CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
- Offered byUDEMY
CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam at UDEMY Overview
Duration | 36 hours |
Total fee | ₹399 |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam at UDEMY Highlights
- 30-Day Money-Back Guarantee
- Certificate of completion
- Full lifetime access
- Learn from 2 downloadable resources,1 article and 1 practise test
CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam at UDEMY Course details
- How to pass the CompTIA A+ (220-1102) Core 2 exam on your first attempt
- What your weak areas are in the CompTIA A+ curriculum so you can restudy those areas
- Install, configure, and maintain computer equipment, mobile devices, and software for end users
- Service components based on customer requirements
- Understand networking basics and apply basic cybersecurity methods to mitigate threats
- Properly and safely diagnose, resolve, and document common hardware and software issues
- Apply troubleshooting skills and provide customer support using appropriate communication skills
- Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments
- *** Taught by a Best Selling Certification Instructor *** This course provides everything you need in order to study for the CompTIA A+ Core 2 (220-1102) exam, including a downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day! Jason Dion is an expert in information technology and cybersecurity with over 20 years of experience, and he has designed this course to be a fun way to learn what you need to know to pass the CompTIA A+ Core 2 (220-1102) exam or to better prepare yourself to serve as a service analyst or computer technician in your organization information technology (IT) divisions. The CompTIA A+ Core 2 (220-1102) certification is a vendor-neutral certification that validates your knowledge and ability to conduct install, configure, and troubleshoot software and operating system issues in your organization. This certification tests your ability to think on your feet while performing critical IT support functions. The CompTIA A+ certification is designed for early-career data analysts with the equivalent of 9-12 months of on-the-job knowledge. The CompTIA A+ Core 2 exam is focused on supporting operating systems and software in order to support a wide variety of different devices used by a diverse and global workforce. CompTIA A+ Core 2 (220-1102) is an early-career IT support technician certification covering the theory and technical skills required to support operating system, applications, and security in a corporate environment using the proper operational procedures. To help you practice for the CompTIA A+ Core 2 (220-1102) exam, this course even comes with a realistic practice exam containing 90 multiple-choice questions spread across the four domains tested by the CompTIA A+ Core 2 (220-1102) certification exam! This course will provide you with full coverage of the five domains of the CompTIA A+ Core 2 (220-1102) exam: Operating Systems (31%)Security (25%)Software Troubleshooting (22%)Operational Procedures (22%)This course stays current and up-to-date with the latest release of the CompTIA A+ Core 2 exam (220-1102), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason! This course is brought to you by Dion Training Solutions, a CompTIA Platinum Delivery Partner, and aligns directly with the OFFICIAL CompTIA A+ (220-1102) Certification Study Guide. What Other Students Are Saying About Our Courses: Jason's courses are immensely helpful - they dramatically expedite the learning process (this is my second certification that I've used Jason's resources to study for). The practice exams not only cover the full range of subject matter, but they also are structured in the same manner as those that can be expected on exam day using real-life scenarios and encouraging the mind to apply the knowledge more flexibly than just memorization/repeat learning. (Holly, 5 stars)Great course, very detailed. Passed the exam on the first try. I have recommended this course to everyone I know. (Jose D., 5 stars)I passed on 1st try, that's all I can ask for! (Tim, 5 stars)Upon completion of this course, you will earn 36 CEUs towards the renewal of your CompTIA A+ certification.
CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam at UDEMY Curriculum
Introduction
Welcome
Download your free study guide
Exam Tips
Checkpoint: Introduction
Operating System Types
Operating System Types (OBJ. 1.8)
Windows (OBJ. 1.8)
Linux (OBJ. 1.8)
Android (OBJ. 1.8)
Chrome OS (OBJ. 1.8)
macOS (OBJ. 1.8)
iOS and iPadOS (OBJ. 1.8)
Operating Systems (OBJ. 1.8)
Filesystem Types (OBJ. 1.8)
Compatibility Concerns (OBJ. 1.8)
Checkpoint: Operating System Types
Windows Versions
Windows Versions (OBJ. 1.1 & 1.7)
64-bit vs 32-bit Versions (OBJ. 1.7)
Windows Home (OBJ. 1.1)
Windows Pro (OBJ. 1.1)
Windows Enterprise and Education (OBJ. 1.1)
Upgrading Windows (OBJ. 1.1)
In-place Upgrade (OBJ. 1.1)
Checkpoint: Windows Versions
Windows Installation
Windows Installation (OBJ. 1.9)
Installation Types (OBJ. 1.9)
Upgrade Considerations (OBJ. 1.9)
Product Lifecycle (OBJ. 1.9)
Boot Methods (OBJ. 1.9)
Partitioning Storage Devices (OBJ. 1.9)
Recovery and Reset (OBJ. 1.9)
Using a Recovery Partition (OBJ. 1.9)
Checkpoint: Windows Installation
Application Configuration
Application Configuration (OBJ. 1.7)
Application Requirements (OBJ. 1.7)
Distribution Methods (OBJ. 1.7)
Business Impacts (OBJ. 1.7)
Operational Impacts (OBJ. 1.7)
Device Impacts (OBJ. 1.7)
Network Impacts (OBJ. 1.7)
Installing Applications (OBJ. 1.7)
Checkpoint: Application Configuration
Windows Networking
Windows Networking (OBJ. 1.6)
Wired Connections (OBJ. 1.6)
Wireless Connections (OBJ. 1.6)
WWAN Connections (OBJ. 1.6)
VPN Connections (OBJ. 1.6)
Network Client Configuration (OBJ. 1.6)
Network Locations (OBJ. 1.6)
Proxy Settings (OBJ. 1.6)
Checkpoint: Windows Networking
Windows Control Panel
Windows Control Panel (OBJ. 1.4)
Account Settings (OBJ. 1.4)
Programs and Features (OBJ. 1.4)
Devices and Printers (OBJ. 1.4)
Internet Options (OBJ. 1.4)
Network and Sharing Center (OBJ. 1.4)
Windows Defender Firewall (OBJ. 1.4)
Mail (OBJ. 1.4)
Sound (OBJ. 1.4)
System (OBJ. 1.4)
Device Manager (OBJ. 1.4)
Administrative Tools (OBJ. 1.4)
Indexing Options (OBJ. 1.4)
File Explorer Options (OBJ. 1.4)
Power Options (OBJ. 1.4)
Ease of Access (OBJ. 1.4)
Checkpoint: Windows Control Panel
Windows Settings
Windows Settings (OBJ. 1.5)
Accounts (OBJ. 1.5)
System Settings (OBJ. 1.5)
Update and Security (OBJ. 1.5)
Network and Internet (OBJ. 1.5)
Devices (OBJ. 1.5)
Privacy (OBJ. 1.5)
Time and Language (OBJ. 1.5)
Personalization (OBJ. 1.5)
Apps (OBJ. 1.5)
Gaming (OBJ. 1.5)
Checkpoint: Windows Settings
Windows Tools
Windows Tools (OBJ. 1.3)
Task Manager (OBJ. 1.3)
Device Manager (OBJ. 1.3)
Disk Management Console (OBJ. 1.3)
Disk Maintenance Tools (OBJ. 1.3)
Task Scheduler (OBJ. 1.3)
Event Viewer (OBJ. 1.3)
Performance Monitor (OBJ. 1.3)
Local Users and Groups (OBJ. 1.3)
