CompTIA A+ Core 2 (220-1002)

Video description

26+ Hours of Video Instruction

An updated edition of this video title is available. Please go to CompTIA A+ Core 2 (220-1102)

Overview
CompTIA A+ Core 2 (220-1002) Complete Video Course is a unique video product that provides a solid understanding of A+ skills. The purpose of these videos is to act as quick, concise, hands-on training that is easily absorbed. In this best-selling author and instructor-led course you will get coverage of every objective and topic in the CompTIA A+ Core 2 (220-1002) exam. It is also full of hands-on demos so you can see real hardware and software presentations. David Prowse walks you through the details you need to not only pass the test but troubleshoot and fix real hardware, software, and network problems for your career. The author also includes tech tips throughout to give you insider info on troubleshooting, repair, and maintenance.

This title can be used as your sole resource for learning the material needed to study for and pass the test. You can also use this as a supplement to other A+ training. There are a total of four domains that map to the main objectives of the CompTIA A+ Core 2 (220-1002) exam. These domains contain 33 lessons with video totaling more than 26 hours of hands-on demonstrations, audio instruction, animations, whiteboard training, and video screencasting. He includes hands-on configuration labs; laptop, smartphone, and device hardware labs; and live-action troubleshooting labs.

The 33 video lessons are broken down into four domains and cover the following topics:
  • Operating Systems
  • Security
  • Software Troubleshooting
  • Operational Procedures
About the Instructor
David L. Prowse is an author, a computer specialist, and a technical trainer. He loves computer technology and enjoys sharing with others what he has learned.

Over the past decade, he has authored more than a dozen titles for Pearson, including books such as CompTIA A+ Exam Cram and Security+ Cert Guide, and videos such as the A+ Complete Video Course.

He has more than 20 years of technology experience spanning a variety of roles, and tries to share as much of this experience with his readers (and watchers) as possible.

In addition, he has taught many computer courses including CompTIA A+, Network+, and Security+ to more than 2,000 students, both in the classroom and via the Internet.

He runs a support website for all of his products at https://dprocomputer.com.

Topics include
Domain 1: Operating Systems
Domain 2: Security
Domain 3: Software Troubleshooting
Domain 4: Operational Procedures

Skill Level
Beginner

Learn
  • All of the objectives in the CompTIA A+ Core 2 (220-1002) exam
  • Test-taking techniques with interactive practice quizzes, performance-based simulations, and hands-on exercises
  • How to install the operating system, provide security, and understand the various operational procedures
  • How to troubleshoot common software issues, manage malware attacks, and properly dispose of sensitive data and equipment
  • Real-world skills
Who Should Take This Course
The target audience for CompTIA A+ (Core 2) 220-1002 Complete Video Course are people looking to pass the CompTIA exam as well as those interested in entering the IT field, current computer technicians, help desk technicians, and LAN support specialists. The product focuses heavily on setting up and securing your systems and networks. Practice quizzes will help you practice your skills to see if you’re ready for the exam, while the exercises and simulations will give you the practice you need to succeed in the real world.

Course Requirements
Equipment required:
  • At least two computer systems, preferably one PC and one laptop, each running Windows‚Äìbut hey, the more the better
  • Virtualization software and at least one Linux OS (for example, Ubuntu Linux)
  • At least one smartphone or tablet computer
  • A printer
  • A SOHO wireless router
  • A USB flash drive
  • A basic PC toolkit
  • A basic mobile device toolkit
Domain Descriptions
Domain 1: Operating Systems
Domain 1, “Operating Systems,” makes up 27% of the exam, starting with operating system types including macOS, Windows, Linux, Android, ChromeOS, and iOS. It then digs into Windows and Linux installations, command-line tools, and networking.

Domain 2: Security
Domain 2, “Security,” makes up 24% of the exam and is broken down into 10 lessons, which begin with physical and logical security. It then moves into wireless security protocols and authentication. The various types of malware are discussed along with their prevention, detection, and removal. This domain also covers security best practices for computers, mobile devices, and wireless networks. In the last lessons of this domain, the disposal and destruction of sensitive data is discussed.

