TRY IT FREE FOR 48 HOURS
Access our entire library for 48 hours.
Just fill out the form below.

CompTIA A+ 220-1002 (Core 2)
Candidates are encouraged to use these lessons to help prepare for CompTIA A+ Core 2.
In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220-
1001) and Core 2 (220-1002). CompTIA A+ Core 2 measures the necessary skills for an entrylevel
IT professional. Successful candidates will have the knowledge required to:
- Assemble components based on customer requirements
- Install, configure, and maintain PCs, mobile devices, and software for end users
- Understand the basics of networking and security forensics
- Properly and safely diagnose, resolve, and document common hardware and software issues
- Apply troubleshooting skills
- Provide appropriate customer support
- Understand the basics of scripting, virtualization, desktop imaging, and deployment
These content examples are meant to clarify the test objectives and should not be
construed as a comprehensive listing of all the content of this examination.
Course Modules & Videos
The CompTIA A+ 220-1002 (Core 2) course is organized into the following modules. Click a module title to view the video list contained in each section.
220-1002 Module 1 - Operating Systems
- 0.1 Intro to A+ Core2 Instructor
- 1.0 Intro to A+ Core2
- 1.1 Operating Systems Part1
- 1.1 Operating Systems Part2
- 1.2 Copare and Contrast features of Microsoft Windows Versions
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
- 1.3 Summarize General OS Installation Considerations Upgrade Methods
- 1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Demo
- 1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Part1
- 1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Part2
- 1.5 Microsoft Operating System and Tools Part1 Demo
- 1.5 Microsoft Operating System and Tools Part1
- 1.5 Microsoft Operating System and Tools Part2 Demo
- 1.5 Microsoft Operating System and Tools Part2
- 1.5 Microsoft Operating System and Tools Part3 Demo
- 1.5 Microsoft Operating System and Tools Part3
- 1.5 Microsoft Operating System and Tools Part4 Demo
- 1.5 Microsoft Operating System and Tools Part4
- 1.6 Microsoft Windows Control Panel Utilities Demo
- 1.6 Microsoft Windows Control Panel Utilities
- 1.7 Summerize Application Installation and Configuration Concepts
- 1.8 Configure Windows Networking on a Client Desktop Demo
- 1.8 Configure Windows Networking on a Client Desktop
- 1.9 Features and Tools of MAC OS and Linux Client Desktop
220-1002 Module 2 - Security
- 2.1 Security - Physical Security Measures
- 2.2 Explain Logical Security Concepts Part2
- 2.2 Explain Logical Security Concepts
- 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
- 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
- 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
- 2.6 Compare Contrast the different Microsoft Windows Security Settings
- 2.7 Implement Security Best Practices to Secure a Workstation Part2
- 2.7 Implement Security Best Practices to Secure a Workstation
- 2.8 Implement Methods for Securing Mobile Devices
- 2.9 Implement Appropriate Data Destruction & Disposal Methods
- 2.10 Configure Security on SOHO Wireless and Wired Networks Demo
- 2.10 Configure Security on SOHO Wireless and Wired Networks
220-1002 Module 3 - Software Troubleshooting
- 3.1 Software Troubleshooting Demo
- 3.1 Software Troubleshooting Part1
- 3.1 Software Troubleshooting Part2
- 3.2 Troubleshoot and Resolve PC Security Issues Demo
- 3.2 Troubleshoot and Resolve PC Security Issues Part2
- 3.2 Troubleshoot and Resolve PC Security Issues
- 3.3 Best Practice Procedures for Malware Removal
- 3.4 Troubleshoot Mobile OS and Application
- 3.5 Troubleshoot Mobile OS and Application Security Issue
220-1002 Module 4 - Operational Procedures
- 4.1 Operational Procedures
- 4.2 Implement Basic Change Management Best Practices
- 4.3 Implement Basic Disaster Prevention and Recovery Methods
- 4.4 Explain Common Safety Procedures
- 4.5 Explain Environmental Impacts and Appropriate Controls
- 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
- 4.7 Using Proper Communication Techniques and Professionalism
- 4.8 Identify the Basic of Scripting Demo
- 4.8 Identify the Basic of Scripting