Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA A+ Certification Core 2, 220-1002. The Total Course
All About the CompTIA A+ Core 2 (220-1002) Exam
CompTIA A+ Core 2 (220-1002) Introduction (2:29)
What is the CompTIA A+? (2:12)
Why get CompTIA A+ Certified? (2:52)
What is on the CompTIA A+ Core 2 (220-1002) Exam? (4:13)
How to Pass the CompTIA A+ Exams (4:14)
How to Use this Video Course (2:32)
Book Chapter 1 - Safety and Professionalism
Professional Communication, Part 1 (6:19)
Professional Communication, Part 2 (7:28)
Physical Safety (7:08)
Book Chapter 2 - The Visible Computer
What is an Operating System? (9:23)
Users and Super Users (5:22)
Why Windows? (7:46)
Windows Editions and Versions (11:35)
Touring the macOS (6:27)
Touring Linux (7:55)
Book Chapter 3 - CPUs
32-Bit vs. 64-Bit Processing (11:58)
Book Chapter 4 - RAM
Virtual Memory (6:25)
Book Chapter 7 - Power Supply
Power Protection (9:40)
Book Chapter 9 - Implementing Mass Storage
Understanding Partitioning (4:15)
MBR Partitioning (11:59)
GPT Partitioning (8:33)
Understanding File Systems (11:33)
Popular File Systems (7:10)
Formatting in Action (11:07)
Dynamic Disks (8:33)
Software RAID in Storage Spaces (9:35)
Encrypting Mass Storage (9:28)
Book Chapter 11 - Building a PC
Boot from Everything (11:53)
Installing Windows (12:08)
Post-Installation Tasks (11:34)
Windows Installation options (6:43)
Book Chapter 12 - Windows Under the Hood
What is the Registry? (10:38)
Processes (7:00)
Services (4:25)
Your Windows Toolset (8:20)
Windows 7 Task Manager (8:53)
Windows 10 Task Manager (5:46)
Information and Configuration Tools (10:48)
Performance Monitor (11:31)
Event Viewer (7:09)
Tools for Programmers (7:32)
Book Chapter 13 - Users, Groups, and Permissions
Introduction to Users and Groups (6:28)
Managing Users and Groups (12:14)
NTFS Permissions (8:18)
Linux and macOS Permissions (4:59)
File Explorer (13:36)
Sharing Resources (10:34)
Security Policies (7:52)
Book Chapter 14 - Maintaining and Optimizing Operating Systems
Patch Management (11:13)
Working with Disks (6:20)
Working with Applications (7:19)
System Restore (4:43)
Backing up Your Files (7:25)
Task Scheduler (6:48)
Book Chapter 15 - Working with the Command-Line Interface
Understanding the CLI (11:02)
Navigating the CLI (13:40)
Working with Folders (6:39)
Working with Files (11:06)
Working with Drives (13:02)
Super Copy Commands (8:32)
Advanced Windows Command Line (7:51)
Advanced Linux Commands (13:17)
Command-Line Permissions (7:34)
Introduction to Scripting (9:45)
Interpreted Languages (12:25)
Book Chapter 16 - Troubleshooting Operating Systems
Windows Recovery Environment (5:20)
Advanced Windows Startup Options (7:07)
Troubleshooting Boot Problems (9:44)
Troubleshooting at the GUI (11:25)
Troubleshooting Applications (6:42)
Kernel Panic (5:10)
Book Chapter 17 - Display Technologies
Resolutions and Aspect Ratios (6:16)
Multiple Monitors (4:49)
Book Chapter 18 - Essentials of Networking
Network Card Troubleshooting (9:24)
Book Chapter 19 - Local Area Networking
Working with Connections (9:12)
Working with Workgroups (8:11)
Working with Active Directory (13:50)
Windows Sharing with Mac and Linux (7:15)
Net Command (4:27)
Firewall Configuration (10:55)
Windows Firewall (7:56)
Port Forwarding (7:24)
Book Chapter 20 - Wireless Networking
Wireless Encryption (10:40)
Enterprise Wireless (15:41)
Book Chapter 21 - The Internet
Telnet and SSH (6:59)
Remote Desktop Connections (6:17)
The World Wide Web (9:07)
Troubleshooting Internet Connections (6:59)
Book Chapter 23 - Portable Computing
Power Management (11:10)
Book Chapter 25 - Care and Feeding of Mobile Devices
Mobile Device Security (7:52)
Mobile Security Troubleshooting (5:48)
Mobile Device Troubleshooting (9:36)
Book Chapter 27 - Securing Computers
Threats (9:48)
Physical Security (8:22)
Passwords and Authentication (13:48)
Malware (13:43)
Anti-Malware (11:29)
Social Engineering (5:50)
Licensing (9:37)
Incident Response (5:05)
Environmental Controls (6:02)
Book Chapter 28 - Operational Procedures
Documents You Need to Know (8:54)
Data You Need to Know (4:08)
Change Management (5:53)
The Zen of Backup (11:16)
Recycling and Data Destruction (6:37)
Mobile Security Troubleshooting
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock