Mô tả

*** Taught by a Best Selling Certification Instructor ***


This course provides everything you need in order to study for the CompTIA A+ Core 2 (220-1102) exam, including a downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day!


Jason Dion is an expert in information technology and cybersecurity with over 20 years of experience, and he has designed this course to be a fun way to learn what you need to know to pass the CompTIA A+ Core 2 (220-1102) exam or to better prepare yourself to serve as a service analyst or computer technician in your organization information technology (IT) divisions.


The CompTIA A+ Core 2 (220-1102) certification is a vendor-neutral certification that validates your knowledge and ability to conduct install, configure, and troubleshoot software and operating system issues in your organization. This certification tests your ability to think on your feet while performing critical IT support functions. The CompTIA A+ certification is designed for early-career data analysts with the equivalent of 9-12 months of on-the-job knowledge.


The CompTIA A+ Core 2 exam is focused on supporting operating systems and software in order to support a wide variety of different devices used by a diverse and global workforce. 


CompTIA A+ Core 2 (220-1102) is an early-career IT support technician certification covering the theory and technical skills required to support operating system, applications, and security in a corporate environment using the proper operational procedures.


To help you practice for the CompTIA A+ Core 2 (220-1102) exam, this course even comes with a realistic practice exam containing 90 multiple-choice questions spread across the four domains tested by the CompTIA A+ Core 2 (220-1102) certification exam!       


This course will provide you with full coverage of the five domains of the CompTIA A+ Core 2 (220-1102) exam:   

  1. Operating Systems (31%)

  2. Security (25%)

  3. Software Troubleshooting (22%)

  4. Operational Procedures (22%)

This course stays current and up-to-date with the latest release of the CompTIA A+ Core 2 exam (220-1102), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


This course is brought to you by Dion Training Solutions, a CompTIA Platinum Delivery Partner, and aligns directly with the OFFICIAL CompTIA A+ (220-1102) Certification Study Guide.


What Other Students Are Saying About Our Courses:

  • Jason's courses are immensely helpful - they dramatically expedite the learning process (this is my second certification that I've used Jason's resources to study for). The practice exams not only cover the full range of subject matter, but they also are structured in the same manner as those that can be expected on exam day using real-life scenarios and encouraging the mind to apply the knowledge more flexibly than just memorization/repeat learning. (Holly, 5 stars)

  • Great course, very detailed. Passed the exam on the first try. I have recommended this course to everyone I know. (Jose D., 5 stars)

  • I passed on 1st try, that's all I can ask for! (Tim, 5 stars)


    Upon completion of this course, you will earn 36 CEUs towards the renewal of your CompTIA A+ certification.


Bạn sẽ học được gì

Yêu cầu

Nội dung khoá học

33 sections

Introduction

4 lectures
Welcome
15:46
Download your free study guide
00:03
Exam Tips
03:47
Checkpoint: Introduction
2 questions

Operating System Types

11 lectures
Operating System Types (OBJ. 1.8)
07:58
Windows (OBJ. 1.8)
07:43
Linux (OBJ. 1.8)
09:06
Android (OBJ. 1.8)
04:15
Chrome OS (OBJ. 1.8)
05:34
macOS (OBJ. 1.8)
03:07
iOS and iPadOS (OBJ. 1.8)
04:24
Operating Systems (OBJ. 1.8)
18:13
Filesystem Types (OBJ. 1.8)
12:54
Compatibility Concerns (OBJ. 1.8)
07:05
Checkpoint: Operating System Types
3 questions

Windows Versions

8 lectures
Windows Versions (OBJ. 1.1 & 1.7)
02:00
64-bit vs 32-bit Versions (OBJ. 1.7)
04:32
Windows Home (OBJ. 1.1)
06:22
Windows Pro (OBJ. 1.1)
08:30
Windows Enterprise and Education (OBJ. 1.1)
06:06
Upgrading Windows (OBJ. 1.1)
05:04
In-place Upgrade (OBJ. 1.1)
08:54
Checkpoint: Windows Versions
3 questions

Windows Installation

9 lectures
Windows Installation (OBJ. 1.9)
02:36
Installation Types (OBJ. 1.9)
08:31
Upgrade Considerations (OBJ. 1.9)
06:42
Product Lifecycle (OBJ. 1.9)
06:06
Boot Methods (OBJ. 1.9)
05:37
Partitioning Storage Devices (OBJ. 1.9)
07:30
Recovery and Reset (OBJ. 1.9)
05:23
Using a Recovery Partition (OBJ. 1.9)
10:48
Checkpoint: Windows Installation
3 questions

