Course Overview

The CompTIA A+ 220-1001 & 220-1002 training for the new Core Series covers expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures. CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization, cloud computing, and network troubleshooting. The CompTIA A+ 220-1002 course covers Operating Systems, Security, Software Troubleshooting, and Operational Procedures.

220 1001 300x200 1

Course objectives

How Much Can I Make With A CompTIA A+ Certification ?

This CompTIA A+ certification training is perfect for individuals beginning his/her career in the IT Industry and is best for people in positions such as Support Specialist, Field Service Technician, Desktop Support Analyst, Help Desk Support

The average salary for people with this certification can range anywhere between $40,000 to $70,000 based on current data from Indeed. Visit the Indeed website for current data related to some of the key positions and salaries related to CompTIA A+ certification.

0
Course Videos
0
Test Questions
0
E-BOOKS
0
Duration

Modules

Module 1 – Operating Systems

  • 0.1 Intro to A+ Core2 Instructor
  • 1.0 Intro to A+ Core2
  • 1.1 Operating Systems Part1
  • 1.1 Operating Systems Part2
  • 1.2 Compare and Contrast features of Microsoft Windows Versions
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
  • 1.5 Microsoft Operating System and Tools Part1
  • 1.5 Microsoft Operating System and Tools Part1 Demo
  • 1.5 Microsoft Operating System and Tools Part2
  • 1.5 Microsoft Operating System and Tools Part2 Demo
  • 1.5 Microsoft Operating System and Tools Part3
  • 1.5 Microsoft Operating System and Tools Part3 Demo
  • 1.5 Microsoft Operating System and Tools Part4
  • 1.5 Microsoft Operating System and Tools Part4 Demo
  • 1.6 Microsoft Windows Control Panel Utilities
  • 1.6 Microsoft Windows Control Panel Utilities Demo
  • 1.7 Summarize Application Installation and Configuration Concepts
  • 1.8 Configure Windows Networking on a Client Desktop
  • 1.8 Configure Windows Networking on a Client Desktop Demo
  • 1.9 Features and Tools of MAC OS and Linux Client Desktop

Module 3 – Software Troubleshooting

  • 3.1 Software Troubleshooting Part1
  • 3.1 Software Troubleshooting Part2
  • 3.1 Software Troubleshooting Demo
  • 3.2 Troubleshoot and Resolve PC Security Issues
  • 3.2 Troubleshoot and Resolve PC Security Issues Part2
  • 3.2 Troubleshoot and Resolve PC Security Issues Demo
  • 3.3 Best Practice Procedures for Malware Removal
  • 3.4 Troubleshoot Mobile OS and Application
  • 3.5 Troubleshoot Mobile OS and Application Security Issue

Module 2 – Security

  • 2.1 Security – Physical Security Measures
  • 2.2 Explain Logical Security Concepts
  • 2.2 Explain Logical Security Concepts Part2
  • 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  • 2.4 Detect, Remove and Prevent Malware using Appropriate Tools
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  • 2.7 Implement Security Best Practices to Secure a Workstation
  • 2.7 Implement Security Best Practices to Secure a Workstation Part2
  • 2.8 Implement Methods for Securing Mobile Devices
  • 2.9 Implement Appropriate Data Destruction & Disposal Methods
  • 2.10 Configure Security on SOHO Wireless and Wired Networks
  • 2.10 Configure Security on SOHO Wireless and Wired Networks Demo

Module 4 – Operational Procedures

  • 4.1 Operational Procedures
  • 4.2 Implement Basic Change Management Best Practices
  • 4.3 Implement Basic Disaster Prevention and Recovery Methods
  • 4.4 Explain Common Safety Procedures
  • 4.5 Explain Environmental Impacts and Appropriate Controls
  • 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • 4.7 Using Proper Communication Techniques and Professionalism
  • 4.8 Identify the Basics of Scripting
  • 4.8 Identify the Basic of the Scripting Demo
  • 4.9 Use Remote Access Technologies

Modes of Learning