Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA A+ CompTIA A+ 220-1101, CompTIA A+ 220-1102 Prep Lab
Introduction to CompTIA A+(220-1101) Complete Course & Lab
CompTIA A+ Course Introduction (1:06)
FAQ About CompTIA A+ | CompTIA A+220-1101, CompTIA A+220-1102 Prep
What is the CompTIA A+ (1:24)
How Can We Get CompTIA A+ (1:31)
10 Reasons Why You Should Get CompTIA A+ Certified
About Computer in Comptia A+
What is a Computer (1:26)
History of Computer (1:40)
Benefits of Using Computer (0:37)
Types of Computer (1:07)
Components of Computer for Comptia A+
Input Processing - Output Cycle (6:14)
Computer Inputs (0:57)
What is Processing (1:18)
Cyber Attacks to CPU (1:04)
What is Storing (0:53)
Output (1:23)
Computer Components (2:54)
Input Devices (2:28)
Power Supply Unit (PSU) (6:42)
Cooling_the_System (5:03)
Storage Devices in Comptia IT Fundamentals
Primary and Secondary Memory (4:20)
RAM (1:18)
SRAM and DRAM (1:28)
ROM (1:12)
PROM, EPROM, EEPROM (1:04)
What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices (2:19)
Network attached storage (1:40)
Cloud Storage (1:31)
Processing Devices in Comptia A+
CPUs (18:38)
GPU (2:46)
Motherboard (1:15)
Network Interface Cards (NICs) (10:21)
Output Devices (0:38)
IoT & Mobile
Where does IoT Exist in Our Lives (1:47)
What is IoT (3:29)
How does IoT work (0:47)
Connection Standarts (9:06)
IoT Security (6:59)
Mobile Security Threats (8:00)
Output Devices in Comptia A+ 220-1001
What is Monitor (3:40)
What is Printer (1:59)
What are Headphones (3:15)
What is Computer Speaker (1:48)
What is Projector (1:13)
What is GPS (2:28)
Cables
Ethernet (2:01)
Fiber Optic Cables (25:25)
VGA (2:03)
HDMI (1:32)
DisplayPort (1:50)
DVI (1:32)
SATA Cables (1:21)
USB (2:21)
Network Fundamentals in Comptia A+
What is a network (5:33)
Network Architecture (2:41)
Physical Network Topologies (4:54)
OSI Reference Model (10:45)
Network Components (0:39)
Physical Media - Coaxial - Twisted Pair - Fiber Optic Cable (4:09)
Network Devices (0:20)
Basic Terms of Networking (5:36)
Reference Models (0:24)
TCP/IP (Networking) Basics (13:43)
OSI Reference Model vs. TCP/IP Reference Model (2:33)
Network Layers in Real World (8:03)
Layer 2 - Data Link Layer (3:50)
Layer 2: Ethernet - Principles, Frames & Headers (4:06)
Layer 2: ARP - Address Resolution Protocol (6:10)
Layer 2: Analysing ARP Packets (3:14)
Layer 2: VLANs (Virtual Local Area Networks) (4:03)
Layer 2: WLANs (Wireless Local Area Networks) (7:01)
Layer 3 - Network Layer (1:37)
Layer 3: IP (Internet Protocol) (2:49)
Layer 3: IPv4 Addressing System (1:56)
Layer 3: IPv4 Packet Header (2:56)
Layer 3: Subnetting - Classful Networks (2:35)
Layer 3: Subnetting Masks (2:59)
Layer 3: Understanding IPv4 Subnets (3:09)
Layer 3: IPv4 Address Shortage (1:41)
Layer 3: Private Networks (3:59)
Layer 3: Private Networks - Demonstration (3:01)
Layer 3: NAT (Network Address Translation) (4:30)
Layer 3: IPv6, Packet Header & Addressing (8:30)
Layer 3: DHCP - How the Mechanism Works (9:23)
Layer 3: ICMP (Internet Control Message Protocol) (2:02)
Layer 3: Traceroute (9:51)
Layer 4 - Transport Layer (2:40)
Layer 4: TCP (Transmission Control Protocol) (6:59)
Layer 4: TCP Header (2:27)
Layer 4: UDP (User Datagram Protocol) (3:56)
Layer 5-7 - Application Layer (0:55)
Layer 7: DNS (Domain Name System) (5:56)
Layer 7: HTTP (Hyper Text Transfer Protocol) (3:09)
Layer 7: HTTPS (1:56)
Routing (0:38)
IP - Mac (1:01)
Routers Role (1:24)
Routing Table (1:54)
Static and Dynamic Route Differences (3:34)
Wireless Access Point(WAP) (1:06)
Well-known Network Architectures Part-1 (16:51)
Well-known Network Architectures Part-2 (18:22)
Summary of Network Fundamentals (1:23)
Wi-fi Network Fundamentals
IEEE-802.11 (3:54)
Basic Terminologies and Concepts (4:50)
Wireless Operating Modes (6:11)
MAC Frame Structure (2:58)
Wireless Packet Types (5:21)
Wireless Encryption Protocols: WEP vs. WPA (3:58)
WPA 4-Way Handshake (5:45)
WPA2 Personal and Enterprise (3:16)
Wireshark: WEP and WPA (1:10)