Domain 3: Software Troubleshooting
Domain 3, “Software Troubleshooting,” makes up 26% of the exam and covers generalized security issues, with a more in-depth discussion of windows and mobile security issues, as well as the step-by-step methodology for safely removing malware.

Domain 4: Operational Procedures
Domain 4, “Operational Procedures,” comprises 23% of the exam and explains the importance of documentation, professionalism, change management best practices, disaster prevention, safety procedures, and how to address prohibited content. In addition, this domain now includes remote access technology and basic scripting.

About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. CompTIA A+ Core 2 (220-1002): Introduction
  2. Domain 1 Operating Systems
    1. Domain Introduction
  3. Lesson 1 Compare and Contrast Operating Systems
    1. Learning Objectives
    2. 1.1 Types of Workstation Operating Systems
    3. 1.2 32-bit versus 64-bit
    4. 1.3 Smartphone Tablet Operating Systems
    5. 1.4 Vendor-Specific Limitations OS Compatibility
  4. Lesson 2 Windows Versions and Features
    1. Learning Objectives
    2. 2.1 Comparison of Windows Versions and Features
    3. 2.2 Corporate versus Personal Needs
  5. Lesson 3 Operating System Installation
    1. Learning Objectives
    2. 3.1 Boot Methods
    3. 3.2 Types of Installations
    4. 3.3 Partitioning
    5. 3.4 File Systems Formatting
    6. 3.5 Installation Considerations Part 1
    7. 3.6 Installation Considerations Part 2
  6. Lesson 4 Microsoft Command-line Tools
    1. Learning Objectives
    2. 4.1 Introduction to Microsoft Command-Line Tools and Help
    3. 4.2 Command Prompt Basics (using Windows 8.1)
    4. 4.3 File-related Commands Part 1
    5. 4.4 File-related Commands Part 2
    6. 4.5 Disk and File Checking Tools
    7. 4.6 Working with Tasks
    8. 4.7 Command-Line Networking in Windows Part 1 (ipconfig and ping)
    9. 4.8 Command-Line Networking in Windows Part 2
    10. 4.9 DISM
    11. 4.10 Policy-based Commands
    12. 4.11 Additional Command-Line Tools
  7. Lesson 5 Microsoft Operating System Features and Tools
    1. Learning Objectives
    2. 5.1 Administrative Tools Part 1 (Computer Management and the MMC)
    3. 5.2 Administrative Tools Part 2 (Performance Monitor and WMD)
    4. 5.3 Administrative Tools Part 3 (Task Scheduler and Print Management)
    5. 5.4 Administrative Tools Part 4 (Local Users and Groups and Event Viewer)
    6. 5.5 Administrative Tools Part 5 (Windows Firewall and Local Security Policy)
    7. 5.6 Administrative Tools Part 6 (Component Services and Data Sources)
    8. 5.7 System Configuration Utility
    9. 5.8 Task Manager
    10. 5.9 Disk Management
    11. 5.10 System Utilities Part 1
    12. 5.11 System Utilities Part 2
  8. Lesson 6 Windows Control Panel Utilities
    1. Learning Objectives
    2. 6.1 Internet Options
    3. 6.2 Refresh Rates and Frame Rates
    4. 6.3 Resolution
    5. 6.4 Color Depth
    6. 6.5 Aspect Ratio
    7. 6.6 Folder Options
    8. 6.7 System Properties - Windows 8.1
    9. 6.8 Power Options
    10. 6.9 Additional CP Icons Part 1 (Windows 8.1)
    11. 6.10 Additional CP Icons Part 2 ( Windows 10)
  9. Lesson 7 Application Installation and Configuration
    1. Learning Objectives
