All About The CompTIA A+ | |||
What is the CompTIA A+? | 00:02:00 | ||
Why Get CompTIA A+ Certified? | 00:05:00 | ||
How to Take the A+ Exam | 00:02:00 | ||
What’s on the CompTIA A+ Core 2 (220-1102) Exam? | 00:04:00 | ||
How to Pass the CompTIA A+ Exams | 00:02:00 | ||
How to Use this Video Course | 00:02:00 | ||
Section 01 - Safety And Professionalism | |||
Professional Communication, Part 1 | 00:06:00 | ||
Professional Communication, Part 2 | 00:07:00 | ||
Dealing with Difficult Customers | 00:05:00 | ||
Physical Safety | 00:07:00 | ||
Section 02 - The Visible Computer | |||
Common Safety Procedures | 00:04:00 | ||
What Is an Operating System? | 00:09:00 | ||
Users and Super Users | 00:05:00 | ||
Why Windows? | 00:08:00 | ||
Touring Windows 10 and 11 | 00:05:00 | ||
Touring the macOS | 00:06:00 | ||
Touring Linux | 00:08:00 | ||
Section 03 - Power Supplies | |||
Power Protection | 00:09:00 | ||
Section 04 - Mass Storage Technologies | |||
Boot Order | 00:07:00 | ||
Section 05 - Implementing Mass Storage | |||
Understanding Partitioning | 00:04:00 | ||
MBR Partitioning | 00:12:00 | ||
GPT Partitioning | 00:06:00 | ||
Understanding File Systems | 00:11:00 | ||
Popular File Systems | 00:06:00 | ||
Formatting in Action | 00:11:00 | ||
Dynamic Disks | 00:07:00 | ||
New Installation – First Drive | 00:05:00 | ||
Software RAID in Storage Spaces | 00:09:00 | ||
Encrypting Mass Storage | 00:09:00 | ||
Maintaining Storage Disks (previously Ch 14 Working with Disks) | 00:06:00 | ||
Section 06 - Essential Peripherals | |||
Understanding USB | 00:11:00 | ||
Webcams and Videoconferencing | 00:03:00 | ||
Section 07 - Installing And Upgrading Operating Systems | |||
Windows 10 Editions and Features | 00:07:00 | ||
Windows 11 Editions and Features | 00:05:00 | ||
Boot from Everything | 00:12:00 | ||
Installing and Upgrading Windows 10 | 00:06:00 | ||
Post-Installation Tasks | 00:11:00 | ||
Installing and Updating Linux | 00:03:00 | ||
Upgrading macOS | 00:02:00 | ||
Section 08 - Working With Operating Systems | |||
The Task Manager | 00:06:00 | ||
The Control Panel | 00:10:00 | ||
Windows Settings | 00:06:00 | ||
MMC and Additional Tools | 00:08:00 | ||
What Is the Registry? | 00:10:00 | ||
macOS Core Tools | 00:12:00 | ||
Section 09 - Users, Groups, And Permissions | |||
Introduction to Users and Groups | 00:06:00 | ||
Managing Users and Groups | 00:12:00 | ||
NTFS Permissions | 00:08:00 | ||
Linux and macOS Permissions | 00:05:00 | ||
File Explorer | 00:13:00 | ||
Sharing Resources | 00:10:00 | ||
Security Policies | 00:08:00 | ||
Section 10 - Maintaining And Optimizing Operating Systems | |||
Maintaining Windows | 00:03:00 | ||
Maintaining macOS | 00:09:00 | ||
Maintaining Linux | 00:03:00 | ||
Working with Applications | 00:09:00 | ||
Backing Up Your Data in Windows | 00:09:00 | ||
Backing Up Your Data in Linux and macOS | 00:04:00 | ||
Section 11 - Working With The Command-Line Interface | |||
Understanding the CLI | 00:11:00 | ||
Navigating the CLI | 00:14:00 | ||
Working with Folders | 00:06:00 | ||
Working with Files | 00:11:00 | ||
Working with Drives | 00:13:00 | ||
Super Copy Commands | 00:08:00 | ||
Command-Line Permissions | 00:07:00 | ||