Application Configuration

9 lectures
Application Configuration (OBJ. 1.7)
02:44
Application Requirements (OBJ. 1.7)
08:46
Distribution Methods (OBJ. 1.7)
09:30
Business Impacts (OBJ. 1.7)
07:06
Operational Impacts (OBJ. 1.7)
03:18
Device Impacts (OBJ. 1.7)
03:32
Network Impacts (OBJ. 1.7)
03:38
Installing Applications (OBJ. 1.7)
19:50
Checkpoint: Application Configuration
3 questions

Windows Networking

9 lectures
Windows Networking (OBJ. 1.6)
03:59
Wired Connections (OBJ. 1.6)
08:12
Wireless Connections (OBJ. 1.6)
07:32
WWAN Connections (OBJ. 1.6)
06:20
VPN Connections (OBJ. 1.6)
04:31
Network Client Configuration (OBJ. 1.6)
06:52
Network Locations (OBJ. 1.6)
08:42
Proxy Settings (OBJ. 1.6)
05:11
Checkpoint: Windows Networking
3 questions

Windows Control Panel

17 lectures
Windows Control Panel (OBJ. 1.4)
06:22
Account Settings (OBJ. 1.4)
12:41
Programs and Features (OBJ. 1.4)
05:31
Devices and Printers (OBJ. 1.4)
08:44
Internet Options (OBJ. 1.4)
09:13
Network and Sharing Center (OBJ. 1.4)
08:12
Windows Defender Firewall (OBJ. 1.4)
09:23
Mail (OBJ. 1.4)
08:26
Sound (OBJ. 1.4)
09:04
System (OBJ. 1.4)
11:40
Device Manager (OBJ. 1.4)
05:13
Administrative Tools (OBJ. 1.4)
03:29
Indexing Options (OBJ. 1.4)
04:30
File Explorer Options (OBJ. 1.4)
07:15
Power Options (OBJ. 1.4)
07:25
Ease of Access (OBJ. 1.4)
03:08
Checkpoint: Windows Control Panel
3 questions

Windows Settings

12 lectures
Windows Settings (OBJ. 1.5)
04:44
Accounts (OBJ. 1.5)
06:07
System Settings (OBJ. 1.5)
07:29
Update and Security (OBJ. 1.5)
07:30
Network and Internet (OBJ. 1.5)
04:38
Devices (OBJ. 1.5)
04:32
Privacy (OBJ. 1.5)
05:40
Time and Language (OBJ. 1.5)
06:51
Personalization (OBJ. 1.5)
07:16
Apps (OBJ. 1.5)
06:39
Gaming (OBJ. 1.5)
04:35
Checkpoint: Windows Settings
3 questions

Windows Tools

17 lectures
Windows Tools (OBJ. 1.3)
05:01
Task Manager (OBJ. 1.3)
10:34
Device Manager (OBJ. 1.3)
07:54
Disk Management Console (OBJ. 1.3)
10:31
Disk Maintenance Tools (OBJ. 1.3)
08:54
Task Scheduler (OBJ. 1.3)
10:01
Event Viewer (OBJ. 1.3)
08:35
Performance Monitor (OBJ. 1.3)
10:14
Local Users and Groups (OBJ. 1.3)
06:42
Group Policy Editor (OBJ. 1.3)
10:01
Certificate Manager (OBJ. 1.3)
03:51
System Information (OBJ. 1.3)
05:04
Resource Monitor (OBJ. 1.3)
04:06
System Configuration (OBJ. 1.3)
06:46
Registry Editor (OBJ. 1.3)
09:03
Microsoft Management Console (OBJ. 1.3)
03:52
Checkpoint: Windows Tools
3 questions

Windows Command Line Tools

14 lectures
Windows Command Line Tools (OBJ. 1.2)
08:08
Using the GUI (OBJ. 1.2)
10:47
Using the Command Prompt (OBJ. 1.2)
10:30
Navigation Commands (OBJ. 1.2)
12:15
Copying Commands (OBJ. 1.2)
05:49
Disk Management Commands (OBJ. 1.2)
10:54
Shutdown (OBJ. 1.2)
03:37
System File Checker (OBJ. 1.2)
02:43
Windows Version (OBJ. 1.2)
03:10
Network Troubleshooting Commands (OBJ. 1.2)
16:26
Name Resolution Commands (OBJ. 1.2)
06:07
The netstat Command (OBJ. 1.2)
05:38
Group Policy Commands (OBJ. 1.2)
04:47
Checkpoint: Windows Command Line Tools
3 questions

Windows Shares

9 lectures
Windows Shares (OBJ. 1.2, 1.6, & 2.5)
03:25
Workgroups and Domains (OBJ. 1.6)
08:01
File Sharing (OBJ. 2.5)
09:26
NTFS Permissions (OBJ. 2.5)
11:15
Mapping Drives (OBJ. 1.6)
05:16
The net Command (OBJ. 1.2)
08:47
User Data on Domains (OBJ. 1.6)
10:43
Printer Sharing (OBJ. 1.6)
03:55
Checkpoint: Windows Shares
3 questions

macOS

14 lectures
macOS (OBJ. 1.10)
06:44
Finder, Dock, and Spotlight (OBJ. 1.10)
16:36
Mission Control (OBJ. 1.10)
04:42
Terminal (OBJ. 1.10)
05:35
Disk Utility (OBJ. 1.10)
06:22
File Vault (OBJ. 1.10)
02:51
Remote Disc (OBJ. 1.10)
02:02
Gestures (OBJ. 1.10)
08:24
Keychain (OBJ. 1.10)
05:05
iCloud and Apple ID (OBJ. 1.10)
06:49
System Preferences (OBJ. 1.10)
18:26
Managing macOS Applications (OBJ. 1.10)
09:40
Best Practices for macOS (OBJ. 1.10)
08:02
Checkpoint: macOS
3 questions

Linux

15 lectures
Linux (OBJ. 1.11)
09:54
Shells and Terminals (OBJ. 1.11)
03:50
Linux Navigation (OBJ. 1.11)
10:40
File Management Commands (OBJ. 1.11)
11:34
Disk Usage Commands (OBJ. 1.11)
05:19
Text Manipulation (OBJ. 1.11)
11:44
Search Commands (OBJ. 1.11)
06:28
User Management (OBJ. 1.11)
09:39
File Permission Commands (OBJ. 1.11)
07:26
Application Management (OBJ. 1.11)
08:29
Resource Management Commands (OBJ. 1.11)
06:29
Networking Commands (OBJ. 1.11)
07:00
Getting Help in Linux (OBJ. 1.11)
03:25
Best Practices for Linux (OBJ. 1.11)
07:15
Checkpoint: Linux
3 questions

Threats and Vulnerabilities

12 lectures
Threats and Vulnerabilities (OBJ. 2.4)
14:17
CIA Triad (OBJ. 2.4)
07:01
Vulnerabilities (OBJ. 2.4)
08:48
Zero-day Attack (OBJ. 2.4)
05:06
DoS and DDoS (OBJ. 2.4)
08:05
Spoofing (OBJ. 2.4)
04:20
On-path Attack (OBJ. 2.4)
04:01
SQL Injection (OBJ. 2.4)
06:09
XSS and XSRF (OBJ. 2.4)
03:06
Password Cracking (OBJ. 2.4)
08:22
Insider Threat (OBJ. 2.4)
03:15
Checkpoint: Threats and Vulnerabilities
3 questions

Malware

11 lectures
Malware (OBJ. 2.3)
02:30
Viruses, Worms, and Trojans (OBJ. 2.3)
11:24
Viruses and Trojans (OBJ. 2.3)
06:18
Ransomware (OBJ. 2.3)
02:33
Spyware (OBJ. 2.3)
02:41
Rootkits (OBJ. 2.3)
03:31
Botnets and Zombies (OBJ. 2.3)
03:33
Symptoms of Infection (OBJ. 2.3)
04:13
Removing Malware (OBJ. 3.3)
05:04
Preventing Malware (OBJ. 2.3)
05:52
Checkpoint: Malware
3 questions

Social Engineering

12 lectures
Social Engineering (OBJ. 2.3 & 2.4)
03:26
Phishing Attacks (OBJ. 2.4)
12:14
Anti-phishing Training (OBJ. 2.3)
05:22
Spam (OBJ. 2.3)
02:59
Impersonation (OBJ. 2.4)
04:05
Pretexting (OBJ. 2.4)
04:17
Social Engineering Attacks (OBJ. 2.4)
04:26
Evil Twin (OBJ. 2.4)
04:45
Software Firewalls (OBJ. 2.3)
04:18
Using Software Firewalls (OBJ. 2.3)
06:33
User Education (OBJ. 2.3)
04:46
Checkpoint: Social Engineering
3 questions

Security Controls

9 lectures
Security Controls (OBJ. 2.1)
05:50
Perimeter Defense (OBJ. 2.1)
05:59
Surveillance (OBJ. 2.1)
07:08
Physical Access Controls (OBJ. 2.1)
13:28
Security Principles (OBJ. 2.1)
11:21
Multifactor Authentication (OBJ. 2.1)
08:25
Mobile Device Management (OBJ. 2.1)
08:19
Active Directory Security (OBJ. 2.1)
09:09
Checkpoint: Security Controls
3 questions