Group Policy Editor (OBJ. 1.3)
Certificate Manager (OBJ. 1.3)
System Information (OBJ. 1.3)
Resource Monitor (OBJ. 1.3)
System Configuration (OBJ. 1.3)
Registry Editor (OBJ. 1.3)
Microsoft Management Console (OBJ. 1.3)
Checkpoint: Windows Tools
Windows Command Line Tools
Windows Command Line Tools (OBJ. 1.2)
Using the GUI (OBJ. 1.2)
Using the Command Prompt (OBJ. 1.2)
Navigation Commands (OBJ. 1.2)
Copying Commands (OBJ. 1.2)
Disk Management Commands (OBJ. 1.2)
Shutdown (OBJ. 1.2)
System File Checker (OBJ. 1.2)
Windows Version (OBJ. 1.2)
Network Troubleshooting Commands (OBJ. 1.2)
Name Resolution Commands (OBJ. 1.2)
The netstat Command (OBJ. 1.2)
Group Policy Commands (OBJ. 1.2)
Checkpoint: Windows Command Line Tools
Windows Shares
Windows Shares (OBJ. 1.2, 1.6, & 2.5)
Workgroups and Domains (OBJ. 1.6)
File Sharing (OBJ. 2.5)
NTFS Permissions (OBJ. 2.5)
Mapping Drives (OBJ. 1.6)
The net Command (OBJ. 1.2)
User Data on Domains (OBJ. 1.6)
Printer Sharing (OBJ. 1.6)
Checkpoint: Windows Shares
macOS
macOS (OBJ. 1.10)
Finder, Dock, and Spotlight (OBJ. 1.10)
Mission Control (OBJ. 1.10)
Terminal (OBJ. 1.10)
Disk Utility (OBJ. 1.10)
File Vault (OBJ. 1.10)
Remote Disc (OBJ. 1.10)
Gestures (OBJ. 1.10)
Keychain (OBJ. 1.10)
iCloud and Apple ID (OBJ. 1.10)
System Preferences (OBJ. 1.10)
Managing macOS Applications (OBJ. 1.10)
Best Practices for macOS (OBJ. 1.10)
Checkpoint: macOS
Linux
Linux (OBJ. 1.11)
Shells and Terminals (OBJ. 1.11)
Linux Navigation (OBJ. 1.11)
File Management Commands (OBJ. 1.11)
Disk Usage Commands (OBJ. 1.11)
Text Manipulation (OBJ. 1.11)
Search Commands (OBJ. 1.11)
User Management (OBJ. 1.11)
File Permission Commands (OBJ. 1.11)
Application Management (OBJ. 1.11)
Resource Management Commands (OBJ. 1.11)
Networking Commands (OBJ. 1.11)
Getting Help in Linux (OBJ. 1.11)
Best Practices for Linux (OBJ. 1.11)
Checkpoint: Linux
Threats and Vulnerabilities
Threats and Vulnerabilities (OBJ. 2.4)
CIA Triad (OBJ. 2.4)
Vulnerabilities (OBJ. 2.4)
Zero-day Attack (OBJ. 2.4)
DoS and DDoS (OBJ. 2.4)
Spoofing (OBJ. 2.4)
On-path Attack (OBJ. 2.4)
SQL Injection (OBJ. 2.4)
XSS and XSRF (OBJ. 2.4)
Password Cracking (OBJ. 2.4)
Insider Threat (OBJ. 2.4)
Checkpoint: Threats and Vulnerabilities
Malware
Malware (OBJ. 2.3)
Viruses, Worms, and Trojans (OBJ. 2.3)
Viruses and Trojans (OBJ. 2.3)
Ransomware (OBJ. 2.3)
Spyware (OBJ. 2.3)
Rootkits (OBJ. 2.3)
Botnets and Zombies (OBJ. 2.3)
Symptoms of Infection (OBJ. 2.3)
Removing Malware (OBJ. 3.3)
Preventing Malware (OBJ. 2.3)
Checkpoint: Malware
Social Engineering
Social Engineering (OBJ. 2.3 & 2.4)
Phishing Attacks (OBJ. 2.4)
Anti-phishing Training (OBJ. 2.3)
Spam (OBJ. 2.3)
Impersonation (OBJ. 2.4)
Pretexting (OBJ. 2.4)
Social Engineering Attacks (OBJ. 2.4)
Evil Twin (OBJ. 2.4)
