UDEMY
UDEMY Logo

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam 

  • Offered byUDEMY

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
 at 
UDEMY 
Overview

Pass the CompTIA A+ (220-1102) Core 2 exam with help from a top expert in the field!

Duration

36 hours

Total fee

399

Mode of learning

Online

Difficulty level

Beginner

Credential

Certificate

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
 at 
UDEMY 
Highlights

  • 30-Day Money-Back Guarantee
  • Certificate of completion
  • Full lifetime access
  • Learn from 2 downloadable resources,1 article and 1 practise test
Read more
Details Icon

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
 at 
UDEMY 
Course details

What are the course deliverables?
  • How to pass the CompTIA A+ (220-1102) Core 2 exam on your first attempt
  • What your weak areas are in the CompTIA A+ curriculum so you can restudy those areas
  • Install, configure, and maintain computer equipment, mobile devices, and software for end users
  • Service components based on customer requirements
  • Understand networking basics and apply basic cybersecurity methods to mitigate threats
  • Properly and safely diagnose, resolve, and document common hardware and software issues
  • Apply troubleshooting skills and provide customer support using appropriate communication skills
  • Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments
More about this course
  • *** Taught by a Best Selling Certification Instructor *** This course provides everything you need in order to study for the CompTIA A+ Core 2 (220-1102) exam, including a downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day! Jason Dion is an expert in information technology and cybersecurity with over 20 years of experience, and he has designed this course to be a fun way to learn what you need to know to pass the CompTIA A+ Core 2 (220-1102) exam or to better prepare yourself to serve as a service analyst or computer technician in your organization information technology (IT) divisions. The CompTIA A+ Core 2 (220-1102) certification is a vendor-neutral certification that validates your knowledge and ability to conduct install, configure, and troubleshoot software and operating system issues in your organization. This certification tests your ability to think on your feet while performing critical IT support functions. The CompTIA A+ certification is designed for early-career data analysts with the equivalent of 9-12 months of on-the-job knowledge. The CompTIA A+ Core 2 exam is focused on supporting operating systems and software in order to support a wide variety of different devices used by a diverse and global workforce. CompTIA A+ Core 2 (220-1102) is an early-career IT support technician certification covering the theory and technical skills required to support operating system, applications, and security in a corporate environment using the proper operational procedures. To help you practice for the CompTIA A+ Core 2 (220-1102) exam, this course even comes with a realistic practice exam containing 90 multiple-choice questions spread across the four domains tested by the CompTIA A+ Core 2 (220-1102) certification exam! This course will provide you with full coverage of the five domains of the CompTIA A+ Core 2 (220-1102) exam: Operating Systems (31%)Security (25%)Software Troubleshooting (22%)Operational Procedures (22%)This course stays current and up-to-date with the latest release of the CompTIA A+ Core 2 exam (220-1102), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason! This course is brought to you by Dion Training Solutions, a CompTIA Platinum Delivery Partner, and aligns directly with the OFFICIAL CompTIA A+ (220-1102) Certification Study Guide. What Other Students Are Saying About Our Courses: Jason's courses are immensely helpful - they dramatically expedite the learning process (this is my second certification that I've used Jason's resources to study for). The practice exams not only cover the full range of subject matter, but they also are structured in the same manner as those that can be expected on exam day using real-life scenarios and encouraging the mind to apply the knowledge more flexibly than just memorization/repeat learning. (Holly, 5 stars)Great course, very detailed. Passed the exam on the first try. I have recommended this course to everyone I know. (Jose D., 5 stars)I passed on 1st try, that's all I can ask for! (Tim, 5 stars)Upon completion of this course, you will earn 36 CEUs towards the renewal of your CompTIA A+ certification.
Read more

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
 at 
UDEMY 
Curriculum

Introduction

Welcome

Download your free study guide

Exam Tips

Checkpoint: Introduction

Operating System Types

Operating System Types (OBJ. 1.8)

Windows (OBJ. 1.8)

Linux (OBJ. 1.8)

Android (OBJ. 1.8)

Chrome OS (OBJ. 1.8)

macOS (OBJ. 1.8)

iOS and iPadOS (OBJ. 1.8)

Operating Systems (OBJ. 1.8)

