CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 299 lectures (35h 48m) | 17.45 GB

Pass the CompTIA A+ (220-1102) Core 2 exam with help from a top expert in the field!

This course provides everything you need in order to study for the CompTIA A+ Core 2 (220-1102) exam, including a downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day!

Jason Dion is an expert in information technology and cybersecurity with over 20 years of experience, and he has designed this course to be a fun way to learn what you need to know to pass the CompTIA A+ Core 2 (220-1102) exam or to better prepare yourself to serve as a service analyst or computer technician in your organization information technology (IT) divisions.

The CompTIA A+ Core 2 (220-1102) certification is a vendor-neutral certification that validates your knowledge and ability to conduct install, configure, and troubleshoot software and operating system issues in your organization. This certification tests your ability to think on your feet while performing critical IT support functions. The CompTIA A+ certification is designed for early-career data analysts with the equivalent of 9-12 months of on-the-job knowledge.

The CompTIA A+ Core 2 exam is focused on supporting operating systems and software in order to support a wide variety of different devices used by a diverse and global workforce.

CompTIA A+ Core 2 (220-1102) is an early-career IT support technician certification covering the theory and technical skills required to support operating system, applications, and security in a corporate environment using the proper operational procedures.

What you’ll learn

  • How to pass the CompTIA A+ (220-1102) Core 2 exam on your first attempt
  • What your weak areas are in the CompTIA A+ curriculum so you can restudy those areas
  • Install, configure, and maintain computer equipment, mobile devices, and software for end users
  • Service components based on customer requirements
  • Understand networking basics and apply basic cybersecurity methods to mitigate threats
  • Properly and safely diagnose, resolve, and document common hardware and software issues
  • Apply troubleshooting skills and provide customer support using appropriate communication skills
  • Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments
Table of Contents

Introduction
1 Welcome
2 Exam Tips

Operating System Types
4 Operating System Types (OBJ. 1.8)
5 Windows (OBJ. 1.8)
6 Linux (OBJ. 1.8)
7 Android (OBJ. 1.8)
8 Chrome OS (OBJ. 1.8)
9 macOS (OBJ. 1.8)
10 iOS and iPadOS (OBJ. 1.8)
11 Operating Systems (OBJ. 1.8)
12 Filesystem Types (OBJ. 1.8)
13 Compatibility Concerns (OBJ. 1.8)

Windows Versions
14 Windows Versions (OBJ. 1.1 & 1.7)
15 bit vs 32-bit Versions (OBJ. 1.7)
16 Windows Home (OBJ. 1.1)
17 Windows Pro (OBJ. 1.1)
18 Windows Enterprise and Education (OBJ. 1.1)
19 Upgrading Windows (OBJ. 1.1)
20 In-place Upgrade (OBJ. 1.1)

Windows Installation
21 Windows Installation (OBJ. 1.9)
22 Installation Types (OBJ. 1.9)
23 Upgrade Considerations (OBJ. 1.9)
24 Product Lifecycle (OBJ. 1.9)
25 Boot Methods (OBJ. 1.9)
26 Partitioning Storage Devices (OBJ. 1.9)
27 Recovery and Reset (OBJ. 1.9)
28 Using a Recovery Partition (OBJ. 1.9)

Application Configuration
29 Application Configuration (OBJ. 1.7)
30 Application Requirements (OBJ. 1.7)
31 Distribution Methods (OBJ. 1.7)
32 Business Impacts (OBJ. 1.7)
33 Operational Impacts (OBJ. 1.7)
34 Device Impacts (OBJ. 1.7)
35 Network Impacts (OBJ. 1.7)
36 Installing Applications (OBJ. 1.7)

Windows Networking
37 Windows Networking (OBJ. 1.6)
38 Wired Connections (OBJ. 1.6)
39 Wireless Connections (OBJ. 1.6)
40 WWAN Connections (OBJ. 1.6)
41 VPN Connections (OBJ. 1.6)
42 Network Client Configuration (OBJ. 1.6)
43 Network Locations (OBJ. 1.6)
44 Proxy Settings (OBJ. 1.6)

Windows Control Panel
45 Windows Control Panel (OBJ. 1.4)
46 Account Settings (OBJ. 1.4)
47 Programs and Features (OBJ. 1.4)
48 Devices and Printers (OBJ. 1.4)
49 Internet Options (OBJ. 1.4)
50 Network and Sharing Center (OBJ. 1.4)
51 Windows Defender Firewall (OBJ. 1.4)
52 Mail (OBJ. 1.4)
53 Sound (OBJ. 1.4)
54 System (OBJ. 1.4)
55 Device Manager (OBJ. 1.4)
56 Administrative Tools (OBJ. 1.4)
57 Indexing Options (OBJ. 1.4)
58 File Explorer Options (OBJ. 1.4)
59 Power Options (OBJ. 1.4)
60 Ease of Access (OBJ. 1.4)

