CompTIA A+ 220-1002 (Core 2)

CompTIA A+ 220-1002 (Core 2)

$49.00

TRY IT FREE FOR 48 HOURS

Access our entire library for 48 hours.
Just fill out the form below.

 

Try it free for 48 Hours

No Credit Card Required.

Get Free Trial

CompTIA A+ 220-1002 (Core 2)

Candidates are encouraged to use these lessons to help prepare for CompTIA A+ Core 2.
In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220-
1001) and Core 2 (220-1002). CompTIA A+ Core 2 measures the necessary skills for an entrylevel
IT professional. Successful candidates will have the knowledge required to:

  •  Assemble components based on customer requirements
  •  Install, configure, and maintain PCs, mobile devices, and software for end users
  • Understand the basics of networking and security forensics
  • Properly and safely diagnose, resolve, and document common hardware and software issues
  • Apply troubleshooting skills
  • Provide appropriate customer support
  • Understand the basics of scripting, virtualization, desktop imaging, and deployment

These content examples are meant to clarify the test objectives and should not be
construed as a comprehensive listing of all the content of this examination.

Course Modules & Videos

The CompTIA A+ 220-1002 (Core 2) course is organized into the following modules. Click a module title to view the video list contained in each section.

220-1002 Module 1 - Operating Systems
  • 0.1 Intro to A+ Core2 Instructor
  • 1.0 Intro to A+ Core2
  • 1.1 Operating Systems Part1
  • 1.1 Operating Systems Part2
  • 1.2 Copare and Contrast features of Microsoft Windows Versions
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods
  • 1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Demo
  • 1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Part1
  • 1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Part2
  • 1.5 Microsoft Operating System and Tools Part1 Demo
  • 1.5 Microsoft Operating System and Tools Part1
  • 1.5 Microsoft Operating System and Tools Part2 Demo
  • 1.5 Microsoft Operating System and Tools Part2
  • 1.5 Microsoft Operating System and Tools Part3 Demo
  • 1.5 Microsoft Operating System and Tools Part3
  • 1.5 Microsoft Operating System and Tools Part4 Demo
  • 1.5 Microsoft Operating System and Tools Part4
  • 1.6 Microsoft Windows Control Panel Utilities Demo
  • 1.6 Microsoft Windows Control Panel Utilities
  • 1.7 Summerize Application Installation and Configuration Concepts
  • 1.8 Configure Windows Networking on a Client Desktop Demo
  • 1.8 Configure Windows Networking on a Client Desktop
  • 1.9 Features and Tools of MAC OS and Linux Client Desktop
220-1002 Module 2 - Security
  • 2.1 Security - Physical Security Measures
  • 2.2 Explain Logical Security Concepts Part2
  • 2.2 Explain Logical Security Concepts
  • 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  • 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings
  • 2.7 Implement Security Best Practices to Secure a Workstation Part2
  • 2.7 Implement Security Best Practices to Secure a Workstation
  • 2.8 Implement Methods for Securing Mobile Devices
  • 2.9 Implement Appropriate Data Destruction & Disposal Methods
  • 2.10 Configure Security on SOHO Wireless and Wired Networks Demo
  • 2.10 Configure Security on SOHO Wireless and Wired Networks
220-1002 Module 3 - Software Troubleshooting
  • 3.1 Software Troubleshooting Demo
  • 3.1 Software Troubleshooting Part1
  • 3.1 Software Troubleshooting Part2
  • 3.2 Troubleshoot and Resolve PC Security Issues Demo
  • 3.2 Troubleshoot and Resolve PC Security Issues Part2
  • 3.2 Troubleshoot and Resolve PC Security Issues
  • 3.3 Best Practice Procedures for Malware Removal
  • 3.4 Troubleshoot Mobile OS and Application
  • 3.5 Troubleshoot Mobile OS and Application Security Issue
220-1002 Module 4 - Operational Procedures
  • 4.1 Operational Procedures
  • 4.2 Implement Basic Change Management Best Practices
  • 4.3 Implement Basic Disaster Prevention and Recovery Methods
  • 4.4 Explain Common Safety Procedures
  • 4.5 Explain Environmental Impacts and Appropriate Controls
  • 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • 4.7 Using Proper Communication Techniques and Professionalism
  • 4.8 Identify the Basic of Scripting Demo
  • 4.8 Identify the Basic of Scripting
  •