Filesystem Types (OBJ. 1.8)

Compatibility Concerns (OBJ. 1.8)

Checkpoint: Operating System Types

Windows Versions

Windows Versions (OBJ. 1.1 & 1.7)

64-bit vs 32-bit Versions (OBJ. 1.7)

Windows Home (OBJ. 1.1)

Windows Pro (OBJ. 1.1)

Windows Enterprise and Education (OBJ. 1.1)

Upgrading Windows (OBJ. 1.1)

In-place Upgrade (OBJ. 1.1)

Checkpoint: Windows Versions

Windows Installation

Windows Installation (OBJ. 1.9)

Installation Types (OBJ. 1.9)

Upgrade Considerations (OBJ. 1.9)

Product Lifecycle (OBJ. 1.9)

Boot Methods (OBJ. 1.9)

Partitioning Storage Devices (OBJ. 1.9)

Recovery and Reset (OBJ. 1.9)

Using a Recovery Partition (OBJ. 1.9)

Checkpoint: Windows Installation

Application Configuration

Application Configuration (OBJ. 1.7)

Application Requirements (OBJ. 1.7)

Distribution Methods (OBJ. 1.7)

Business Impacts (OBJ. 1.7)

Operational Impacts (OBJ. 1.7)

Device Impacts (OBJ. 1.7)

Network Impacts (OBJ. 1.7)

Installing Applications (OBJ. 1.7)

Checkpoint: Application Configuration

Windows Networking

Windows Networking (OBJ. 1.6)

Wired Connections (OBJ. 1.6)

Wireless Connections (OBJ. 1.6)

WWAN Connections (OBJ. 1.6)

VPN Connections (OBJ. 1.6)

Network Client Configuration (OBJ. 1.6)

Network Locations (OBJ. 1.6)

Proxy Settings (OBJ. 1.6)

Checkpoint: Windows Networking

Windows Control Panel

Windows Control Panel (OBJ. 1.4)

Account Settings (OBJ. 1.4)

Programs and Features (OBJ. 1.4)

Devices and Printers (OBJ. 1.4)

Internet Options (OBJ. 1.4)

Network and Sharing Center (OBJ. 1.4)

Windows Defender Firewall (OBJ. 1.4)

Mail (OBJ. 1.4)

Sound (OBJ. 1.4)

System (OBJ. 1.4)

Device Manager (OBJ. 1.4)

Administrative Tools (OBJ. 1.4)

Indexing Options (OBJ. 1.4)

File Explorer Options (OBJ. 1.4)

Power Options (OBJ. 1.4)

Ease of Access (OBJ. 1.4)

Checkpoint: Windows Control Panel

Windows Settings

Windows Settings (OBJ. 1.5)

Accounts (OBJ. 1.5)

System Settings (OBJ. 1.5)

Update and Security (OBJ. 1.5)

Network and Internet (OBJ. 1.5)

Devices (OBJ. 1.5)

Privacy (OBJ. 1.5)

Time and Language (OBJ. 1.5)

Personalization (OBJ. 1.5)

Apps (OBJ. 1.5)

Gaming (OBJ. 1.5)

Checkpoint: Windows Settings

Windows Tools

Windows Tools (OBJ. 1.3)

Task Manager (OBJ. 1.3)

Device Manager (OBJ. 1.3)

Disk Management Console (OBJ. 1.3)

Disk Maintenance Tools (OBJ. 1.3)

Task Scheduler (OBJ. 1.3)

Event Viewer (OBJ. 1.3)

Performance Monitor (OBJ. 1.3)

Local Users and Groups (OBJ. 1.3)

Group Policy Editor (OBJ. 1.3)

Certificate Manager (OBJ. 1.3)

System Information (OBJ. 1.3)

Resource Monitor (OBJ. 1.3)

System Configuration (OBJ. 1.3)

Registry Editor (OBJ. 1.3)

Microsoft Management Console (OBJ. 1.3)

Checkpoint: Windows Tools

Windows Command Line Tools

Windows Command Line Tools (OBJ. 1.2)

Using the GUI (OBJ. 1.2)

Using the Command Prompt (OBJ. 1.2)

Navigation Commands (OBJ. 1.2)

Copying Commands (OBJ. 1.2)

