CompTIA A+ 220-1002 (Core 2)
CompTIA A+ 220-1002 (Core 2)

CompTIA A+ 220-1002 (Core 2)


About this course

The CompTIA A+ Core Series covers expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures. CompTIA A+ 220-1002 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.

Course Outline

CompTIA A+220-1002 (Core 2)

Module 1 – Operation Systems
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems

Module 2 – Security
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks

Module 3 – Software Troubleshooting
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues

Module 4 – Operational Procedures
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies



0 Rated 0 out of 0 Ratings
5 stars
4 stars
3 stars
2 stars
1 stars