Windows Settings
61 Windows Settings (OBJ. 1.5)
62 Accounts (OBJ. 1.5)
63 System Settings (OBJ. 1.5)
64 Update and Security (OBJ. 1.5)
65 Network and Internet (OBJ. 1.5)
66 Devices (OBJ. 1.5)
67 Privacy (OBJ. 1.5)
68 Time and Language (OBJ. 1.5)
69 Personalization (OBJ. 1.5)
70 Apps (OBJ. 1.5)
71 Gaming (OBJ. 1.5)

Windows Tools
72 Windows Tools (OBJ. 1.3)
73 Task Manager (OBJ. 1.3)
74 Device Manager (OBJ. 1.3)
75 Disk Management Console (OBJ. 1.3)
76 Disk Maintenance Tools (OBJ. 1.3)
77 Task Scheduler (OBJ. 1.3)
78 Event Viewer (OBJ. 1.3)
79 Performance Monitor (OBJ. 1.3)
80 Local Users and Groups (OBJ. 1.3)
81 Group Policy Editor (OBJ. 1.3)
82 Certificate Manager (OBJ. 1.3)
83 System Information (OBJ. 1.3)
84 Resource Monitor (OBJ. 1.3)
85 System Configuration (OBJ. 1.3)
86 Registry Editor (OBJ. 1.3)
87 Microsoft Management Console (OBJ. 1.3)

Windows Command Line Tools
88 Windows Command Line Tools (OBJ. 1.2)
89 Using the GUI (OBJ. 1.2)
90 Using the Command Prompt (OBJ. 1.2)
91 Navigation Commands (OBJ. 1.2)
92 Copying Commands (OBJ. 1.2)
93 Disk Management Commands (OBJ. 1.2)
94 Shutdown (OBJ. 1.2)
95 System File Checker (OBJ. 1.2)
96 Windows Version (OBJ. 1.2)
97 Network Troubleshooting Commands (OBJ. 1.2)
98 Name Resolution Commands (OBJ. 1.2)
99 The netstat Command (OBJ. 1.2)
100 Group Policy Commands (OBJ. 1.2)

Windows Shares
101 Windows Shares (OBJ. 1.2, 1.6, & 2.5)
102 Workgroups and Domains (OBJ. 1.6)
103 File Sharing (OBJ. 2.5)
104 NTFS Permissions (OBJ. 2.5)
105 Mapping Drives (OBJ. 1.6)
106 The net Command (OBJ. 1.2)
107 User Data on Domains (OBJ. 1.6)
108 Printer Sharing (OBJ. 1.6)

macOS
109 macOS (OBJ. 1.10)
110 Finder, Dock, and Spotlight (OBJ. 1.10)
111 Mission Control (OBJ. 1.10)
112 Terminal (OBJ. 1.10)
113 Disk Utility (OBJ. 1.10)
114 File Vault (OBJ. 1.10)
115 Remote Disc (OBJ. 1.10)
116 Gestures (OBJ. 1.10)
117 Keychain (OBJ. 1.10)
118 iCloud and Apple ID (OBJ. 1.10)
119 System Preferences (OBJ. 1.10)
120 Managing macOS Applications (OBJ. 1.10)
121 Best Practices for macOS (OBJ. 1.10)

Linux
122 Linux (OBJ. 1.11)
123 Shells and Terminals (OBJ. 1.11)
124 Linux Navigation (OBJ. 1.11)
125 File Management Commands (OBJ. 1.11)
126 Disk Usage Commands (OBJ. 1.11)
127 Text Manipulation (OBJ. 1.11)
128 Search Commands (OBJ. 1.11)
129 User Management (OBJ. 1.11)
130 File Permission Commands (OBJ. 1.11)
131 Application Management (OBJ. 1.11)
132 Resource Management Commands (OBJ. 1.11)
133 Networking Commands (OBJ. 1.11)
134 Getting Help in Linux (OBJ. 1.11)
135 Best Practices for Linux (OBJ. 1.11)

Threats and Vulnerabilities
136 Threats and Vulnerabilities (OBJ. 2.4)
137 CIA Triad (OBJ. 2.4)
138 Vulnerabilities (OBJ. 2.4)
139 Zero-day Attack (OBJ. 2.4)
140 DoS and DDoS (OBJ. 2.4)
141 Spoofing (OBJ. 2.4)
142 On-path Attack (OBJ. 2.4)
143 SQL Injection (OBJ. 2.4)
144 XSS and XSRF (OBJ. 2.4)
145 Password Cracking (OBJ. 2.4)
146 Insider Threat (OBJ. 2.4)

