SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
More than 19 hours of video training covering all the objectives in the CompTIA A+ 220-902 exam with practice questions, exercises, and simulations.
CompTIA A+ 220-902 Complete Video Course is a unique video product that provides a solid understanding of A+ skills. The purpose of these videos is to act as quick and concise hands-on training that is easily absorbed. The modules in this course cover every objective in the CompTIA A+ 220-902 exam and can be used as your sole resource for learning the material needed to study for and pass the test. You can also use this as a supplement to other A+ training.
Five modules map to the main objectives of the CompTIA A+ 220-902 exam. These modules contain 28 lessons with videos totaling more than 19 hours that includes hands-on demonstrations, audio instruction, animations, whiteboard training, and configurations. The videos also include numerous hands-on networking, OS and UI demos, real-world troubleshooting methods, and security concepts with hands-on solutions.
The course also includes
Module 01: Windows Operating Systems
Lesson 1: Windows Features and Requirements
1.1: Windows Versions and Features
1.2: 32-bit versus 64-bit
1.3: Windows Upgrade Paths
Lesson 2: Installing Windows
2.1: Boot Methods
2.2: Types of Installations
2.3: Partitioning
2.4: File Systems & Formatting
2.5: Installation Considerations
2.6: Hands-on Windows 8 Installation
2.7: Hands-on Windows 8 Installation (Part II)
Lesson 3: Windows Control Panel Utilities
3.1: Internet Options
3.2: Display Settings
3.3: Folder Options
3.4: System Properties
3.5: Power Options
3.6: Additional CP Icons
Lesson 4: Windows Features and Tools
4.1: Administrative Tools
4.2: System Configuration Utility
4.3: Task Manager
4.4: Disk Management
4.5: Migration/Upgrade Tools
4.6: System Utilities
4.7: System Utilities Part II
Lesson 5: Command Prompt Tools
5.1: Command Prompt Basics
5.2: File-related Commands
5.3: File-related Commands Part II
5.4: Disk and File Checking Tools
5.5: Working with Tasks
5.6: Policy-based Commands
5.7: Additional Command-line Tools
Lesson 6: Windows Networking
6.1: Types of Windows Networks
6.2: Networking Connections
6.3: Alternate IP Address
6.4: Network Card Properties
6.5: Sharing and Mapping
6.6: Remote Control
6.7: Proxy Settings
6.8: Firewall Settings
Lesson 7: Preventative Maintenance for Windows
7.1: Windows Best Practices
7.2: Maintenance Tools
Module 02: Other Operating Systems and Technologies
Lesson 8: OS X and Linux
8.1: OS X and Linux Best Practices
8.2: OS X and Linux Tools
8.3: OS X Features
8.4: Basic Linux Commands
Lesson 9: Client-side Virtualization
9.1: Virtualization Basics
9.2: Hypervisor
9.3: Virtualization Programs
Lesson 10: The Cloud
10.1: SaaS, IaaS, and PaaS
10.2: Types of Clouds
10.3: Cloud Concerns
Lesson 11: Servers and Networked Hosts
11.1: Server Roles
11.2: Internet Appliances
11.3: Embedded Systems
Lesson 12: Mobile OS Features
12.1: Android vs. iOS vs. Windows Basics
12.2: Technical Comparison of Mobile Devices
Lesson 13: Mobile Device Connectivity
13.1: Enabling and Disabling Wireless Technologies
13.2: Hotspot versus Tethering
13.3: Bluetooth
13.4: Configuring E-mail
Lesson 14: Mobile Device Synchronization
14.1: Data Synchronization
14.2: Synchronization Methods
Module 03: Security
Lesson 15: Security Threats and Vulnerabilities
15.1: Malware
15.2: Social Engineering
15.3: Spoofing & MITM
15.4: More Computerized Attacks
15.5: Protecting Systems from Threats
Lesson 16: Common Security Methods
16.1: Physical Security
16.2: Digital Security
16.3: Conceptual Security
Lesson 17: Windows Security Settings
17.1: Users and Groups
17.2: Shared Files and Folders
17.3: Permissions
17.4: Additional Windows Security Features
17.5: Additional Windows Security Features Part II
17.6: Bitlocker and EFS
Lesson 18: Workstation Security - Best Practices
18.1: Password Best Practices
18.2: Account Management
18.3: Best Practices for Encryption, Authentication, and Updates
18.4: Best Practices in the Case of Loss or Theft
18.5: BYOD Security Concerns
Lesson 19: Data Disposal and Destruction
19.1: Recycling Best Practices
19.2: Physical Destruction
Lesson 20: SOHO Security
20.1: SOHO Wireless Security
20.2: More SOHO Device Security
Module 04: Software Troubleshooting
Lesson 21: Troubleshooting Operating System Problems
21.1: Review of the A+ Troubleshooting Process
21.2: Troubleshooting Windows Operating System Failures
21.3: Troubleshooting Windows Operating System Failures Part II
21.4: Windows Recovery Environment and Boot Options
21.5: Troubleshooting a Boot Issue
21.6: Windows Troubleshooting Utilities
21.7: Windows Troubleshooting Utilities Part II
21.8: Linux Operating System Failures
Lesson 22: Troubleshooting Security Issues
22.1: Common Symptoms and Potential Culprits
22.2: Tools used to Solve Security Problems
22.3: Best Practices for Malware Removal
Lesson 23: Troubleshooting Mobile OS Issues
23.1: Common Symptoms and Potential Culprits
23.2: Tools used to Solve Mobile Device Issues
Lesson 24: Troubleshooting Mobile OS Security Problems
24.1: Common Symptoms of Mobile OS Security Issues
24.2: Tools used to Solve Mobile OS Security Problems
Module 05: Operational Procedures
Lesson 25: Safety Procedures
25.1: ESD Prevention
25.2: Equipment Grounding
25.3: Toxic Waste Handling
25.4: Personal Safety
Lesson 26: Environmental Concerns
26.1: MSDS
26.2: Environmental Controls, Dust, and Debris
26.3: Power Concerns
Lesson 27: Incident Response and Prohibited Content
27.1: Incident Response
27.2: Personally Identifiable Information (PII)
Lesson 28: Communication and Professionalism
28.1: Communication Techniques
28.2: Professionalism