CompTIA A+ 220-1102 (Core 2) Online Course
CompTIA A+ 220-1102 (Core 2) Online Course
About the course
This course prepares you for the CompTIA A+ Core 2 (220-1102) certification by covering all four exam domains: operating systems, security, software troubleshooting, and operational procedures. You’ll learn to work with multiple OS platforms, secure systems, troubleshoot software and mobile devices, and follow best practices in IT operations. Structured around the latest exam objectives, it equips you with the knowledge and skills needed to confidently pass the certification.
Who should take this Course?
The CompTIA A+ 220-1102 (Core 2) Online Course is ideal for aspiring IT professionals, career changers, students, and current technicians seeking to build or validate skills in operating systems, security, and IT support. It suits beginners looking to enter the tech industry, experienced staff aiming for certification, and freelancers or service providers who want to enhance credibility in troubleshooting and technical support.
Course Table of Contents
All about the CompTIA A+
What Is the CompTIA A+
Why Get CompTIA A+ Certified
How to Take the A+ Exam
What's on the CompTIA A+ Core 2 (220-1102) Exam?
How to Pass the CompTIA A+ Exams
How to Use the Video Course
Safety and Professionalism
Professional Communication, Part 1
Professional Communication, Part 2
Dealing with Difficult Customers
Physical Safety
The Visible Computer
Common Safety Procedures
What Is an Operating System
Users and Super Users
Why Windows?
Touring Windows 10 and 11
Touring the macOS
Touring Linux
Power Supplies
Mass Storage Technologies
Implementing Mass Storage
Understanding Partitioning
MBR Partitioning
GPT Partitioning
Understanding File Systems
Popular File Systems
Formatting in Action
Dynamic Disks
New Installation - First Drive
Software RAID in Storage Spaces
Encrypting Mass Storage
Maintaining Storage Disks
Essential Peripherals
Understanding USB
Webcams and Videoconferencing
Installing and Upgrading Operating Systems
Windows 10 Editions and Features
Windows 11 Editions and Features
Boot from Everything
Installing and Upgrading Windows 10
Post-Installation Tasks
Installing and Updating Linux
Upgrading macOS
Working with Operating Systems
The Task Manager
The Control Panel
Windows Settings
MMC and Additional Tools
What Is the Registry?
macOS Core Tools
Users, Groups, and Permissions
Introduction to Users and Groups
Managing Users and Groups
NTFS Permissions
Linux and macOS Permissions
File Explorer
Sharing Resources
Security Policies
Maintaining and Optimizing Operating Systems
Maintaining Windows
Maintaining macOS
Maintaining Linux
Working with Applications
Backing Up Your Data in Windows
Backing Up Your Data in Linux and macOS
Working with the Command-Line Interface
Understanding the CLI
Navigating the CLI
Working with Folders
Working with Files
Working with Drives
Super Copy Commands
Command-Line Permissions
Advanced Windows Commands
Advanced Linux Commands
Introduction to Scripting
Interpreted Languages
Scripting and the Terminal
Troubleshooting Operating Systems
Windows Recovery Environment
Advanced Windows Startup Options
Troubleshooting Boot Problems
Troubleshooting at the GUI
Troubleshooting Applications
Kernel Panic
Local Area Networking
Introduction to TCP/IP
Network IDs and Subnet Masks
Special IP Addresses
Network Address Translation (NAT)
Dynamic IP Addressing
Working with Connections
Understanding DNS
Working with DNS
Windows Naming
Working with Workgroups
Working with Active Directory
Windows Sharing with macOS and Linux
The net Command
Routers
Basic Router Configuration
Firewall Configuration
Windows Firewall
Port Forwarding
Advanced Router Configuration
Virtual LANs (VLANs)
Wireless Networking
Basic WAP Setup
Wireless Encryption
Connecting to a Wi-Fi Network
Enterprise Wireless
Troubleshooting Wireless Connections
The Internet
Telnet and SSH
Remote Desktop Connections
The World Wide Web
File Transfer Protocol (FTP)
Proxy Servers
Virtual Private Networks (VPNs)
Internet of Things (IoT)
Troubleshooting Internet Connections
Browser Security
Portable Computing
Mobile Devices
Touring Android
Touring iOS
Virtual Reality
Maintaining and Securing Mobile Devices
Maintaining Mobile Devices
Mobile Devices and E-Mail
Mobile Device Security
Mobile Device Troubleshooting
Securing Computers
Threats
Dealing with Threats
Physical Security
Passwords and Authentication
Multifactor Authentication (MFA)
Malware
Anti-Malware
Social Engineering
Licensing
Incident Response
Environmental Controls
Malware in Action
Operational Procedures
Documents You Need to Know
Data You Need to Know
Change Management
The Zen of Backup
Recycling and Data Destruction
Ticketing Systems
How learners rated this courses
4.7
(Based on 985 reviews)
No reviews yet. Be the first to review!