Overview

This online instructor led training course provides the knowledge necessary to support basic computer hardware and operating systems in today’s business world.

In this course students will learn best practices in troubleshooting, networking and security across a variety of device types in order to support their organization and set the stage for their own IT careers. This course will boost students’ confidence to handle the most challenging technology problems more efficiently and will help build customer service and communication skills.

This two part CompTIA A+ course covers the hardware and software objectives students must master in order to pass the 220-1101 exam and the 220-1102 exam, both of which are required to achieve the CompTIA A+ Certification. The A+ Certification is part of specialized certification tracks for corporations such as Microsoft, Hewlett-Packard, and Cisco. Many technology companies have made CompTIA A+ certification mandatory for their service technicians.

Exams 220-1102

COURSE INSTRUCTOR: Shane Sexton, Cisco, CompTIA, Cybersecurity, Citrix
COURSE DIFFICULTY: Beginner
COURSE DURATION: 18h

After completing this online training course, students will be able to:

  • Identify basic features of Microsoft Windows editions
  • Use the appropriate Microsoft command-line tool
  • Use features and tools of the Microsoft Windows 10 operating system (OS)
  • Configure Microsoft Windows networking features on a client/desktop
  • Identify common features and tools of the macOS/desktop OS
  • Summarize various security measures and their purposes
  • Explain common social-engineering attacks, threats, and vulnerabilities
  • Use best practice procedures for malware removal
  • Explain basic change-management best practices
  • Implement workstation backup and recovery methods
  • Use remote access technologies

This course is appropriate for computer technicians, IT support staff, and help desk professionals with 6 to 12 months of hands-on experience. It will also help prepare professionals seeking CompTIA A+ certification (220-1101/220-1102)

  • Basic end-user skills with Windows-based PCs
  • Basic knowledge of computing concepts
  1. Operating Systems
  • Microsoft Windows Editions
    • Windows 10 editions
    • Feature differences
    • Upgrade paths
  • Microsoft command-line tool
    • Navigation
    • Command-line tools
  • Microsoft Windows 10 features and tools
    • Task manager
    • Microsoft Management Console (MMC)
    • Additional tools
  • Microsoft Windows 10 Control Panel utility
    • Internet options
    • Devices and printers
    • Programs and features
    • Network and sharing center
    • System
    • Windows defender firewall
    • Mail
    • Sound
    • User accounts
    • Device manager
    • Indexing options
    • Administrative tools
    • File explorer options
    • Power options
    • Ease of Access
  • Windows settings
    • Time and language
    • Update and security
    • Personalization
    • Apps
    • Privacy
    • System
    • Devices
    • Network and internet
    • Gaming
    • Accounts
  • Microsoft Windows networking features
    • Workgroup vs Domain setup
    • Local OS firewall settings
    • Client network configuration
    • Establishing network connections
    • Proxy settings
    • Public vs private network
    • File explorer navigation
    • Metered connections
  • Installation and configuration concepts
    • System requirements for applications
    • OS requirements for applications
    • Distribution methods
    • Other considerations
  • Common Operating System (OS) types
    • Workstation Oss
    • Cell phone/tablet Oss
    • Filesystem types
    • Vendor life-cycle limitations
    • Compatibility between Oss
  • OS installation and upgrade
    • Boot methods
    • Types of installations
    • Partitioning
    • Drive format
    • Upgrade considerations
    • Feature updates
  • Common features of macOS
    • Installation and uninstallation of applications
    • Apple ID and corporate restrictions
    • Best practices
    • System preferences
    • Features
    • Disk utility
    • FileVault
    • Terminal
    • Force quit
  • Common features of Linux distributions
    • Common commands
    • Bets practices
    • Tools
  1. Security
  • Security measures
    • Physical security
    • Physical security for staff
    • Logical security
    • Mobile device management (MDM)
    • Active directory
  • Wireless security
    • Protocols and encryption
    • Authentication
  • Detecting and removing malware
    • Malware
    • Tools and methods
  • Social engineering
    • Social engineering
    • Threats
    • Vulnerabilities
  • Basic security settings in Microsoft Windows
    • Defender antivirus (AV)
    • Firewall
    • Users and groups
    • Login OS options
    • NTFS vs share permissions
    • Run as administrator
    • Bitlocker
    • Encrypting file system (EFS)
  • Security best practices for workstations
    • Data-at-rest encryption
    • Password best practices
    • End-user best practices
    • Account management
    • Change default administrator
    • Disable autorun/autoplay
  • Mobile and embedded device security
    • Screen locks
    • Remote wipes
    • Locator applications
    • OS updates
    • Device encryption
    • Remote backup applications
    • Failed login attempt restrictions
    • Anti-virus (AV)
    • Firewalls
    • Policies and procedures
    • Internet of Things (IoT)
  • Data destruction and disposal
    • Physical destruction
    • Recycling best practices
    • Outsourcing
  • Small office/home office (SOHO) security
    • Home router settings
    • Wireless settings
    • Firewall settings
  • Internet browser security
    • Browser download and installation
    • Extensions and plug-ins
    • Password managers
    • Secure connections
    • Settings
  1. Software Troubleshooting
  • Troubleshoot Windows OS
    • Common symptoms
    • Common troubleshooting steps
  • Troubleshoot PC security issues
    • Common symptoms
    • Browser symptoms
  • Malware removal
    • 7-step process
  • Troubleshoot mobile OS
    • Common symptoms
  • Troubleshoot mobile OS security
    • Security concerns
    • Common symptoms
  1. Operational Procedures
  • Documentation and support system information management best practices
    • Ticketing systems
    • Asset management
    • Types of documents
    • Knowledge base/articles
  • Change management best practices
    • Document business processes
    • Change management
  • Workstation backup and recovery
    • Backup and recovery
    • Backup testing
    • Backup rotation
  • Common safety procedures
    • Electrostatic discharge (ESD) straps
    • ESD mats
    • Equipment grounding
    • Proper power handling
    • Proper component handling and storage
    • Antistatic bags
    • Government regulation compliance
    • Personal safety
  • Environmental
    • Material safety data sheet (MSDS) handling and disposal
    • Temperature, humidity, and proper ventilation
    • Power surges, brownouts, and blackouts
  • Prohibited content, privacy, and licensing
    • Incident response
    • Licensing/digital rights management (DRM)/End-user licensing agreements (EULA)
    • Regulated data
  • Proper communication and professionalism
    • Professional appearance and attire
    • Proper language
    • Positive attitude
    • Active listening
    • Cultural sensitivity
    • Avoid distractions
    • Dealing with difficult situations
    • Setting and meeting expectations
    • Dealing with customer confidential and private material
  • Basics of scripting
    • Script file types
    • Use cases for scripting
    • Other considerations
  • Remote access technologies
    • Methods and tools
    • Security considerations