Malware
147 Malware (OBJ. 2.3)
148 Viruses, Worms, and Trojans (OBJ. 2.3)
149 Viruses and Trojans (OBJ. 2.3)
150 Ransomware (OBJ. 2.3)
151 Spyware (OBJ. 2.3)
152 Rootkits (OBJ. 2.3)
153 Botnets and Zombies (OBJ. 2.3)
154 Symptoms of Infection (OBJ. 2.3)
155 Removing Malware (OBJ. 3.3)
156 Preventing Malware (OBJ. 2.3)

Social Engineering
157 Social Engineering (OBJ. 2.3 & 2.4)
158 Phishing Attacks (OBJ. 2.4)
159 Anti-phishing Training (OBJ. 2.3)
160 Spam (OBJ. 2.3)
161 Impersonation (OBJ. 2.4)
162 Pretexting (OBJ. 2.4)
163 Social Engineering Attacks (OBJ. 2.4)
164 Evil Twin (OBJ. 2.4)
165 Software Firewalls (OBJ. 2.3)
166 Using Software Firewalls (OBJ. 2.3)
167 User Education (OBJ. 2.3)

Security Controls
168 Security Controls (OBJ. 2.1)
169 Perimeter Defense (OBJ. 2.1)
170 Surveillance (OBJ. 2.1)
171 Physical Access Controls (OBJ. 2.1)
172 Security Principles (OBJ. 2.1)
173 Multifactor Authentication (OBJ. 2.1)
174 Mobile Device Management (OBJ. 2.1)
175 Active Directory Security (OBJ. 2.1)

Wireless Security
176 Wireless Security (OBJ. 2.2 & 2.9)
177 Wireless Encryption (OBJ. 2.2)
178 Cracking Wireless Networks (OBJ. 2.2)
179 WPA3 (OBJ. 2.2)
180 Wireless Authentication (OBJ. 2.2)
181 Wireless Network Security (OBJ. 2.9)
182 Configuring SOHO Networks (OBJ. 2.9)
183 Securing Wireless Networks (OBJ. 2.9)
184 Configuring SOHO Firewalls (OBJ. 2.9)

Mobile Device Security
185 Mobile Device Security (OBJ. 2.7)
186 Securing Wireless Devices (OBJ. 2.7)
187 Mobile Device Unlocking (OBJ. 2.7)
188 Mobile Malware (OBJ. 2.7)
189 Mobile Device Theft (OBJ. 2.7)
190 Mobile App Security (OBJ. 2.7)
191 Deployment Options (OBJ. 2.7)
192 Hardening Mobile Devices (OBJ. 2.7)
193 Implementing Mobile Device Security (OBJ. 2.7)
194 IoT Vulnerabilities (OBJ. 2.7)

Windows Security
195 Windows Security (OBJ. 2.5)
196 Login Options (OBJ. 2.5)
197 Users and Groups (OBJ. 2.5)
198 Encrypting Windows Devices (OBJ. 2.5)
199 File Permissions (OBJ. 2.5)
200 Microsoft Defender Antivirus (OBJ. 2.5)
201 Microsoft Defender Firewall (OBJ. 2.5)

Securing Workstations
202 Securing Workstations (OBJ. 2.6 & 2.8)
203 Account Management (OBJ. 2.6)
204 AutoRun and AutoPlay (OBJ. 2.6)
205 Password Best Practices (OBJ. 2.6)
206 Encryption Best Practices (OBJ. 2.6)
207 End-user Best Practices (OBJ. 2.6)
208 Data Destruction (OBJ. 2.8)
209 Data Destruction Methods (OBJ. 2.8)

Securing Web Browsers
210 Securing Web Browsers (OBJ. 2.10)
211 Web Browser Installation (OBJ. 2.10)
212 Extensions and Plug-ins (OBJ. 2.10)
213 Password Managers (OBJ. 2.10)
214 Encrypted Browsing (OBJ. 2.10)
215 Private Browsing (OBJ. 2.10)
216 Pop-up and Ad Blockers (OBJ. 2.10)
217 Cache and History Clearing (OBJ. 2.10)
218 Profile Synchronization (OBJ. 2.10)

Supporting Network Operations
219 Supporting Network Operations (OBJ. 4.1 & 4.2)
220 Ticketing System (OBJ. 4.1)
221 Using a Ticketing System (OBJ. 4.1)
222 Knowledge Base Articles (OBJ. 4.1)
223 Asset Management (OBJ. 4.1)
224 Change Management (OBJ. 4.2)
225 Conducting Change Management (OBJ. 4.2)
226 Documentation Types (OBJ. 4.1)

