Google IT Support Professional Certificate

Google IT Support Professional Certificate

Duration: 30hrs

Cost: Free Course and Paid Certification via Coursera

Schedule: Self paced


This is your path to a career in IT. In this program, you’ll learn in-demand skills that will have you job-ready in less than 6 months. No degree or experience required.

About this Professional Certificate

Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job.

There are 400,000 U.S. job openings in IT and a $52,000 median entry-level salary in IT support.¹

Over 5 courses, learn in-demand skills that prepare you for an entry-level job.

Upon completion, you can directly apply for jobs with Google and over 150 U.S. employers, including Walmart, Best Buy, and Astreya.

75% of Google Career Certificate Graduates in the United States report an improvement in their career trajectory (e.g. new job or career, promotion or raise) within 6 months of certificate completion²

This program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.

This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.

If you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.

Access this Course


Google Technical Support Fundamental

Google IT Automation

Learn Computer Networking by google

Learn Operating Systems by Google

Learn System Administration by google

Learn IT security by google

Access this Course

¹US Burning Glass Labor Insight Report salary data (median with 0-5 years experience) and job opening data. Data for job roles relevant to featured programs (4/01/2021 - 3/31/22).

²Based on program graduate survey responses, United States 2021

Course video

This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist.

In this course, you’ll be introduced to the world of Information Technology, or IT.

You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, troubleshooting, and customer service.

This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this certificate program.

By the end of this course, you’ll be able to:

  • understand how the binary system works
  • assemble a computer from scratch
  • choose and install an operating system on a computer
  • understand what the Internet is, how it works, and the impact it has in the modern world
  • learn how applications are created and how they work under the hood of a computer
  • utilize common problem-solving methodologies and soft skills in an Information Technology setting
Course video

This course is designed to provide a full overview of IT automation.

Course video

We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting.

By the end of this course, you’ll be able to:

  • describe computer networks in terms of a five-layer model
  • understand all of the standard protocols involved with TCP/IP communications
  • grasp powerful network troubleshooting tools and techniques
  • learn network services like DNS and DHCP that help make computer networks run
  • understand cloud computing, everything as a service, and cloud storage
Course video

In this course – through a combination of video lectures, demonstrations, and hands-on practice – you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware.

By the end of this course you’ll be able to:

  • navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter
  • set up users, groups, and permissions for account access
  • install, configure, and remove software on the Windows and Linux operating systems
  • configure disk partitions and filesystems
  • understand how system processes work and how to manage them
  • work with system logs and remote connection tools
  • utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role

To earn a certificate or quizzes and supplementary reading please enroll for this course here:

This course will transition you from working on a single computer to an entire fleet.

Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment.

In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running.

We’ll deep dive on cloud so that you’ll understand everything from typical cloud infrastructure setups to how to manage cloud resources.

You’ll also learn how to manage and configure servers and how to use industry tools to manage computers, user information, and user productivity.

Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.

By the end of this course you’ll be able to:

  • utilize best practices for choosing hardware, vendors, and services for your organization
  • understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers
  • understand how to make the most of the cloud for your organization
  • manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP
  • choose and manage the tools that your organization will use
  • backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster
  • utilize systems administration knowledge to plan and improve processes for IT environments

Course Introduction

  • What is Systems Administration?
  • Servers Revisited
  • The Cloud
  • Organizational Policies
  • IT Infrastructure Services
  • User and Hardware Provisioning
  • Routine Maintenance
  • Vendors
  • Troubleshooting and Managing Issues
  • In Case of Fire, Break Glass
  • Dion Michelle Obama Story
  • With Great Power Comes Great Responsibility
  • Never Test in Production
  • Assessing Risk
  • Fixing Things the Right Way

What are IT Infrastructure Services?

  • The Role of IT Infrastructure Services in SysAdmin

  • Types of IT Infrastructure Services

  • How do Qwiklabs Work?

  • Heather First Tech Job

  • Server Operating Systems

  • Virtualization

  • Remote Access Revisited

  • FTP, SFTP, and TFTP

  • NTP

  • Network Support Services Revisited

  • DNS

  • DNS for Web Servers

  • DNS for Internal Networks

  • DHCP

  • Unable to Resolve a Hostname or Domain Name

  • What do Services Look Like in Action

  • Managing Services in Linux

  • Managing Services in Windows

  • Configuring Services in Linux

  • Configuring Services in Windows

  • Configuring DNS with Dnsmasq

  • Configuring DHCP with Dnsmasq

  • Module Introduction

  • Configuring Communication Services

  • Configuring Email Services

  • Configuring User Productivity Services

  • Configuring Security Services

  • Heather Managing Self Doubt

  • What are file services?

  • Network File Storage

  • Mobile Synchronization

  • Configuring Print Services

  • Web Servers Revisited

  • What is a database server?

  • Is the website down?

  • Cloud Concepts

  • Typical Cloud Infrastructure Setups

  • When and How to Choose Cloud

  • Module Introduction

  • What is a directory server?

  • Implementing Directory Services

  • What is centralized management?

  • What is LDAP?

  • What is LDAP Authentication?

  • Heather Overcoming Obstacles

  • What is Active Directory?

  • Managing Active Directory

  • Managing Active Directory Users and Groups

  • Managing Active Directory User Passwords

  • Joining an Active Directory Domain

  • What is Group Policy?

  • Group Policy Creation and Editing

  • Group Policy Inheritance and Precedence

  • Group Policy Troubleshooting

  • Mobile Device Management (MDM)

  • What is OpenLDAP?

  • Managing OpenLDAP

  • Module Introduction

  • What is Data Recovery?

  • Backing Up Your Data

  • Backup Solutions

  • Job transition35s

  • Testing Backups

  • Types of Backup

  • User Backups

  • What’s a Disaster Recovery Plan?

  • Designing a Disaster Recovery Plan

  • What’s a post-mortem?

  • Writing a Post-Mortem

  • Interview Role Play: Sys Admin

  • Final Project Introduction

  • Alex passion & success

  • Congratulations!

Course video

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:

  • how various encryption algorithms and techniques work as well as their benefits and limitations.
  • various authentication systems and types.
  • the difference between authentication and authorization.
  • how to evaluate potential risks and recommend ways to reduce risk.
  • best practices for securing a network.
  • how to help others to grasp security concepts and protect themselves.
Duration 300 hours

Self paced


We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.