Comptia A+ Core 2 (220-1202)
Released 6/2025
By Dave Prowse
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 37h 40m | Size: 7 GB
Table of contents
Introduction
CompTIA A+ Core 2 (220-1202): Introduction
Module 1: Operating Systems
Module Introduction
Lesson 1: Compare and Contrast Operating Systems
Learning objectives
1.1 Overview of Workstation Operating Systems
1.2 Windows
1.3 macOS
1.4 Linux
1.5 32-bit versus 64-bit
1.6 Smartphone Tablet Operating Systems
1.7 Vendor Life-Cycle Limitations
Lesson 2: Windows Versions and Features
Learning objectives
2.1 Comparison of Windows Editions and Features
2.2 Corporate versus Personal Needs
2.3 Application Requirements and Install Methods
Lesson 3: Operating System Installation
Learning objectives
3.1 Installation Methods
3.2 Types of Installations
3.3 Install/Upgrade Considerations
3.4 Multiboot
3.5 Partitioning
3.6 File Systems Formatting
3.7 More File Systems
Lesson 4: Microsoft Command-line Tools
Learning objectives
4.1 Introduction to Microsoft Command-Line Tools and Help Part 1
4.2 Introduction to Microsoft Command-Line Tools and Help Part 2
4.3 Challenge - Access Microsoft Command-line Tools
4.4 File-related Commands Part 1
4.5 File-related Commands Part 2
4.6 File-related Commands Part 3
4.7 Disk and File Checking Tools
4.8 Working with Tasks
4.9 Command-Line Networking in Windows Part 1 (ipconfig and ping)
4.10 Command-Line Networking in Windows Part 2
4.11 Winver, Hostname, and Pathping
4.12 Policy-based Commands
4.13 Windows Terminal Usage
Lesson 5: Microsoft Operating System Features and Tools
Learning objectives
5.1 Administrative Tools Part 1 (Computer Management and the MMC)
5.2 Administrative Tools Part 2 (Performance Monitor and WMD)
5.3 Administrative Tools Part 3 (Task Scheduler and Print Management)
5.4 Administrative Tools Part 4 (Local Users and Groups and Event Viewer)
5.5 Administrative Tools Part 5 (Windows Firewall and Local Security Policy)
5.6 Additional Windows Tools
5.7 System Configuration Utility
5.8 Task Manager
5.9 Disk Management
Lesson 6: Windows Control Panel Utilities
Learning objectives
6.1 How to Access the Control Panel
6.2 Internet Options
6.3 Display Resolution
6.4 Folder/File Explorer Options
6.5 System Properties
6.6 Power Options
6.7 Additional CP Icons (Part 1 - Windows 10)
6.8 Additional CP Icons (Part 2 - Windows 11)
Lesson 7: Windows Settings
Learning objectives
7.1 How to Access Windows Settings
7.2 Time Language
7.3 Update Security
7.4 Personalization and Apps
7.5 Privacy
7.6 System: Video, Power, Storage, and Remote Desktop
7.7 System: About and System Properties
7.8 Virtual Memory
7.9 Devices
7.10 Network Internet
7.11 Accounts
Lesson 8: Windows Networking
Learning objectives
8.1 Introduction to Windows Networking
8.2 Static Vs. Dynamic IP
8.3 Workgroup Vs. Domain
8.4 Sharing and Mapping Part 1
8.5 Sharing and Mapping Part 2
8.6 Administrative and Hidden Shares
8.7 Establishing Network Connections
8.8 Proxy Settings
8.9 Remote Control of Windows Systems
8.10 Firewall Settings
Lesson 9: macOS
Learning objectives
9.1 Introduction to macOS
9.2 Apple ID
9.3 Apple File Types for Applications
9.4 Best Practices Part 1
9.5 Best Practices Part 2
9.6 System Folders
9.7 System Settings
9.8 Features
9.9 More macOS Tools
Lesson 10: Linux 101
Learning objectives
10.1 Introduction to Linux
10.2 The Terminal
10.3 Basic Linux Commands and Help System
10.4 Working with Directories and Files Part 1
10.5 Working with Directories and Files Part 2
10.6 Administrative Access in Linux
10.7 Linux Analysis
10.8 Using Text Editors
10.9 Linux Networking Part 1
10.10 Linux Networking Part 2
10.11 File System Management
10.12 Common Configuration Files
10.13 OS Components
10.14 Linux Best Practices
10.15 Challenge - Use Linux Tools
Lesson 11: Cloud-based Productivity Tools
Learning objectives
11.1 Email Systems
11.2 Collaboration Tools and Storage
Module 2: Security
Module Introduction
Lesson 12: Physical Logical Security
Learning objectives
12.1 Physical Security
12.2 Active Directory
12.3 User Authentication
12.4 Firewall Security
12.5 MDM Policies and DLP
12.6 Certificates and Trust
12.7 Principle of Least Privilege
12.8 Hard vs. Soft Tokens
12.9 Authenticator Apps and SMS Security
12.10 More Security Measures
Lesson 13: Wireless Security Protocols and Authentication Methods
Learning objectives
13.1 Wireless Encryption Protocols
13.2 Wireless Authentication (Enterprise)
13.3 Kerberos
Lesson 14: Malware Prevention, Detection, and Removal
Learning objectives
14.1 Malware Part 1
14.2 Malware Part 2
14.3 Malware Part 3
14.4 Keyloggers
14.5 Cryptominers
14.6 Tools and Methods for Defeating Malware
14.7 More Malware Defeating Tools
Lesson 15: Best Practices for Malware Removal
Learning objectives
15.1 Malware Removal Procedure
15.2 Scenario - Scan For and Quarantine a Virus
Lesson 16: Social Engineering and Additional Attacks and Threats
Learning objectives
16.1 Social Engineering Part 1
16.2 Social Engineering Part 2
16.3 Attacks on Passwords
16.4 DoS, DDoS, Botnets, and Zero-day Attacks
16.5 Additional Threats
Lesson 17: Windows Security Settings
Learning objectives
17.1 Login Options
17.2 Users and Groups
17.3 Sharing and Permissions
17.4 BitLocker and EFS
17.5 Windows Defender Antivirus
17.6 Windows Defender Firewall
17.7 Enabling and Disabling Windows Features
Lesson 18: Workstation Security
Learning objectives
18.1 Password Best Practices
18.2 Account Management
18.3 Basic Active Directory Functions
18.4 Disabling AutoPlay/Autorun
18.5 Disabling Unused Services
Lesson 19: Mobile Device Security
Learning objectives
19.1 Screen Locks
19.2 Best Practices in the Case of Loss or Theft
19.3 Additional Mobile Device Security
19.4 Internet of Things (IoT)
Lesson 20: Data Disposal and Destruction
Learning objectives
20.1 Recycling Repurposing Best Practices
20.2 Physical Destruction
20.3 Regulatory and Environmental Considerations
Lesson 21: SOHO Security
Learning objectives
21.1 SOHO Wireless Security Part 1
21.2 SOHO Wireless Security Part 2
21.3 SOHO Wireless Security Part 3
21.4 SOHO Secure Management Access
Lesson 22: Browser Security
Learning objectives
22.1 Browser Download/Installation
22.2 Browser Settings
22.3 Extensions and Plug-ins
22.4 Password Managers
22.5 Secure Connections
22.6 Proxies and Secure DNS
22.7 Browser Patching
22.8 More Browser Security Settings
Module 3: Software Troubleshooting
Module Introduction
Lesson 23: Troubleshoot Microsoft Windows
Learning objectives
23.1 A+ Troubleshooting Process
23.2 Troubleshooting Windows Operating System Failures Part 1
23.3 Troubleshooting Windows Operating System Failures Part 2
23.4 Troubleshooting Windows Operating System Failures Part 3
23.5 Windows 10 Recovery Environment and Troubleshooting
23.6 Windows 11 Recovery Environment
23.7 Service Failures
23.8 Performance and Application Issues
23.9 Windows Troubleshooting Utilities Part 1
23.10 Windows Troubleshooting Utilities Part 2
Lesson 24: Troubleshoot PC Security Issues
Learning objectives
24.1 Common Symptoms and Potential Culprits Part 1
24.2 Common Symptoms and Potential Culprits Part 2
24.3 Invalid Certificate Issues
24.4 Tools Used to Solve Security Problems
Lesson 25: Troubleshoot Mobile OS and Application Issues
Learning objectives
25.1 Common Symptoms of Mobile OS/App Issues
25.2 Troubleshooting Android and iOS
Lesson 26: Troubleshoot Mobile OS Security Issues
Learning objectives
26.1 Mobile OS Security Issues - Symptoms and Concerns
26.2 Tools Used to Solve Mobile OS Security Problems
Module 4: Operational Procedures
Module Introduction
Lesson 27: Documentation
Learning objectives
27.1 Ticketing Systems
27.2 Asset Management
27.3 Types of Documents
27.4 Network Documentation
27.5 Knowledge Bases and Articles
Lesson 28: Change Management
Learning objectives
28.1 Change Management Best Practices Part 1
28.2 Change Management Best Practices Part 2
28.3 Change Management - Additional Terms
Lesson 29: Disaster Prevention and Recovery
Learning objectives
29.1 Power Problems and Protective Devices
29.2 Backup Methods and Testing
29.3 Backup Demonstrations
29.4 Account Recovery Options
Lesson 30: Safety Procedures
Learning objectives
30.1 ESD Prevention
30.2 Equipment Grounding
30.3 Personal Safety
Lesson 31: Environmental Impacts and Controls
Learning objectives
31.1 MSDS Documentation
31.2 Toxic Waste Handling
31.3 Environmental Controls
Lesson 32: Incident Response, Licensing, and Regulated Data
Learning objectives
32.1 Incident Response
32.2 Licensing
32.3 Non-Disclosure Agreements (NDA)
32.4 Regulated Data
Lesson 33: Communication and Professionalism
Learning objectives
33.1 Communication Techniques
33.2 Professionalism
Lesson 34: Basic Scripting
Learning objectives
34.1 Introduction to Scripting
34.2 Challenge - Use PowerShell and VSC
34.3 Challenge - Linux, Nano, Vim, and Bash
34.4 Use Cases for Scripting
Lesson 35: Remote Access Technologies
Learning objectives
35.1 RDP
35.2 SSH
35.3 More Remote Access Technologies
35.4 Remote Access Security Considerations
Lesson 36: Artificial Intelligence
Learning objectives
36.1 Introduction to "AI"
36.2 AI Examples
Lesson 37: Exam Tips and Examples
Learning objectives
37.1 A+ Test Taking Tips Techniques
37.2 Sample A+ Core 2 Question #1
37.3 Sample A+ Core 2 Question #2
37.4 Sample A+ Core 2 Question #3
37.5 Sample A+ Core 2 Question #4
37.6 Sample A+ Core 2 Question #5
37.7 Sample A+ Core 2 Question #6
Summary
CompTIA A+ Core 2 (220-1202): Summary
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!