CompTIA A+ Core 2 (220-1102)

Video description

30+ Hours of Video Instruction

More than 30 hours of video instruction covering all topics in the CompTIA A+ Core 2 (220-1102) exam.

Overview

CompTIA A+ Core 2 (220-1102) Complete Video Course (Video Training) features 30 hours of video training that serves as your complete resource to get exam ready for the updated CompTIA A+ Core 2 (220-1102) exam. The course provides deep dive training on learning IT hardware and software from the ground up with labs throughout. Experienced trainer David L. Prowse provides hands-on demos so you can see real hardware and software presentations. Prowse goes beyond covering all the exam objectives and teaches how to troubleshoot and fix real hardware, software, and network problems. The course includes tech tips throughout, giving you insider info on troubleshooting, repair, and maintenance.

CompTIA A+ Core 2 (220-1102) Complete Video Course (Video Training) can be used as the sole study resource to gain a solid understanding of A+ skills. It contains 35 lessons covering all CompTIA A+ Core 2 (220-1102) exam domains: operating systems, security, software troubleshooting, and operational procedures.

In this accessible self-paced video training, best-selling author David L. Prowse gives you the real-world training you need through

  • Hands-on demonstrations, audio instruction, animations, whiteboard training, and video screen casting
  • Hands-on training on real operating systems including Windows and Linux

Topics include

  • Module 1: Operating Systems
  • Module 2: Security
  • Module 3: Software Troubleshooting
  • Module 4: Operational Procedures

About the Instructor

David L. Prowse is an author, technical trainer, and technology problem solver. His titles for Pearson include previous editions of the CompTIA A+ Exam Cram, CompTIA A+ Complete Video Course, and CompTIA A+ Practice Questions. He supports his products and answers questions at his website: https://dprocomputer.com.

Skill Level

Intermediate to Advanced

Learn How To

  • Install, configure, and maintain computer equipment, mobile devices, and software for end users
  • Properly and safely diagnose, resolve, and document common software issues
  • Apply troubleshooting skills and provide customer support using appropriate communication skills
  • Operate computer systems, computer security, and operational procedures
  • Apply basic coding skills with PowerShell and Bash

Who Should Take This Course

  • Anyone looking to pass the CompTIA exam
  • Anyone interested in entering the IT field
  • Current computer technicians, help desk technicians, and tech support specialists