Software Firewalls (OBJ. 2.3)
Using Software Firewalls (OBJ. 2.3)
User Education (OBJ. 2.3)
Checkpoint: Social Engineering
Security Controls
Security Controls (OBJ. 2.1)
Perimeter Defense (OBJ. 2.1)
Surveillance (OBJ. 2.1)
Physical Access Controls (OBJ. 2.1)
Security Principles (OBJ. 2.1)
Multifactor Authentication (OBJ. 2.1)
Mobile Device Management (OBJ. 2.1)
Active Directory Security (OBJ. 2.1)
Checkpoint: Security Controls
Wireless Security
Wireless Security (OBJ. 2.2 & 2.9)
Wireless Encryption (OBJ. 2.2)
Cracking Wireless Networks (OBJ. 2.2)
WPA3 (OBJ. 2.2)
Wireless Authentication (OBJ. 2.2)
Wireless Network Security (OBJ. 2.9)
Configuring SOHO Networks (OBJ. 2.9)
Securing Wireless Networks (OBJ. 2.9)
Configuring SOHO Firewalls (OBJ. 2.9)
Checkpoint: Wireless Security
Mobile Device Security
Mobile Device Security (OBJ. 2.7)
Securing Wireless Devices (OBJ. 2.7)
Mobile Device Unlocking (OBJ. 2.7)
Mobile Malware (OBJ. 2.7)
Mobile Device Theft (OBJ. 2.7)
Mobile App Security (OBJ. 2.7)
Deployment Options (OBJ. 2.7)
Hardening Mobile Devices (OBJ. 2.7)
Implementing Mobile Device Security (OBJ. 2.7)
IoT Vulnerabilities (OBJ. 2.7)
Checkpoint: Mobile Device Security
Windows Security
Windows Security (OBJ. 2.5)
Login Options (OBJ. 2.5)
Users and Groups (OBJ. 2.5)
Encrypting Windows Devices (OBJ. 2.5)
File Permissions (OBJ. 2.5)
Microsoft Defender Antivirus (OBJ. 2.5)
Microsoft Defender Firewall (OBJ. 2.5)
Checkpoint: Windows Security
Securing Workstations
Securing Workstations (OBJ. 2.6 & 2.8)
Account Management (OBJ. 2.6)
AutoRun and AutoPlay (OBJ. 2.6)
Password Best Practices (OBJ. 2.6)
Encryption Best Practices (OBJ. 2.6)
End-user Best Practices (OBJ. 2.6)
Data Destruction (OBJ. 2.8)
Data Destruction Methods (OBJ. 2.8)
Checkpoint: Securing Workstations
Securing Web Browsers
Securing Web Browsers (OBJ. 2.10)
Web Browser Installation (OBJ. 2.10)
Extensions and Plug-ins (OBJ. 2.10)
Password Managers (OBJ. 2.10)
Encrypted Browsing (OBJ. 2.10)
Private Browsing (OBJ. 2.10)
Pop-up and Ad Blockers (OBJ. 2.10)
Cache and History Clearing (OBJ. 2.10)
Profile Synchronization (OBJ. 2.10)
Checkpoint: Securing Web Browsers
Supporting Network Operations
Supporting Network Operations (OBJ. 4.1 & 4.2)
Ticketing System (OBJ. 4.1)
Using a Ticketing System (OBJ. 4.1)
Knowledge Base Articles (OBJ. 4.1)
Asset Management (OBJ. 4.1)
Change Management (OBJ. 4.2)
Conducting Change Management (OBJ. 4.2)
Documentation Types (OBJ. 4.1)
Checkpoint: Supporting Network Operations
Backup, Recovery, and Safety
Backup, Recovery, and Safety
Backup and Recovery (OBJ. 4.3)
Backup Schemes (OBJ. 4.3)
Redundant Power (OBJ. 4.5)
Electrical Safety (OBJ. 4.4)
Component Handling and Storage (OBJ. 4.4)
HVAC Systems (OBJ. 4.5)