Advanced Windows Commands | 00:08:00 | ||
Advanced Linux Commands | 00:11:00 | ||
Introduction to Scripting | 00:10:00 | ||
Interpreted Languages | 00:12:00 | ||
Scripting and the Terminal | 00:09:00 | ||
Section 12 - Troubleshooting Operating Systems | |||
Windows Recovery Environment | 00:05:00 | ||
Advanced Windows Startup Options | 00:07:00 | ||
Troubleshooting Boot Problems | 00:10:00 | ||
Troubleshooting at the GUI | 00:08:00 | ||
Troubleshooting Applications | 00:07:00 | ||
Kernel Panic | 00:05:00 | ||
Section 13 - Local Area Networking | |||
Introduction to TCP/IP | 00:14:00 | ||
Network IDs and Subnet Masks | 00:05:00 | ||
Special IP Addresses | 00:09:00 | ||
Network Address Translation (NAT) | 00:07:00 | ||
Dynamic IP Addressing | 00:10:00 | ||
Working with Connections | 00:09:00 | ||
Understanding DNS | 00:11:00 | ||
Working with DNS | 00:07:00 | ||
Windows Naming | 00:06:00 | ||
Working with Workgroups | 00:07:00 | ||
Working with Active Directory | 00:14:00 | ||
Windows Sharing with macOS and Linux | 00:07:00 | ||
The net Command | 00:04:00 | ||
Routers | 00:11:00 | ||
Basic Router Configuration | 00:12:00 | ||
Firewall Configuration | 00:11:00 | ||
Windows Firewall | 00:08:00 | ||
Port Forwarding | 00:07:00 | ||
Advanced Router Configuration | 00:06:00 | ||
Virtual LANs (VLANs) | 00:08:00 | ||
Section 14 - Wireless Networking | |||
Basic WAP Setup | 00:11:00 | ||
Wireless Encryption | 00:10:00 | ||
Connecting to a Wi-Fi Network7 | 00:09:00 | ||
Enterprise Wireless | 00:16:00 | ||
Troubleshooting Wireless Connections | 00:07:00 | ||
Section 15 - The Internet | |||
Telnet and SSH | 00:07:00 | ||
Remote Desktop Connections | 00:08:00 | ||
The World Wide Web | 00:09:00 | ||
File Transfer Protocol (FTP) | 00:08:00 | ||
Proxy Servers | 00:06:00 | ||
Virtual Private Networks (VPNs) | 00:08:00 | ||
Internet of Things (IoT) | 00:03:00 | ||
Troubleshooting Internet Connections | 00:07:00 | ||
Browser Security | 00:09:00 | ||
Section 16 - Portable Computing | |||
Power Management | 00:11:00 | ||
Section 17 - Mobile Devices | |||
Touring Android | 00:10:00 | ||
Touring iOS | 00:07:00 | ||
Virtual Reality | 00:02:00 | ||
Section 18 - Maintaining And Securing Mobile Devices | |||
Maintaining Mobile Devices | 00:11:00 | ||
Mobile Devices and E-mail | 00:09:00 | ||
Mobile Device Security | 00:08:00 | ||
Mobile Device Troubleshooting | 00:09:00 | ||
Section 19 - Securing Computers | |||
Threats | 00:10:00 | ||
Dealing with Threats | 00:08:00 | ||
Physical Security | 00:08:00 | ||
Passwords and Authentication | 00:14:00 | ||
Multifactor Authentication (MFA) | 00:05:00 | ||
Malware | 00:13:00 | ||
Anti-Malware | 00:11:00 | ||
Social Engineering | 00:06:00 | ||
Licensing | 00:09:00 | ||
Incident Response | 00:05:00 | ||
Environmental Controls | 00:06:00 | ||
Malware in Action | 00:08:00 | ||
Section 20 - Operational Procedures | |||
Documents You Need to Know | 00:09:00 | ||
Data You Need to Know | 00:04:00 | ||
Change Management | 00:06:00 | ||
The Zen of Backup | 00:11:00 | ||
Recycling and Data Destruction | 00:07:00 | ||
Ticketing Systems | 00:07:00 |
No Reviews found for this course.
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.