Backup, Recovery, and Safety
227 Backup, Recovery, and Safety
228 Backup and Recovery (OBJ. 4.3)
229 Backup Schemes (OBJ. 4.3)
230 Redundant Power (OBJ. 4.5)
231 Electrical Safety (OBJ. 4.4)
232 Component Handling and Storage (OBJ. 4.4)
233 HVAC Systems (OBJ. 4.5)
234 Proper Handling and Disposal (OBJ. 4.4 & 4.5)
235 Personal Safety (OBJ. 4.4 & 4.5)

Policy and Privacy Concepts
236 Policy and Privacy Concepts (OBJ. 4.6)
237 Incident Response (OBJ. 4.6)
238 Chain of Custody (OBJ. 4.6)
239 Order of Volatility (OBJ. 4.6)
240 Data Collection Procedures (OBJ. 4.6)
241 Conduct Disk Imaging (OBJ. 4.6)
242 Licensing, EULA, and DRM (OBJ. 4.6)
243 Data Classification (OBJ. 4.6)
244 Data Retention (OBJ. 4.6)
245 PII, PHI, and PCI-DSS (OBJ. 4.6)
246 Security Policies (OBJ. 4.6)

Scripting
247 Scripting (OBJ. 4.8)
248 Script File Types (OBJ. 4.8)
249 Variables (OBJ. 4.8)
250 Loops (OBJ. 4.8)
251 Logic Control (OBJ. 4.8)
252 Bash Script Example (OBJ. 4.8)
253 Automation Scripting (OBJ. 4.8)
254 Scripting Considerations (OBJ. 4.8)

Remote Access Support
255 Remote Access Support (OBJ. 4.9)
256 Remote Access Protocols (OBJ. 4.9)
257 Connecting to a VPN (OBJ. 4.9)
258 Remote Monitoring and Management (RMM) (OBJ. 4.9)
259 Microsoft Remote Assistance (MSRA) (OBJ. 4.9)
260 Other Remote Access Tools (OBJ. 4.9)
261 Desktop Management Software (OBJ. 4.9)

Troubleshooting Windows
262 Troubleshooting Windows (OBJ. 3.1)
263 Boot Issues (OBJ. 3.1)
264 Boot Recovery Tools (OBJ. 3.1)
265 Update or Driver Rollback (OBJ. 3.1)
266 System Restore (OBJ. 3.1)
267 System Reinstall or Reimage (OBJ. 3.1)
268 Performance Issues (OBJ. 3.1)
269 System Fault Issues (OBJ. 3.1)
270 System Instability Issues (OBJ. 3.1)
271 Application and Service Issues (OBJ. 3.1)

Troubleshooting Workstation Security
272 Troubleshooting Workstation Security (OBJ. 3.2 & 3.3)
273 Malware Removal Process (OBJ. 3.3)
274 Infected Browser Symptoms (OBJ. 3.2)
275 Alerts and Notifications (OBJ. 3.2)
276 OS Update Failures (OBJ. 3.2)
277 File System Issues (OBJ. 3.2)

Troubleshooting Mobile Issues
278 Troubleshooting Mobile Issues (OBJ. 3.4)
279 Reseting or Rebooting (OBJ. 3.4)
280 Mobile OS Update Failure (OBJ. 3.4)
281 Mobile Performance Issues (OBJ. 3.4)
282 Mobile App Issues (OBJ. 3.4)
283 Mobile Connectivity Issues (OBJ. 3.4)
284 Mobile Battery Issues (OBJ. 3.4)
285 Screen Autorotation Issues (OBJ. 3.4)

Troubleshooting Mobile Security
286 Troubleshooting Mobile Security (OBJ. 3.5)
287 Rooting and Jailbreaking (OBJ. 3.5)
288 Sideloading Apps (OBJ. 3.5)
289 Mobile Malware Symptoms (OBJ. 3.5)
290 Unexpected Application Behavior (OBJ. 3.5)
291 Leaked Mobile Data (OBJ. 3.5)

Professionalism
292 Professionalism (OBJ. 4.7)
293 Professional Appearance (OBJ. 4.7)
294 Respect Others’ Time (OBJ. 4.7)
295 Proper Communication (OBJ. 4.7)
296 Dealing with Private Data (OBJ. 4.7)
297 Difficult Situations (OBJ. 4.7)

Conclusion
298 Conclusion
299 Bonus What’s Next

Homepage