Duration |
|
Lecture 3 | Erasing A Disk Volume Securely With Disk Utility | 00:02:43 Duration |
|
Lecture 4 | Erasing A Disk Volume Securely In The Command Line | 00:04:30 Duration |
|
Lecture 5 | Erasing Free Space Securely With Disk Utility | 00:02:59 Duration |
|
Lecture 6 | Erasing Free Space Securely In The Command Line | 00:03:04 Duration |
Section 10 : Protecting Mac OS X With Passwords
|
Lecture 1 | Generating Strong Passwords With Password Assistan | 00:05:23 Duration |
|
Lecture 2 | Generating Strong Passwords With Password Assistan | 00:07:47 Duration |
|
Lecture 3 | Exploring The Keychain With Keychain Utility | 00:07:21 Duration |
|
Lecture 4 | Keychain And Password Troubleshooting | 00:06:44 Duration |
|
Lecture 5 | Managing The Keychain With The Security Command | 00:04:52 Duration |
Section 11 : Account Security And Management
|
Lecture 1 | Creating Accounts | 00:04:29 Duration |
|
Lecture 2 | Creating Accounts For OS X V10.10 | 00:06:19 Duration |
|
Lecture 3 | Deleting Accounts | 00:03:28 Duration |
|
Lecture 4 | Examining Account Attributes In System Preferences | 00:04:27 Duration |
|
Lecture 5 | Examining Account Attributes In System Preferences | 00:08:36 Duration |
|
Lecture 6 | Examining Account Attributes With Decl And Directo | 00:07:58 Duration |
|
Lecture 7 | Restricting Accounts With Parental Controls | 00:03:14 Duration |
|
Lecture 8 | Exploring The System Administrator Account - Root | 00:03:29 Duration |
|
Lecture 9 | Exploring The Privilege To Use Sudo Command | 00:04:15 Duration |
|
Lecture 10 | Creating A Hidden Administrator | 00:07:47 Duration |
|
Lecture 11 | Examining The Guest Account | 00:04:39 Duration |
Section 12 : Network Communication Security
|
Lecture 1 | Verifying Certificates | 00:05:50 Duration |
|
Lecture 2 | Verifying Certificates For OS X V10.10 | 00:08:35 Duration |
|
Lecture 3 | Creating A Personal Email Certificate And Send A S | 00:05:30 Duration |
|
Lecture 4 | Accepting A Certificate On A Signed Message And En | 00:04:58 Duration |
|
Lecture 5 | Configuring A VPN Connection | 00:06:47 Duration |
|
Lecture 6 | Exploring Airdrop | 00:03:31 Duration |
|
Lecture 7 | Exploring Airdrop For OS X V10.10 | 00:04:18 Duration |
Section 13 : Sharing Services
|
Lecture 1 | Exploring Screen Sharing | 00:05:56 Duration |
|
Lecture 2 | Exploring File Sharing | 00:06:52 Duration |
|
Lecture 3 | Exploring Remote Login - SSH | 00:06:37 Duration |
|
Lecture 4 | Generating Keys For Secure Remote Login | 00:07:24 Duration |
|
Lecture 5 | Secure Copy - SCP | 00:05:30 Duration |
Section 14 : Solving Problems
|
Lecture 1 | Managing Processes With Activity Monitor App | 00:07:43 Duration |
|
Lecture 2 | Force Quitting Applications | 00:03:42 Duration |
|
Lecture 3 | Managing Processes With PS And Top | 00:03:53 Duration |
|
Lecture 4 | Kill Or Signal Processes | 00:04:26 Duration |
|
Lecture 5 | Examining Log Files With Console App | 00:07:10 Duration |
|
Lecture 6 | Examining Log Files With Tail, Logger And Syslog | 00:06:14 Duration |
|
Lecture 7 | Examining Preferences For Application Problems | 00:05:36 Duration |
|
Lecture 8 | Examining Launch Items For System Problems | 00:09:46 Duration |
|
Lecture 9 | Using Network Utility For Network Problems | 00:07:49 Duration |
|
Lecture 10 | Using Wireless Diagnostics For Wireless Problems | 00:04:23 Duration |
Section 15 : Automation
|
Lecture 1 | Working With Automator | 00:05:20 Duration |
|
Lecture 2 | Editing A Javascript For OS X V10.10 | 00:05:21 Duration |
|
Lecture 3 | Editing An AppleScript | 00:05:11 Duration |
|
Lecture 4 | Exploring Shell Scripts | 00:05:09 Duration |
|
Lecture 5 | Managing System Messages | 00:06:43 Duration |
|
Lecture 6 | Creating A Project | 00:07:23 Duration |
Section 16 : Conclusion
|
Lecture 1 | Finding More Information | 00:02:27 Duration |