    2. 7.1 System/OS Requirements for Applications, Install Methods, and Security
  10. Lesson 8 Windows Networking
    1. Learning Objectives
    2. 8.1 Introduction to Windows Networking
    3. 8.2 Types of Windows Networks
    4. 8.3 Sharing and Mapping
    5. 8.4 Administrative and Hidden Shares
    6. 8.5 Establishing Network Connections
    7. 8.6 Alternate IP Address
    8. 8.7 Proxy Settings
    9. 8.8 Remote Control of Windows Systems
    10. 8.9 Firewall Settings
    11. 8.10 Network Card Properties
  11. Lesson 9 Linux and macOS Tools
    1. Learning Objectives
    2. 9.1 Basic Linux Commands Part 1
    3. 9.2 Basic Linux Commands Part 2
    4. 9.3 macOS and Linux Best Practices
  12. Domain 2 Security
    1. Domain Introduction
  13. Lesson 1 Physical Security
    1. Learning Objectives
    2. 1.1 Physical Security
  14. Lesson 2 Logical Security
    1. Learning Objectives
    2. 2.1 Active Directory
    3. 2.2 User Authentication
    4. 2.3 Firewall Security
    5. 2.4 MDM Policies and DLP
    6. 2.5 Certificates and Trust
    7. 2.6 Principle of Least Privilege
  15. Lesson 3 Wireless Security Protocols and Authentication Methods
    1. Learning Objectives
    2. 3.1 Wireless Encryption Protocols
    3. 3.2 Wireless Authentication (Enterprise)
  16. Lesson 4 Malware Prevention, Detection, and Removal
    1. Learning Objectives
    2. 4.1 Malware Part 1: Viruses and Worms
    3. 4.2 Malware Part 2: Trojans, Rootkits, Ransomware, and More
    4. 4.3 Keyloggers
    5. 4.4 Tools and Methods for Defeating Malware
  17. Lesson 5 Social Engineering and Additional Attacks and Threats
    1. Learning Objectives
    2. 5.1 Social Engineering Part 1: Impersonation and Dumpster Diving
    3. 5.2 Social Engineering Part 2: Phishing, Shoulder Surfing, and Tailgating
    4. 5.3 Attacks on Passwords
    5. 5.4 Spoofing and MITM
    6. 5.5 DoS, DDoS, Botnets, and Zero-day Attacks
  18. Lesson 6 Windows Security Settings
    1. Learning Objectives
    2. 6.1 Users and Groups
    3. 6.2 Shared Files and Folders
    4. 6.3 Permissions
    5. 6.4 System Files and Folders Part 1
    6. 6.5 System Files and Folders Part 2
    7. 6.6 BitLocker and EFS
  19. Lesson 7 Workstation Security
    1. Learning Objectives
    2. 7.1 Password Best Practices
    3. 7.2 Account Management
    4. 7.3 Basic Active Directory Functions
    5. 7.4 Disabling AutoPlay/Autorun
  20. Lesson 8 Mobile Device Security
    1. Learning Objectives
    2. 8.1 Screen Locks
    3. 8.2 Best Practices in the Case of Loss or Theft
    4. 8.3 Additional Mobile Device Security
  21. Lesson 9 Data Disposal and Destruction
    1. Learning Objectives
    2. 9.1 Recycling Repurposing Best Practices
    3. 9.2 Physical Destruction
  22. Lesson 10 SOHO Security
    1. Learning Objectives
    2. 10.1 SOHO Wireless Security Part 1
    3. 10.2 SOHO Wireless Security Part 2
  23. Domain 3 Software Troubleshooting
    1. Domain Introduction
  24. Lesson 1 Troubleshoot Microsoft Windows
    1. Learning Objectives
    2. 1.1 Review of the A+ Troubleshooting Process
    3. 1.2 Troubleshooting Windows Operating System Failures Part 1
    4. 1.3 Troubleshooting Windows Operating System Failures Part 2
    5. 1.4 Windows 10 Recovery Environment
    6. 1.5 Windows 8/7 Recovery Environment