About Pearson Video Training

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. CompTIA A+ Core 2 (220-1102): Introduction
  2. Module 1: Operating Systems
    1. Module introduction
  3. Lesson 1: Compare and Contrast Operating Systems
    1. Learning objectives
    2. 1.1 Types of Workstation Operating Systems
    3. 1.2 32-bit versus 64-bit
    4. 1.3 Smartphone Tablet Operating Systems
    5. 1.4 Vendor Life-Cycle Limitations
  4. Lesson 2: Windows Versions and Features
    1. Learning objectives
    2. 2.1 Comparison of Windows Versions and Features
    3. 2.2 Corporate versus Personal Needs
    4. 2.3 Application Requirements and Install Methods
  5. Lesson 3: Operating System Installation
    1. Learning objectives
    2. 3.1 Installation Methods
    3. 3.2 Types of Installations
    4. 3.3 Install/Upgrade Considerations
    5. 3.4 Partitioning
    6. 3.5 File Systems Formatting
  6. Lesson 4: Microsoft Command-line Tools
    1. Learning objectives
    2. 4.1 Introduction to Microsoft Command-Line Tools and Help
    3. 4.2 Challenge #4: Access Microsoft Command-line Tools
    4. 4.3 File-related Commands Part 1
    5. 4.4 File-related Commands Part 2
    6. 4.5 Disk and File Checking Tools
    7. 4.6 Working with Tasks
    8. 4.7 Command-Line Networking in Windows Part 1 (ipconfig and ping)
    9. 4.8 Command-Line Networking in Windows Part 2
    10. 4.9 Winver, Hostname, and Pathping
    11. 4.10 Policy-based Commands
    12. 4.11 Additional Command-Line Tools
  7. Lesson 5: Microsoft Operating System Features and Tools
    1. Learning objectives
    2. 5.1 Administrative Tools Part 1 (Computer Management and the MMC)
    3. 5.2 Administrative Tools Part 2 (Performance Monitor and WMD)
    4. 5.3 Administrative Tools Part 3 (Task Scheduler and Print Management)
    5. 5.4 Administrative Tools Part 4 (Local Users and Groups and Event Viewer)
    6. 5.5 Administrative Tools Part 5 (Windows Firewall and Local Security Policy)
    7. 5.6 Additional Windows Tools
    8. 5.7 System Configuration Utility
    9. 5.8 Task Manager
    10. 5.9 Disk Management
  8. Lesson 6: Windows Control Panel Utilities
    1. Learning objectives
    2. 6.1 Internet Options
    3. 6.2 Display Resolution
    4. 6.3 Folder/File Explorer Options
    5. 6.4 System Properties
    6. 6.5 Power Options
    7. 6.6 Additional CP Icons (Part 1 - Windows 10)
    8. 6.7 Additional CP Icons (Part 2 - Windows 11)
  9. Lesson 7: Windows Settings
    1. Learning objectives
    2. 7.1 How to Access Windows Settings
    3. 7.2 Time Language
    4. 7.3 Update Security
    5. 7.4 Personalization and Apps
    6. 7.5 Privacy
    7. 7.6 System: Video, Power, Storage, and Remote Desktop
    8. 7.7 System: About and System Properties
    9. 7.8 Virtual Memory
    10. 7.9 Devices
    11. 7.10 Network Internet
    12. 7.11 Accounts
  10. Lesson 8: Windows Networking
    1. Learning objectives
    2. 8.1 Introduction to Windows Networking
    3. 8.2 Static Vs. Dynamic IP
    4. 8.3 Workgroup Vs. Domain
    5. 8.4 Sharing and Mapping
    6. 8.5 Administrative and Hidden Shares
    7. 8.6 Establishing Network Connections
    8. 8.7 Proxy Settings
    9. 8.8 Remote Control of Windows Systems
    10. 8.9 Firewall Settings
  11. Lesson 9: macOS
    1. Learning objectives
    2. 9.1 Apple ID
    3. 9.2 macOS Tools and Best Practices
    4. 9.3 Apple File Types for Applications
  12. Lesson 10: Linux 101
    1. Learning objectives
    2. 10.1 Introduction to Linux
    3. 10.2 The Terminal
    4. 10.3 Basic Linux Commands and Help System
    5. 10.4 Working with Directories and Files Part 1
    6. 10.5 Working with Directories and Files Part 2
    7. 10.6 Administrative Access in Linux