Wireless Security

10 lectures
Wireless Security (OBJ. 2.2 & 2.9)
03:13
Wireless Encryption (OBJ. 2.2)
05:23
Cracking Wireless Networks (OBJ. 2.2)
07:42
WPA3 (OBJ. 2.2)
07:20
Wireless Authentication (OBJ. 2.2)
10:00
Wireless Network Security (OBJ. 2.9)
09:51
Configuring SOHO Networks (OBJ. 2.9)
26:31
Securing Wireless Networks (OBJ. 2.9)
13:45
Configuring SOHO Firewalls (OBJ. 2.9)
08:51
Checkpoint: Wireless Security
3 questions

Mobile Device Security

11 lectures
Mobile Device Security (OBJ. 2.7)
02:06
Securing Wireless Devices (OBJ. 2.7)
05:01
Mobile Device Unlocking (OBJ. 2.7)
09:02
Mobile Malware (OBJ. 2.7)
06:21
Mobile Device Theft (OBJ. 2.7)
03:13
Mobile App Security (OBJ. 2.7)
05:09
Deployment Options (OBJ. 2.7)
07:12
Hardening Mobile Devices (OBJ. 2.7)
03:51
Implementing Mobile Device Security (OBJ. 2.7)
15:42
IoT Vulnerabilities (OBJ. 2.7)
07:13
Checkpoint: Mobile Device Security
3 questions

Windows Security

8 lectures
Windows Security (OBJ. 2.5)
02:38
Login Options (OBJ. 2.5)
09:26
Users and Groups (OBJ. 2.5)
10:13
Encrypting Windows Devices (OBJ. 2.5)
05:55
File Permissions (OBJ. 2.5)
07:53
Microsoft Defender Antivirus (OBJ. 2.5)
07:09
Microsoft Defender Firewall (OBJ. 2.5)
08:30
Checkpoint: Windows Security
3 questions

Securing Workstations

9 lectures
Securing Workstations (OBJ. 2.6 & 2.8)
03:20
Account Management (OBJ. 2.6)
14:12
AutoRun and AutoPlay (OBJ. 2.6)
05:14
Password Best Practices (OBJ. 2.6)
10:35
Encryption Best Practices (OBJ. 2.6)
07:30
End-user Best Practices (OBJ. 2.6)
06:49
Data Destruction (OBJ. 2.8)
05:07
Data Destruction Methods (OBJ. 2.8)
12:34
Checkpoint: Securing Workstations
3 questions

Securing Web Browsers

10 lectures
Securing Web Browsers (OBJ. 2.10)
03:19
Web Browser Installation (OBJ. 2.10)
07:29
Extensions and Plug-ins (OBJ. 2.10)
10:38
Password Managers (OBJ. 2.10)
10:31
Encrypted Browsing (OBJ. 2.10)
05:10
Private Browsing (OBJ. 2.10)
06:03
Pop-up and Ad Blockers (OBJ. 2.10)
07:04
Cache and History Clearing (OBJ. 2.10)
05:29
Profile Synchronization (OBJ. 2.10)
04:39
Checkpoint: Securing Web Browsers
3 questions

Supporting Network Operations

9 lectures
Supporting Network Operations (OBJ. 4.1 & 4.2)
03:00
Ticketing System (OBJ. 4.1)
18:59
Using a Ticketing System (OBJ. 4.1)
05:23
Knowledge Base Articles (OBJ. 4.1)
07:23
Asset Management (OBJ. 4.1)
13:04
Change Management (OBJ. 4.2)
11:00
Conducting Change Management (OBJ. 4.2)
13:51
Documentation Types (OBJ. 4.1)
13:12
Checkpoint: Supporting Network Operations
3 questions

Backup, Recovery, and Safety

10 lectures
Backup, Recovery, and Safety
03:08
Backup and Recovery (OBJ. 4.3)
11:09
Backup Schemes (OBJ. 4.3)
13:53
Redundant Power (OBJ. 4.5)
06:06
Electrical Safety (OBJ. 4.4)
04:59
Component Handling and Storage (OBJ. 4.4)
05:49
HVAC Systems (OBJ. 4.5)
05:46
Proper Handling and Disposal (OBJ. 4.4 & 4.5)
09:03
Personal Safety (OBJ. 4.4 & 4.5)
11:04
Checkpoint: Backup, Recovery, and Safety
3 questions