    7. 1.6 Service Failures
    8. 1.7 Performance and Application Issues
    9. 1.8 Windows Troubleshooting Utilities Part 1
    10. 1.9 Windows Troubleshooting Utilities Part 2
  25. Lesson 2 Troubleshoot PC Security Issues
    1. Learning Objectives
    2. 2.1 Invalid Certificate Issues
    3. 2.2 Common Symptoms and Potential Culprits
    4. 2.3 Tools Used to Solve Security Problems
  26. Lesson 3 Best Practices for Malware Removal
    1. Learning Objectives
    2. 3.1 Malware Removal Procedure
    3. 3.2 Scenario - Scan For and Quarantine a Virus
  27. Lesson 4 Troubleshoot Mobile OS and Application Issues
    1. Learning Objectives
    2. 4.1 Troubleshooting Android and iOS
    3. 4.2 Common Symptoms and Potential Culprits
    4. 4.3 Tools Used to Solve Mobile Device Issues
  28. Lesson 5 Troubleshoot Mobile OS Security Issues
    1. Learning Objectives
    2. 5.1 Common Symptoms of Mobile OS Security Issues
    3. 5.2 Tools Used to Solve Mobile OS Security Problems
  29. Domain 4 Operational Procedures
    1. Domain Introduction
  30. Lesson 1 Documentation
    1. Learning Objectives
    2. 1.1 Network Documentation
    3. 1.2 Knowledge Bases and Articles
    4. 1.3 Policy Documentation
  31. Lesson 2 Change Management
    1. Learning Objectives
    2. 2.1 Purpose, Scope, and Analysis of Business Process Change
  32. Lesson 3 Disaster Prevention and Recovery
    1. Learning Objectives
    2. 3.1 Power Problems and Protective Devices
    3. 3.2 Backup and Recovery
    4. 3.3 Account Recovery Options
  33. Lesson 4 Safety Procedures
    1. Learning Objectives
    2. 4.1 ESD Prevention
    3. 4.2 Equipment Grounding
    4. 4.3 Toxic Waste Handling
    5. 4.4 Personal Safety
  34. Lesson 5 Environmental Impacts and Controls
    1. Learning Objectives
    2. 5.1 MSDS Documentation
    3. 5.2 Environmental Controls
    4. 5.3 Power Concerns
  35. Lesson 6 Incident Response, Licensing, and Regulated Data
    1. Learning Objectives
    2. 6.1 Incident Response
    3. 6.2 Licensing
    4. 6.3 Regulated Data
  36. Lesson 7 Communication and Professionalism
    1. Learning Objectives
    2. 7.1 Communication Techniques
    3. 7.2 Professionalism
  37. Lesson 8 Basic Scripting
    1. Learning Objectives
    2. 8.1 Introduction to Scripting
    3. 8.2 Scripting in PowerShell
    4. 8.3 Scripting in Bash
  38. Lesson 9 Remote Access Technologies
    1. Learning Objectives
    2. 9.1 RDP
    3. 9.2 Telnet and SSH
  39. Summary
    1. CompTIA A+ Core 2 (220-1002): Summary
  40. Appendixes
    1. Appendix Overview
    2. 1.3 Windows 7 and 8 Upgrade Paths
    3. 2.6 Hands-on Windows 8 Installation Part 1
    4. 2.7 Hands-on Windows 8 Installation Part 2
    5. 4.5 Migration/Upgrade Tools
    6. 6.2 Networking Connections - Windows 8.1
    7. 6.6 Remote Control - Windows 8.1
    8. 6.7 Proxy Settings - Windows 8.1
    9. 6.8 Firewall Settings - Windows 8.1
    10. 8.2 OS X and Linux Tools
    11. 8.3 OS X Features
    12. 17.3 Permissions - Windows 8.1
    13. 15.4 More Computerized Attacks
    14. 15.5 Protecting Systems From Threats
    15. 18.3 Best Practices - Windows 8.1

Product information

  • Title: CompTIA A+ Core 2 (220-1002)
  • Author(s): David L. Prowse
  • Release date: January 2020
  • Publisher(s): Pearson
  • ISBN: 0135305306