    8. 10.7 Linux Analysis
    9. 10.8 Using Text Editors
    10. 10.9 Linux Networking
    11. 10.10 Linux Best Practices
    12. 10.11 Challenge #5: Use Linux Tools
  13. Module 2: Security
    1. Module introduction
  14. Lesson 11: Physical Logical Security
    1. Learning objectives
    2. 11.1 Physical Security
    3. 11.2 Active Directory
    4. 11.3 User Authentication
    5. 11.4 Firewall Security
    6. 11.5 MDM Policies and DLP
    7. 11.6 Certificates and Trust
    8. 11.7 Principle of Least Privilege
    9. 11.8 Hard vs. Soft Tokens
    10. 11.9 Authenticator Apps and SMS Security
  15. Lesson 12: Wireless Security Protocols and Authentication Methods
    1. Learning objectives
    2. 12.1 Wireless Encryption Protocols
    3. 12.2 Wireless Authentication (Enterprise)
    4. 12.3 Kerberos
  16. Lesson 13: Malware Prevention, Detection, and Removal
    1. Learning objectives
    2. 13.1 Malware Part 1
    3. 13.2 Malware Part 2
    4. 13.3 Keyloggers
    5. 13.4 Cryptominers
    6. 13.5 Tools and Methods for Defeating Malware
  17. Lesson 14: Social Engineering and Additional Attacks and Threats
    1. Learning objectives
    2. 14.1 Social Engineering Part 1
    3. 14.2 Social Engineering Part 2
    4. 14.3 Attacks on Passwords
    5. 14.4 DoS, DDoS, Botnets, and Zero-day Attacks
    6. 14.5 Additional Threats
  18. Lesson 15: Windows Security Settings
    1. Learning objectives
    2. 15.1 Login OS Options
    3. 15.2 Users and Groups
    4. 15.3 Sharing and Permissions
    5. 15.4 BitLocker and EFS
    6. 15.5 Windows Defender Antivirus
    7. 15.6 Windows Defender Firewall
  19. Lesson 16: Workstation Security
    1. Learning objectives
    2. 16.1 Password Best Practices
    3. 16.2 Account Management
    4. 16.3 Basic Active Directory Functions
    5. 16.4 Disabling AutoPlay/Autorun
  20. Lesson 17: Mobile Device Security
    1. Learning objectives
    2. 17.1 Screen Locks
    3. 17.2 Best Practices in the Case of Loss or Theft
    4. 17.3 Additional Mobile Device Security
    5. 17.4 Internet of Things (IoT)
  21. Lesson 18: Data Disposal and Destruction
    1. Learning objectives
    2. 18.1 Recycling Repurposing Best Practices
    3. 18.2 Physical Destruction
  22. Lesson 19: SOHO Security
    1. Learning objectives
    2. 19.1 SOHO Wireless Security Part 1
    3. 19.2 SOHO Wireless Security Part 2
    4. 19.3 SOHO Wireless Security Part 3
  23. Lesson 20: Browser Security
    1. Learning objectives
    2. 20.1 Browser Download/Installation
    3. 20.2 Browser Settings
    4. 20.3 Extensions and Plug-ins
    5. 20.4 Password Managers
    6. 20.5 Secure Connections
    7. 20.6 More Browser Settings
  24. Module 3: Software Troubleshooting
    1. Module introduction
  25. Lesson 21: Troubleshoot Microsoft Windows
    1. Learning objectives
    2. 21.1 Troubleshooting Windows Operating System Failures Part 1
    3. 21.2 Troubleshooting Windows Operating System Failures Part 2
    4. 21.3 Troubleshooting Windows Operating System Failures Part 3
    5. 21.4 Windows 10 Recovery Environment
    6. 21.5 Service Failures
    7. 21.6 Performance and Application Issues
    8. 21.7 Windows Troubleshooting Utilities Part 1
    9. 21.8 Windows Troubleshooting Utilities Part 2
  26. Lesson 22: Troubleshoot PC Security Issues
    1. Learning objectives
    2. 22.1 Common Symptoms and Potential Culprits Part 1
    3. 22.2 Common Symptoms and Potential Culprits Part 2
    4. 22.3 Invalid Certificate Issues
    5. 22.4 Tools Used to Solve Security Problems
  27. Lesson 23: Best Practices for Malware Removal
    1. Learning objectives
    2. 23.1 Malware Removal Procedure
    3. 23.2 Scenario - Scan For and Quarantine a Virus