Disk Management Commands (OBJ. 1.2)

Shutdown (OBJ. 1.2)

System File Checker (OBJ. 1.2)

Windows Version (OBJ. 1.2)

Network Troubleshooting Commands (OBJ. 1.2)

Name Resolution Commands (OBJ. 1.2)

The netstat Command (OBJ. 1.2)

Group Policy Commands (OBJ. 1.2)

Checkpoint: Windows Command Line Tools

Windows Shares

Windows Shares (OBJ. 1.2, 1.6, & 2.5)

Workgroups and Domains (OBJ. 1.6)

File Sharing (OBJ. 2.5)

NTFS Permissions (OBJ. 2.5)

Mapping Drives (OBJ. 1.6)

The net Command (OBJ. 1.2)

User Data on Domains (OBJ. 1.6)

Printer Sharing (OBJ. 1.6)

Checkpoint: Windows Shares

macOS

macOS (OBJ. 1.10)

Finder, Dock, and Spotlight (OBJ. 1.10)

Mission Control (OBJ. 1.10)

Terminal (OBJ. 1.10)

Disk Utility (OBJ. 1.10)

File Vault (OBJ. 1.10)

Remote Disc (OBJ. 1.10)

Gestures (OBJ. 1.10)

Keychain (OBJ. 1.10)

iCloud and Apple ID (OBJ. 1.10)

System Preferences (OBJ. 1.10)

Managing macOS Applications (OBJ. 1.10)

Best Practices for macOS (OBJ. 1.10)

Checkpoint: macOS

Linux

Linux (OBJ. 1.11)

Shells and Terminals (OBJ. 1.11)

Linux Navigation (OBJ. 1.11)

File Management Commands (OBJ. 1.11)

Disk Usage Commands (OBJ. 1.11)

Text Manipulation (OBJ. 1.11)

Search Commands (OBJ. 1.11)

User Management (OBJ. 1.11)

File Permission Commands (OBJ. 1.11)

Application Management (OBJ. 1.11)

Resource Management Commands (OBJ. 1.11)

Networking Commands (OBJ. 1.11)

Getting Help in Linux (OBJ. 1.11)

Best Practices for Linux (OBJ. 1.11)

Checkpoint: Linux

Threats and Vulnerabilities

Threats and Vulnerabilities (OBJ. 2.4)

CIA Triad (OBJ. 2.4)

Vulnerabilities (OBJ. 2.4)

Zero-day Attack (OBJ. 2.4)

DoS and DDoS (OBJ. 2.4)

Spoofing (OBJ. 2.4)

On-path Attack (OBJ. 2.4)

SQL Injection (OBJ. 2.4)

XSS and XSRF (OBJ. 2.4)

Password Cracking (OBJ. 2.4)

Insider Threat (OBJ. 2.4)

Checkpoint: Threats and Vulnerabilities

Malware

Malware (OBJ. 2.3)

Viruses, Worms, and Trojans (OBJ. 2.3)

Viruses and Trojans (OBJ. 2.3)

Ransomware (OBJ. 2.3)

Spyware (OBJ. 2.3)

Rootkits (OBJ. 2.3)

Botnets and Zombies (OBJ. 2.3)

Symptoms of Infection (OBJ. 2.3)

Removing Malware (OBJ. 3.3)

Preventing Malware (OBJ. 2.3)

Checkpoint: Malware

Social Engineering

Social Engineering (OBJ. 2.3 & 2.4)

Phishing Attacks (OBJ. 2.4)

Anti-phishing Training (OBJ. 2.3)

Spam (OBJ. 2.3)

Impersonation (OBJ. 2.4)

Pretexting (OBJ. 2.4)

Social Engineering Attacks (OBJ. 2.4)

Evil Twin (OBJ. 2.4)

Software Firewalls (OBJ. 2.3)

Using Software Firewalls (OBJ. 2.3)

User Education (OBJ. 2.3)

Checkpoint: Social Engineering

Security Controls

Security Controls (OBJ. 2.1)

Perimeter Defense (OBJ. 2.1)

Surveillance (OBJ. 2.1)

Physical Access Controls (OBJ. 2.1)

Security Principles (OBJ. 2.1)

Multifactor Authentication (OBJ. 2.1)