Proper Handling and Disposal (OBJ. 4.4 & 4.5)
Personal Safety (OBJ. 4.4 & 4.5)
Checkpoint: Backup, Recovery, and Safety
Policy and Privacy Concepts
Policy and Privacy Concepts (OBJ. 4.6)
Incident Response (OBJ. 4.6)
Chain of Custody (OBJ. 4.6)
Order of Volatility (OBJ. 4.6)
Data Collection Procedures (OBJ. 4.6)
Conduct Disk Imaging (OBJ. 4.6)
Licensing, EULA, and DRM (OBJ. 4.6)
Data Classification (OBJ. 4.6)
Data Retention (OBJ. 4.6)
PII, PHI, and PCI-DSS (OBJ. 4.6)
Security Policies (OBJ. 4.6)
Checkpoint: Policy and Privacy Concepts
Scripting
Scripting (OBJ. 4.8)
Script File Types (OBJ. 4.8)
Variables (OBJ. 4.8)
Loops (OBJ. 4.8)
Logic Control (OBJ. 4.8)
Bash Script Example (OBJ. 4.8)
Automation Scripting (OBJ. 4.8)
Scripting Considerations (OBJ. 4.8)
Checkpoint: Scripting
Remote Access Support
Remote Access Support (OBJ. 4.9)
Remote Access Protocols (OBJ. 4.9)
Connecting to a VPN (OBJ. 4.9)
Remote Monitoring and Management (RMM) (OBJ. 4.9)
Microsoft Remote Assistance (MSRA) (OBJ. 4.9)
Other Remote Access Tools (OBJ. 4.9)
Desktop Management Software (OBJ. 4.9)
Checkpoint: Remote Access Support
Troubleshooting Windows
Troubleshooting Windows (OBJ. 3.1)
Boot Issues (OBJ. 3.1)
Boot Recovery Tools (OBJ. 3.1)
Update or Driver Rollback (OBJ. 3.1)
System Restore (OBJ. 3.1)
System Reinstall or Reimage (OBJ. 3.1)
Performance Issues (OBJ. 3.1)
System Fault Issues (OBJ. 3.1)
System Instability Issues (OBJ. 3.1)
Application and Service Issues (OBJ. 3.1)
Checkpoint: Troubleshooting Windows
Troubleshooting Workstation Security
Troubleshooting Workstation Security (OBJ. 3.2 & 3.3)
Malware Removal Process (OBJ. 3.3)
Infected Browser Symptoms (OBJ. 3.2)
Alerts and Notifications (OBJ. 3.2)
OS Update Failures (OBJ. 3.2)
File System Issues (OBJ. 3.2)
Checkpoint: Troubleshooting Workstation Security
Troubleshooting Mobile Issues
Troubleshooting Mobile Issues (OBJ. 3.4)
Reseting or Rebooting (OBJ. 3.4)
Mobile OS Update Failure (OBJ. 3.4)
Mobile Performance Issues (OBJ. 3.4)
Mobile App Issues (OBJ. 3.4)
Mobile Connectivity Issues (OBJ. 3.4)
Mobile Battery Issues (OBJ. 3.4)
Screen Autorotation Issues (OBJ. 3.4)
Troubleshooting Mobile Issues
Troubleshooting Mobile Security
Troubleshooting Mobile Security (OBJ. 3.5)
Rooting and Jailbreaking (OBJ. 3.5)
Sideloading Apps (OBJ. 3.5)
Mobile Malware Symptoms (OBJ. 3.5)
Unexpected Application Behavior (OBJ. 3.5)
Leaked Mobile Data (OBJ. 3.5)
Checkpoint: Troubleshooting Mobile Security
Professionalism
Professionalism (OBJ. 4.7)
Professional Appearance (OBJ. 4.7)
Respect Others' Time (OBJ. 4.7)
Proper Communication (OBJ. 4.7)
Dealing with Private Data (OBJ. 4.7)
Difficult Situations (OBJ. 4.7)
Checkpoint: Professionalism
Conclusion
Conclusion
CompTIA A+ (220-1102) Core 2 Practice Exam
Bonus: What's Next?