Policy and Privacy Concepts

12 lectures
Policy and Privacy Concepts (OBJ. 4.6)
02:47
Incident Response (OBJ. 4.6)
04:19
Chain of Custody (OBJ. 4.6)
07:06
Order of Volatility (OBJ. 4.6)
06:31
Data Collection Procedures (OBJ. 4.6)
03:14
Conduct Disk Imaging (OBJ. 4.6)
09:09
Licensing, EULA, and DRM (OBJ. 4.6)
11:52
Data Classification (OBJ. 4.6)
02:50
Data Retention (OBJ. 4.6)
06:55
PII, PHI, and PCI-DSS (OBJ. 4.6)
05:59
Security Policies (OBJ. 4.6)
10:16
Checkpoint: Policy and Privacy Concepts
3 questions

Scripting

9 lectures
Scripting (OBJ. 4.8)
04:42
Script File Types (OBJ. 4.8)
10:02
Variables (OBJ. 4.8)
07:43
Loops (OBJ. 4.8)
05:22
Logic Control (OBJ. 4.8)
04:37
Bash Script Example (OBJ. 4.8)
04:10
Automation Scripting (OBJ. 4.8)
08:17
Scripting Considerations (OBJ. 4.8)
06:37
Checkpoint: Scripting
3 questions

Remote Access Support

8 lectures
Remote Access Support (OBJ. 4.9)
03:12
Remote Access Protocols (OBJ. 4.9)
11:56
Connecting to a VPN (OBJ. 4.9)
01:39
Remote Monitoring and Management (RMM) (OBJ. 4.9)
07:00
Microsoft Remote Assistance (MSRA) (OBJ. 4.9)
11:21
Other Remote Access Tools (OBJ. 4.9)
05:10
Desktop Management Software (OBJ. 4.9)
03:13
Checkpoint: Remote Access Support
3 questions

Troubleshooting Windows

11 lectures
Troubleshooting Windows (OBJ. 3.1)
01:56
Boot Issues (OBJ. 3.1)
12:54
Boot Recovery Tools (OBJ. 3.1)
05:43
Update or Driver Rollback (OBJ. 3.1)
05:29
System Restore (OBJ. 3.1)
06:54
System Reinstall or Reimage (OBJ. 3.1)
13:09
Performance Issues (OBJ. 3.1)
17:07
System Fault Issues (OBJ. 3.1)
03:55
System Instability Issues (OBJ. 3.1)
07:06
Application and Service Issues (OBJ. 3.1)
10:49
Checkpoint: Troubleshooting Windows
3 questions

Troubleshooting Workstation Security

7 lectures
Troubleshooting Workstation Security (OBJ. 3.2 & 3.3)
03:02
Malware Removal Process (OBJ. 3.3)
13:42
Infected Browser Symptoms (OBJ. 3.2)
11:47
Alerts and Notifications (OBJ. 3.2)
03:48
OS Update Failures (OBJ. 3.2)
03:37
File System Issues (OBJ. 3.2)
03:21
Checkpoint: Troubleshooting Workstation Security
3 questions

Troubleshooting Mobile Issues

9 lectures
Troubleshooting Mobile Issues (OBJ. 3.4)
01:28
Reseting or Rebooting (OBJ. 3.4)
06:13
Mobile OS Update Failure (OBJ. 3.4)
05:34
Mobile Performance Issues (OBJ. 3.4)
07:07
Mobile App Issues (OBJ. 3.4)
06:38
Mobile Connectivity Issues (OBJ. 3.4)
09:51
Mobile Battery Issues (OBJ. 3.4)
07:42
Screen Autorotation Issues (OBJ. 3.4)
03:46
Troubleshooting Mobile Issues
3 questions

Troubleshooting Mobile Security

7 lectures
Troubleshooting Mobile Security (OBJ. 3.5)
01:34
Rooting and Jailbreaking (OBJ. 3.5)
06:40
Sideloading Apps (OBJ. 3.5)
06:33
Mobile Malware Symptoms (OBJ. 3.5)
04:11
Unexpected Application Behavior (OBJ. 3.5)
02:45
Leaked Mobile Data (OBJ. 3.5)
02:57
Checkpoint: Troubleshooting Mobile Security
3 questions

Professionalism

7 lectures
Professionalism (OBJ. 4.7)
05:27
Professional Appearance (OBJ. 4.7)
06:36
Respect Others' Time (OBJ. 4.7)
08:59
Proper Communication (OBJ. 4.7)
15:15
Dealing with Private Data (OBJ. 4.7)
06:05
Difficult Situations (OBJ. 4.7)
06:35
Checkpoint: Professionalism
3 questions

Conclusion

3 lectures
Conclusion
11:41
CompTIA A+ (220-1102) Core 2 Practice Exam
90 questions
Bonus: What's Next?
04:05

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.