Mobile Device Management (OBJ. 2.1)

Active Directory Security (OBJ. 2.1)

Checkpoint: Security Controls

Wireless Security

Wireless Security (OBJ. 2.2 & 2.9)

Wireless Encryption (OBJ. 2.2)

Cracking Wireless Networks (OBJ. 2.2)

WPA3 (OBJ. 2.2)

Wireless Authentication (OBJ. 2.2)

Wireless Network Security (OBJ. 2.9)

Configuring SOHO Networks (OBJ. 2.9)

Securing Wireless Networks (OBJ. 2.9)

Configuring SOHO Firewalls (OBJ. 2.9)

Checkpoint: Wireless Security

Mobile Device Security

Mobile Device Security (OBJ. 2.7)

Securing Wireless Devices (OBJ. 2.7)

Mobile Device Unlocking (OBJ. 2.7)

Mobile Malware (OBJ. 2.7)

Mobile Device Theft (OBJ. 2.7)

Mobile App Security (OBJ. 2.7)

Deployment Options (OBJ. 2.7)

Hardening Mobile Devices (OBJ. 2.7)

Implementing Mobile Device Security (OBJ. 2.7)

IoT Vulnerabilities (OBJ. 2.7)

Checkpoint: Mobile Device Security

Windows Security

Windows Security (OBJ. 2.5)

Login Options (OBJ. 2.5)

Users and Groups (OBJ. 2.5)

Encrypting Windows Devices (OBJ. 2.5)

File Permissions (OBJ. 2.5)

Microsoft Defender Antivirus (OBJ. 2.5)

Microsoft Defender Firewall (OBJ. 2.5)

Checkpoint: Windows Security

Securing Workstations

Securing Workstations (OBJ. 2.6 & 2.8)

Account Management (OBJ. 2.6)

AutoRun and AutoPlay (OBJ. 2.6)

Password Best Practices (OBJ. 2.6)

Encryption Best Practices (OBJ. 2.6)

End-user Best Practices (OBJ. 2.6)

Data Destruction (OBJ. 2.8)

Data Destruction Methods (OBJ. 2.8)

Checkpoint: Securing Workstations

Securing Web Browsers

Securing Web Browsers (OBJ. 2.10)

Web Browser Installation (OBJ. 2.10)

Extensions and Plug-ins (OBJ. 2.10)

Password Managers (OBJ. 2.10)

Encrypted Browsing (OBJ. 2.10)

Private Browsing (OBJ. 2.10)

Pop-up and Ad Blockers (OBJ. 2.10)

Cache and History Clearing (OBJ. 2.10)

Profile Synchronization (OBJ. 2.10)

Checkpoint: Securing Web Browsers

Supporting Network Operations

Supporting Network Operations (OBJ. 4.1 & 4.2)

Ticketing System (OBJ. 4.1)

Using a Ticketing System (OBJ. 4.1)

Knowledge Base Articles (OBJ. 4.1)

Asset Management (OBJ. 4.1)

Change Management (OBJ. 4.2)

Conducting Change Management (OBJ. 4.2)

Documentation Types (OBJ. 4.1)

Checkpoint: Supporting Network Operations

Backup, Recovery, and Safety

Backup, Recovery, and Safety

Backup and Recovery (OBJ. 4.3)

Backup Schemes (OBJ. 4.3)

Redundant Power (OBJ. 4.5)

Electrical Safety (OBJ. 4.4)

Component Handling and Storage (OBJ. 4.4)

HVAC Systems (OBJ. 4.5)

Proper Handling and Disposal (OBJ. 4.4 & 4.5)

Personal Safety (OBJ. 4.4 & 4.5)

Checkpoint: Backup, Recovery, and Safety

Policy and Privacy Concepts

Policy and Privacy Concepts (OBJ. 4.6)

Incident Response (OBJ. 4.6)

Chain of Custody (OBJ. 4.6)

Order of Volatility (OBJ. 4.6)

Data Collection Procedures (OBJ. 4.6)

Conduct Disk Imaging (OBJ. 4.6)

Licensing, EULA, and DRM (OBJ. 4.6)

Data Classification (OBJ. 4.6)

Data Retention (OBJ. 4.6)

PII, PHI, and PCI-DSS (OBJ. 4.6)