Wi-Fi Protected Setup (WPS) (3:49)
Operating Systems in CompTIA A+220-1102
Functions Of Operating Systems (10:25)
VPNs (14:12)
Kinds of Operating System (1:47)
32-Bit vs. 64-Bit File Systems (3:24)
Fat32 (1:33)
Fat64 (2:21)
Windows (2:17)
Apple Macintosh OS (1:52)
Linux Systems (5:12)
Android (1:25)
iOS (1:23)
Chrome OS (1:13)
Linux Fundamentals
What is Linux? (1:35)
Distributions (1:22)
Pieces of Linux (2:56)
Shell (2:04)
Linux Signs: $, #, %, ~ (0:59)
Linux Desktop Environments (1:52)
Linux File Hierarchy (2:56)
Configuring Services (3:42)
User Management (2:37)
Package Management Concepts (3:25)
Foremost Linux Package Managers (2:30)
Repository (a.k.a. Repo) (0:49)
“apt-get” Package Manager (6:08)
Debian packages "dpkg" (2:26)
Install from Source Code (4:35)
System Monitoring (6:59)
Status of Network (1:49)
Windows Fundamentals in CompTIA A+ Certification
Introduction to Users and Groups (2:48)
Managing Users and Groups (1:21)
NTFS Permissions (1:54)
File Explorer (1:24)
MSCONFIG (2:06)
Services (Services.msc) (1:30)
Performance Monitor (1:56)
Task Manager (2:58)
Disk Management (1:50)
MSTSC (1:23)
Hardware and Network Troubleshooting in Comptia A+ 220-1101
Troubleshooting Methodology (3:24)
System Lockups (2:52)
Troubleshooting Internet Connections (3:33)
Check the Wi-Fi Settings (1:12)
Who Else Is Using the Internet? (1:32)
BIOS Time and Setting Resets (2:53)
Attempts to Boot to Incorrect Device (2:24)
Software Troubleshooting in Comptia A+ Certification
Slow System Performance (1:56)
Common Symptoms of Malware Infections (2:42)
macOS Boot Errors (1:54)
Windows Boot Errors (2:22)
Linux Boot Errors (2:09)
Libraries and Virtualization
What is Virtualization (1:06)
What is a Library - 1 (4:40)
Types of Virtualization (1:37)
Functions of Virtualization (1:06)
Security of the Virtualization (3:01)
Virtualization Lab Exercise - 1 (8:14)
Virtualization Lab Exercise - 2 (12:35)
What is a Library - 2 (4:21)
Programming Languages
Programming Languages (4:54)
Types of Programming (9:19)
Database Fundamentals
What is database? (3:19)
RDBMS(Relational Database Management System) (2:24)
What is SQL/Query? (2:47)
Install MS SQL Server Express Edition 2019 (4:35)
Insert Data to Table (10:06)
Update Data in A Table (5:41)
Delete Data and AdventureWorks (6:17)
Cloud Computing
Cloud Service Models-2 (3:25)
Cloud Service Models-1 (1:52)
Cloud Characteristics and Terms (6:23)
Cloud Deployment Models and Services (11:29)
Storage Types and Technologies (6:41)
Storage Technologies (9:29)
Security in Comptia A+
What is Security (2:22)
Privacy-Integrity-Availability (3:15)
A Rule (Authentication, Authorization and Accounting) (3:52)
What is a Hacker (6:27)
What is Attack? What are the Stages? (3:19)
Terms: Asset, Threat, Vulnerability, Risk, Exploit (3:08)
What is a Zero-day Attack? (4:18)
What are DoS and DDoS Attacks? (2:56)
What are Bot/Botnet and Zombies? (1:45)
Malware Types (1:44)
Who Needs Data Security? (9:42)
Protecting Data at Rest vs Data in Motion (8:17)
Types of Encryption for in Motion, in Use, at Rest Data (11:00)
Data Retention (9:11)
Data Access Control (19:23)
Controlling Access to the Property (11:43)
Securing the Building (4:33)
Fire Suppression (4:37)
Access Control Models and Methods (13:53)
File and Folder Permissions (12:21)
Cloud Accounting (17:34)
Multi-Factor Authentication (MFA) (7:49)
Types of Backups (12:20)
Backup Media and Cycle (8:25)
High Availability (HA) (14:29)
Disaster Recovery (DR) (17:49)
Hardware Hardening (6:13)
Operating System (OS) Hardening (9:04)
Application Hardening (8:15)
Firewalls and IDS/IPS (8:20)
Updating the OS (16:43)
Social Engineering
Tricking Users with Hoaxes (1:19)
Shoulder Surfing (1:08)
Tailgating and Mantraps (1:12)
Dumpster Diving (1:30)
Watering Hole Attacks (1:06)
Whaling (2:45)
Why Social Engineering Works (9:28)
Password Crackers (1:59)
Network Scanners (5:24)
Wireless Scanners / Cracker (3:20)
Banner Grabbing (0:48)
OSI Reference Model
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock