CompTIA A+ Core 2 (220-1002) Certification. The Total Training

CompTIA A+ Core 2 (220-1002) Certification. The Total Training

Between my smash hit A+, Network+, and Security+ books and my video courses, I’ve instructed more than 2 million individuals how to take and pass these CompTIA IT industry affirmation tests. I have an agreeable, receptive, and entertaining instructing style that has helped amateurs and experienced specialists the same acquire important IT abilities. I’ve educated face to face workshops for the DEA and the FBI, and now I will show you, yes YOU, gazing at the screen there, all that I think about the CompTIA A+ accreditation.

This is the second of a two-course arrangement and is intended to set you up to take and pass the CompTIA A+ 2019 Core 2 (220-1002) test. It’s a universally perceived, crucial IT preparing affirmation. Not intrigued by affirmation? Don’t worry about it! Regardless of whether you simply need to find out about its essentials and PCs, I have you covered.

All About the CompTIA A+ Core 2 (220-1002) Exam

1
CompTIA A+ Core 2 (220-1002) Course Introduction
2
How to use this Video Course
3
What is the CompTIA A+
4
Why Get A+ Certified?
5
What is on the CompTIA A+ Core 2 (220-1002) Exam?
6
How to Pass the CompTIA A+ Exam

Chapter 1 - Safety and Professionalism

1
Professional Communication Part 1
2
Professional Communication Part 2
3
Physical Safety

Chapter 2 - The Visible Computer

1
What is an Operating System
2
Users and Super Users
3
Why Windows?
4
Windows Editions and Versions
5
Touring the macOS
6
Touring Linux

Chapter 3 - CPUs

1
32-Bit vs. 64-Bit Processing

Chapter 4 - RAM

1
Virtual Memory

Chapter 7 - Power Supply

1
Power Protection

Chapter 9 - Implementing Mass Storage

1
Understanding Partitioning
2
MBR Partitioning
3
GPT Partitioning
4
Understanding File Systems
5
Popular File Systems
6
Formatting in Action
7
Dynamic Disks
8
Software RAID in Storage Spaces
9
Encrypting Mass Storage

Chapter 11 - Building a PC

1
Boot from Everything
2
Installing Windows
3
Post-Installation Tasks
4
Windows Installation options

Chapter 12 - Windows Under the Hood

1
What is the Registry?
2
Processes
3
Services
4
Your Windows Toolset
5
Windows 7 Task Manager
6
Windows 10 Task Manager
7
Information and Configuration Tools
8
Performance Monitor
9
Event Viewer
10
Tools for Programmers

Chapter 13 - Users

Groups

and Permissions

1
Introduction to Users and Groups
2
Managing Users and Groups
3
NTFS Permissions
4
Linux and macOS Permissions
5
File Explorer
6
Sharing Resources
7
Security Policies

Chapter 14 - Maintaining and Optimizing Operating Systems

1
Patch Management
2
Working with Disks
3
Working with Applications
4
System Restore
5
Backing up Your Files
6
Task Scheduler

Chapter 15 - Working with the Command-Line Interface

1
Understanding the CLI
2
Navigating the CLI
3
Working with Folders
4
Working with Files
5
Working with Drives
6
Super Copy Commands
7
Advanced Windows Command Line
8
Advanced Linux Commands
9
Command-Line Permissions
10
Introduction to Scripting
11
Interpreted Languages

Chapter 16 - Troubleshooting Operating Systems

1
Windows Recovery Environment
2
Advanced Windows Startup Options
3
Troubleshooting Boot Problems
4
Troubleshooting at the GUI
5
Troubleshooting Applications
6
Kernel Panic

Chapter 17 - Display Technologies

1
Resolutions and Aspect Ratios
2
Multiple Monitors

Chapter 18 - Essentials of Networking

1
Network Card Troubleshooting

Chapter 19 - Local Area Networking

1
Working with Connections
2
Working with Workgroups
3
Working with Active Directory
4
Windows Sharing with Mac and LInux
5
Net Command
6
Firewall Configuration
7
Windows Firewall
8
Port Forwarding

Chapter 20 - Wireless Networking

1
Wireless Encryption
2
Enterprise Wireless

Chapter 21 - The Internet

1
Telnet and SSH
2
Remote Desktop Connections
3
The World Wide Web
4
Troubleshooting Internet Connections

Chapter 23 - Portable Computing

1
Power Management

Chapter 25 - Care and Feeding of Mobile Devices

1
Mobile Device Security
2
Mobile Security Troubleshooting
3
Mobile Device Troubleshooting

Chapter 26 - Securing Computers

1
Threats
2
Physical Security
3
Passwords and Authentication
4
Malware
5
Anti-Malware
6
Social Engineering
7
Licensing
8
Incident Response
9
Environmental Controls

Chapter 27 - Operational Procedures

1
Documents You Need to Know
2
Data You Need to Know
3
Change Management
4
The Zen of Backup
5
Recycling and Data Destruction

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 106

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

CompTIA A+ Core 2 (220-1002) Certification. The Total Training
Price:
$99