Published 10/2024
MP4 | Video: h264, 1920×1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.94 GB | Duration: 8h 5m
This course will cover the entirety of the A+ 1102 Exam Objectives
What you’ll learn
Operating Systems
Security
Software Troubleshooting
Operational Procedures
Requirements
A+ 1102 is the foundational Comptia IT certification. Core 2 / A+ 1102 is the second half of the two-part A+ exam.
Description
Third Level Technology is proud to offer the CompTIA A+Â 1102 (Core 2)Â Exam Course. TLTÂ is the leading provider of CompTIAÂ instruction on the Spotify platform and excited to begin offering our educational materials on Udemy!The CompTIAÂ A+Â Exam is a foundational ITÂ certification consisting of two separate exams:Â Core 1 – 1101 &Â Core 2 – 1102. This course will cover A+Â 1102 (Core 2)Â and review all of the Exam Objectives sequentially. It is recommended to have a copy of the A+Â 1102 Exam Objectives as you go through this course.This course will cover the following topics and modules in sequential order:Module 1 :Â Operating SystemsModule 2 :Â SecurityModule 3 :Â Software TroubleshootingModule 4 :Â Operational ProceduresMODULEÂ 1 :Â OPERATING SYSTEMS1.1 : Microsoft Windows – Identify basic features of Microsoft Windows editions.1.2 : Windows Command Line – Given a scenario, use the appropriate Microsoft command-line tool.1.3 :Â Microsoft Windows Features – Given a scenario, use features and tools of the Microsoft Windows 10/11 operating system (OS).1.4 :Â Windows Control Panel – Given a scenario, use the appropriate Microsoft Windows Control Panel utility.1.5 :Â Windows System Settings – Given a scenario, use the appropriate Windows settings.1.6 :Â Windows Networking Features – Given a scenario, configure Microsoft Windows networking features on a client/desktop.1.7 :Â Application Installations – Given a scenario, apply application installation and configuration concepts.1.8 :Â Operating System Types – Explain common OS types and their purposes.1.9 :Â OSÂ Installs &Â Upgrades – Given a scenario, perform OS installations and upgrades in a diverse OS environment.1.10 :Â Apple MacOSÂ Settings – Identify common features and tools of the macOS/desktop OS.1.11 :Â Linux OSÂ &Â Commands – Identify common features and tools of the Linux client/desktop OS.MODULE 2 :Â SECURITY2.1 :Â Physical & Logical Security – Summarize various security measures and their purposes.2.2 :Â Wireless Security Protocols – Compare and contrast wireless security protocols and authentication methods.2.3 :Â Malware Types &Â Prevention – Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods.2.4 :Â Social Engineering – Explain common social-engineering attacks, threats, and vulnerabilities.2.5 : Windows OSÂ Security – Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.2.6 :Â Workstation Security – Given a scenario, configure a workstation to meet best practices for security.2.7 : Mobile Device Security – Explain common methods for securing mobile and embedded devices.2.8 :Â Data Destruction & Disposal – Given a scenario, use common data destruction and disposal methods.2.9 :Â SOHOÂ Network Security – Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.2.10 :Â Browser Security – Given a scenario, install and configure browsers and relevant security settings.MODULE 3 :Â SOFTWARE TROUBLESHOOTING3.1 :Â Windows OSÂ Troubleshooting – Given a scenario, troubleshoot common Windows OS problems.3.2 :Â PCÂ Troubleshooting – Given a scenario, troubleshoot common personal computer (PC) security issues.3.3 :Â Malware Removal – Given a scenario, use best practice procedures for malware removal.3.4 :Â Mobile Device Troubleshooting – Given a scenario, troubleshoot common mobile OS and application issues.3.5 :Â Mobile Operating Systems – Given a scenario, troubleshoot common mobile OS and application security issues.MODULE 4 :Â Operational Procedures4.1 :Â Support System Management – Implement best practices associated with documentation and support systems information management.4.2 :Â Change Management – Explain basic change-management best practices.4.3 :Â Backup & Recovery Methods – Given a scenario, implement workstation backup and recovery methods.4.4 :Â Personal Safety Procedures – Given a scenario, use common safety procedures.4.5 :Â Environmental Controls – Summarize environmental impacts and local environmental controls.4.6 :Â Incident Response &Â Licensing – Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.4.7 :Â Professionalism – Given a scenario, use proper communication techniques and professionalism.4.8 :Â Scripting Basics – Identify the basics and common use cases of scripting.4.9 :Â Remote Access Technologies – Given a scenario, understand the best uses of remote access technologies.As your going through the course if you have any specific questions or inquiries on a topic please submit them via email
Overview
Section 1: Module 1 : Operating Systems
Lecture 1 1.1 – Microsoft Windows Editions
Lecture 2 1.2 – Microsoft Command Line
Lecture 3 1.3 – Microsoft Windows Features
Lecture 4 1.4 – Windows Control Panel
Lecture 5 1.5 – Windows System Settings
Lecture 6 1.6 – Windows Networking Features
Lecture 7 1.7 – Application Installations
Lecture 8 1.8 – Operating System Types
Lecture 9 1.9 – OS Installs & Upgrades
Lecture 10 1.10 – Apple MacOS Settings
Lecture 11 1.11 – Linux OS & Commands
Section 2: Module 2 : Security
Lecture 12 2.1 – Physical Security
Lecture 13 2.1 – Logical Security
Lecture 14 2.2 – Wireless Security Protocols
Lecture 15 2.3 – Malware Types & Prevention
Lecture 16 2.4 – Social Engineering Threats
Lecture 17 2.5 – Windows OS Security Settings
Lecture 18 2.6 – Workstation Security
Lecture 19 2.7 – Mobile Device Security
Lecture 20 2.8 – Data Destruction & Disposal
Lecture 21 2.9 – SOHO Network Security
Lecture 22 2.10 – Browser Security
Section 3: Module 3 : Software Troubleshooting
Lecture 23 3.1 – Windows OS Troubleshooting
Lecture 24 3.2 – PC Troubleshooting
Lecture 25 3.3 – Malware Removal
Lecture 26 3.4 – Mobile Device Troubleshooting
Lecture 27 3.5 – Mobile Operating Systems
Section 4: Module 4 : Operational Procedures
Lecture 28 4.1 – Support System Management
Lecture 29 4.2 – Change Management
Lecture 30 4.3 – Backup & Recovery Methods
Lecture 31 4.4 – Personal Safety Procedures
Lecture 32 4.5 – Environmental Controls
Lecture 33 4.6 – Incident Response, Licensing & Regulation
Lecture 34 4.7 – Professionalism
Lecture 35 4.8 – Scripting Basics
Lecture 36 4.9 – Remote Access Technologies
Section 5: Acronym List Flash Cards
Lecture 37 Acronym List : Page 1
Lecture 38 Acronym List : Page 2
Lecture 39 Acronym List : Page 3
Section 6: Acronym List Glossary of Terms
Lecture 40 Acronym List Definitions : Page 1
Lecture 41 Acronym List Definitions : Page 2
Lecture 42 Acronym List Definitions ; Page 3
This course is designed for those IT professionals looking to achieve Comptia A+ certification.
https://anonymz.com/?https://www.udemy.com/course/comptia-a-1102-core-2-exam-course/