CompTIA A+ 220-1002 (Core 2)

Real World Knowledge Needed When Working in the IT Field.

Udemy
platform
English
language
Network & Security
category
CompTIA A+ 220-1002 (Core 2)
4
students
16.5 hours
content
Mar 2022
last update
$19.99
regular price

What you will learn

Learn the Expanding Areas of IT Support

Learn Baseline Security Topics

Understand, Maintain and Support Mobile Devices

Learn Networking Technology and Hardware

Understaand and Troubleshoot Virtualization and Cloud Computing

Description

Core 2, or the 220-1002 exam, is another part of the A+ certification process from CompTIA. Vision Training Systems will guide students through this valuable IT training to not only pass this exam, but to gain real world knowledge needed when working in the IT field. Once both CompTIA A plus courses have been completed, we recommend moving forward with Network+ and Security+.
This course covers expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures. CompTIA A+ covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.


Module 1 – Operation Systems

• Compare and contrast common operating system types and their purposes

• Compare and contrast features of Microsoft Windows versions

• Summarize general OS installation considerations and upgrade methods

• Given a scenario, use appropriate Microsoft command line tools

• Given a scenario, use Microsoft operating system features and tools

• Given a scenario, use Microsoft Windows Control Panel utilities

• Summarize application installation and configuration concepts

• Given a scenario, configure Microsoft Windows networking on a client/desktop

• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems

Module 2 – Security

• Summarize the importance of physical security measures

• Explain logical security concepts

• Compare and contrast wireless security protocols and authentication methods

• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods

• Compare and contrast social engineering, threats, and vulnerabilities

• Compare and contrast the differences of basic Microsoft Windows OS security settings

• Given a scenario, implement security best practices to secure a workstation

• Given a scenario, implement methods for securing mobile devices

• Given a scenario, implement appropriate data destruction and disposal methods

• Given a scenario, configure security on SOHO wireless and wired networks

Module 3 – Software Troubleshooting

•Given a scenario, troubleshoot Microsoft Windows OS problems

• Given a scenario, troubleshoot and resolve PC security issues

• Given a scenario, use best practice procedures for malware removal

• Given a scenario, troubleshoot mobile OS and application issues

• Given a scenario, troubleshoot mobile OS and application security issues

Module 4 – Operational Procedures

•Compare and contrast best practices associated with types of documentation

• Given a scenario, implement basic change management best practices

• Given a scenario, implement basic disaster prevention and recovery methods

• Explain common safety procedures

• Explain environmental impacts and appropriate controls

• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts

• Given a scenario, use proper communication techniques and professionalism

• Identify the basics of scripting

• Given a scenario, use remote access technologies

Content

Module 1 - Operating Systems

0.1 Intro to A+ Core2 Instructor
1.0 Intro to A+ Core2
1.1 Operating Systems Part1
1.1 Operating Systems Part2
1.2 Compare and Contrast features of Microsoft Windows Versions
1.3 Summarize General OS Installation Considerations Upgrade Methods
1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
1.4 Scenario use appropriate Microsoft Command Line Tools Part1
1.4 Scenario use appropriate Microsoft Command Line Tools Part2
1.4 Scenario use appropriate Microsoft Command Line Tools Demo
1.5 Microsoft Operating System and Tools Part1
1.5 Microsoft Operating System and Tools Part1 Demo
1.5 Microsoft Operating System and Tools Part2
1.5 Microsoft Operating System and Tools Part2 Demo
1.5 Microsoft Operating System and Tools Part3
1.5 Microsoft Operating System and Tools Part3 Demo
1.5 Microsoft Operating System and Tools Part4
1.5 Microsoft Operating System and Tools Part4 Demo
1.6 Microsoft Windows Control Panel Utilities
1.6 Microsoft Windows Control Panel Utilities Demo
1.7 Summerize Application Installation and Configuration Concepts
1.8 Configure Windows Networking on a Client Desktop
1.8 Configure Windows Networking on a Client Desktop Demo
1.9 Features and Tools of MAC OS and Linux Client Desktop

Module 2 - Security

2.1 Security - Physical Security Measures
2.2 Explain Logical Security Concepts
2.2 Explain Logical Security Concepts Part2
2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
2.6 Compare Contrast the different Microsoft Windows Security Settings
2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
2.7 Implement Security Best Practices to Secure a Workstation
2.7 Implement Security Best Practices to Secure a Workstation Part2
2.8 Implement Methods for Securing Mobile Devices
2.9 Implement Appropriate Data Destruction & Disposal Methods
2.10 Configure Security on SOHO Wireless and Wired Networks
2.10 Configure Security on SOHO Wireless and Wired Networks Demo

Module 3 - Software Troubleshooting

Module 3 - Software Troubleshooting
3.1 Software Troubleshooting Part2
3.1 Software Troubleshooting Demo
3.2 Troubleshoot and Resolve PC Security Issues
3.2 Troubleshoot and Resolve PC Security Issues Part2
3.2 Troubleshoot and Resolve PC Security Issues Demo
3.3 Best Practice Procedures for Malware Removal
3.4 Troubleshoot Mobile OS and Application
3.5 Troubleshoot Mobile OS and Application Security Issue

Module 4 - Operational Procedures

4.1 Operational Procedures
4.2 Implement Basic Change Management Best Practices
4.3 Implement Basic Disaster Prevention and Recovery Methods
4.4 Explain Common Safety Procedures
4.5 Explain Environmental Impacts and Appropriate Controls
4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licen
4.7 Using Proper Communication Techniques and Professionalism
4.8 Identify the Basic of Scripting
4.8 Identify the Basic of Scripting Demo
4.9 Use Remote Access Technologies

CompTIA A+ 220-1002 (Core 2) Final Practice Test

CompTIA A+ 220-1002 (Core 2) Final Practice Test

Related Topics

4605302
udemy ID
3/20/2022
course created date
3/24/2022
course indexed date
Bot
course submited by