Security Policies (OBJ. 4.6)

Checkpoint: Policy and Privacy Concepts

Scripting

Scripting (OBJ. 4.8)

Script File Types (OBJ. 4.8)

Variables (OBJ. 4.8)

Loops (OBJ. 4.8)

Logic Control (OBJ. 4.8)

Bash Script Example (OBJ. 4.8)

Automation Scripting (OBJ. 4.8)

Scripting Considerations (OBJ. 4.8)

Checkpoint: Scripting

Remote Access Support

Remote Access Support (OBJ. 4.9)

Remote Access Protocols (OBJ. 4.9)

Connecting to a VPN (OBJ. 4.9)

Remote Monitoring and Management (RMM) (OBJ. 4.9)

Microsoft Remote Assistance (MSRA) (OBJ. 4.9)

Other Remote Access Tools (OBJ. 4.9)

Desktop Management Software (OBJ. 4.9)

Checkpoint: Remote Access Support

Troubleshooting Windows

Troubleshooting Windows (OBJ. 3.1)

Boot Issues (OBJ. 3.1)

Boot Recovery Tools (OBJ. 3.1)

Update or Driver Rollback (OBJ. 3.1)

System Restore (OBJ. 3.1)

System Reinstall or Reimage (OBJ. 3.1)

Performance Issues (OBJ. 3.1)

System Fault Issues (OBJ. 3.1)

System Instability Issues (OBJ. 3.1)

Application and Service Issues (OBJ. 3.1)

Checkpoint: Troubleshooting Windows

Troubleshooting Workstation Security

Troubleshooting Workstation Security (OBJ. 3.2 & 3.3)

Malware Removal Process (OBJ. 3.3)

Infected Browser Symptoms (OBJ. 3.2)

Alerts and Notifications (OBJ. 3.2)

OS Update Failures (OBJ. 3.2)

File System Issues (OBJ. 3.2)

Checkpoint: Troubleshooting Workstation Security

Troubleshooting Mobile Issues

Troubleshooting Mobile Issues (OBJ. 3.4)

Reseting or Rebooting (OBJ. 3.4)

Mobile OS Update Failure (OBJ. 3.4)

Mobile Performance Issues (OBJ. 3.4)

Mobile App Issues (OBJ. 3.4)

Mobile Connectivity Issues (OBJ. 3.4)

Mobile Battery Issues (OBJ. 3.4)

Screen Autorotation Issues (OBJ. 3.4)

Troubleshooting Mobile Issues

Troubleshooting Mobile Security

Troubleshooting Mobile Security (OBJ. 3.5)

Rooting and Jailbreaking (OBJ. 3.5)

Sideloading Apps (OBJ. 3.5)

Mobile Malware Symptoms (OBJ. 3.5)

Unexpected Application Behavior (OBJ. 3.5)

Leaked Mobile Data (OBJ. 3.5)

Checkpoint: Troubleshooting Mobile Security

Professionalism

Professionalism (OBJ. 4.7)

Professional Appearance (OBJ. 4.7)

Respect Others' Time (OBJ. 4.7)

Proper Communication (OBJ. 4.7)

Dealing with Private Data (OBJ. 4.7)

Difficult Situations (OBJ. 4.7)

Checkpoint: Professionalism

Conclusion

Conclusion

CompTIA A+ (220-1102) Core 2 Practice Exam

Bonus: What's Next?

Faculty Icon

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
 at 
UDEMY 
Faculty details

Dion Training Solutions • ATO for ITIL & PRINCE2
Designation : Courses in IT Ops, Cyber Security, and Project Management
Dion Training Solutions • ATO for ITIL & PRINCE2
Designation : Courses in IT Ops, Cyber Security, and Project Management
Jason Dion • 1.8 Million+ Enrollments Worldwide
Designation : CISSP, CEH, Pentest+, CySA+, Sec+, Net+, A+, PRINCE2, ITIL

Other courses offered by UDEMY

549
50 hours
– / –
3 K
10 hours
– / –
549
4 hours
– / –
599
10 hours
– / –
View Other 2344 CoursesRight Arrow Icon
qna

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam
 at 
UDEMY 

Student Forum

chatAnything you would want to ask experts?
Write here...