  28. Lesson 24: Troubleshoot Mobile OS and Application Issues
    1. Learning objectives
    2. 24.1 Common Symptoms of Mobile OS/App Issues
    3. 24.2 Troubleshooting Android and iOS
  29. Lesson 25: Troubleshoot Mobile OS Security Issues
    1. Learning objectives
    2. 25.1 Mobile OS Security Issues - Symptoms and Concerns
    3. 25.2 Tools Used to Solve Mobile OS Security Problems
  30. Module 4: Operational Procedures
    1. Module introduction
  31. Lesson 26: Documentation
    1. Learning objectives
    2. 26.1 Ticketing Systems
    3. 26.2 Asset Management
    4. 26.3 Types of Documents
    5. 26.4 Network Documentation
    6. 26.5 Knowledge Bases and Articles
  32. Lesson 27: Change Management
    1. Learning objectives
    2. 27.1 Change Management Best Practices Part 1
    3. 27.2 Change Management Best Practices Part 2
  33. Lesson 28: Disaster Prevention and Recovery
    1. Learning objectives
    2. 28.1 Power Problems and Protective Devices
    3. 28.2 Backup Methods and Testing
    4. 28.3 Backup Demonstrations
    5. 28.4 Account Recovery Options
  34. Lesson 29: Safety Procedures
    1. Learning objectives
    2. 29.1 ESD Prevention
    3. 29.2 Equipment Grounding
    4. 29.3 Personal Safety
  35. Lesson 30: Environmental Impacts and Controls
    1. Learning objectives
    2. 30.1 MSDS Documentation
    3. 30.2 Toxic Waste Handling
    4. 30.3 Environmental Controls
  36. Lesson 31: Incident Response, Licensing, and Regulated Data
    1. Learning objectives
    2. 31.1 Incident Response
    3. 31.2 Licensing
    4. 31.3 Regulated Data
  37. Lesson 32: Communication and Professionalism
    1. Learning objectives
    2. 32.1 Communication Techniques
    3. 32.2 Professionalism
  38. Lesson 33: Basic Scripting
    1. Learning objectives
    2. 33.1 Introduction to Scripting
    3. 33.2 Challenge #6: Use PowerShell and VSC
    4. 33.3 Challenge #7: Linux, Nano, Vim, and Bash
    5. 33.4 Use Cases for Scripting
  39. Lesson 34: Remote Access Technologies
    1. Learning objectives
    2. 34.1 RDP
    3. 34.2 SSH
  40. Lesson 35: Exam Tips and Examples
    1. Learning objectives
    2. 35.1 Test Taking Tips Techniques
    3. 35.2 Sample A+ Question #1 (220-1102)
    4. 35.3 Sample A+ Question #2 (220-1102)
    5. 35.4 Sample A+ Question #3 (220-1102)
  41. Summary
    1. CompTIA A+ Core 2 (220-1102): Summary
  42. Appendixes
    1. DISM
    2. Administrative Tools Part 6 (Component Services and Data Sources)
    3. System Utilities Part 1
    4. System Utilities Part 2
    5. Refresh Rates and Frame Rates
    6. Color Depth
    7. Aspect Ratio
    8. Additional CP Icons Part 1 (Windows 8.1)
    9. Alternate IP Address
    10. Network Card Properties
    11. System Files and Folders Part 1
    12. System Files and Folders Part 2
    13. Review of the A+ Troubleshooting Process
    14. Windows 8/7 Recovery Environment
    15. Tools Used to Solve Mobile Device Issues
    16. Windows 7 and 8 Upgrade Paths
    17. Hands-on Windows 8 Installation Part 1
    18. Hands-on Windows 8 Installation Part 2
    19. Administrative Tools - Windows 8.1
    20. Migration/Upgrade Tools
    21. Networking Connections - Windows 8.1
    22. Remote Control - Windows 8.1
    23. Proxy Settings - Windows 8.1
    24. Firewall Settings - Windows 8.1
    25. OS X and Linux Tools
    26. OS X Features
    27. More Computerized Attacks
    28. Protecting Systems from Threats
    29. Permissions - Windows 8.1
    30. Best Practices - Windows 8.1

Product information

  • Title: CompTIA A+ Core 2 (220-1102)
  • Author(s): David L. Prowse
  • Release date: October 2022
  • Publisher(s): Pearson IT Certification
  • ISBN: 0137903898