Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Phone: +27 10 020 2067

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA A+ 220-1002

E-COURSE:

CompTIA A+ 220-1002

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

The CompTIA A+ Core Series covers expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures. CompTIA A+ 220-1002 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures. 

To get the most out of the CompTIA A+ Certification Study Guides and prepare for your exam, you should have experience with basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts. This course will help you ace the CompTIA A 220-1002 exams, covering mobile devices, networking technology, security, and more.  Explore installing & configuring operating systems, expanded security & software troubleshooting

Objectives
  • Implement physical security.
  • Secure workstations and data.
  • Troubleshoot workstation security issues.
  • Support and troubleshoot mobile operating systems and applications.
  • Implement operational procedures.
  • Install, configure, and troubleshoot internal system components.

Module 1 - Operating Systems

0.1 Intro to A+ Core2 Instructor

1.0 Intro to A+ Core2

1.1 Operating Systems Part1

1.1 Operating Systems Part2

1.2 Copare and Contrast features of Microsoft Windows Versions

1.3 Summarize General OS Installation Considerations Upgrade Methods Demo

1.3 Summarize General OS Installation Considerations Upgrade Methods Part2

1.3 Summarize General OS Installation Considerations Upgrade Methods Part3

1.3 Summarize General OS Installation Considerations Upgrade Methods

1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Demo

1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Part1

1.4 Scenario use aÌŠppropriate Microsoft Command Line Tools Part2

1.5 Microsoft Operating System and Tools Part1 Demo

1.5 Microsoft Operating System and Tools Part1

1.5 Microsoft Operating System and Tools Part2 Demo

1.5 Microsoft Operating System and Tools Part2

1.5 Microsoft Operating System and Tools Part3 Demo

1.5 Microsoft Operating System and Tools Part3

1.5 Microsoft Operating System and Tools Part4 Demo

1.5 Microsoft Operating System and Tools Part4

1.6 Microsoft Windows Control Panel Utilities Demo

1.6 Microsoft Windows Control Panel Utilities

1.7 Summerize Application Installation and Configuration Concepts

1.8 Configure Windows Networking on a Client Desktop Demo

1.8 Configure Windows Networking on a Client Desktop

1.9 Features and Tools of MAC OS and Linux Client Desktop

Module 2 - Security

2.1 Security - Physical Security Measures

2.2 Explain Logical Security Concepts Part2

2.2 Explain Logical Security Concepts

2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods

2.4 Detect, Remove, and Prevent Malware using Appropriate Tools

2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1

2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2

2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo

2.6 Compare Contrast the different Microsoft Windows Security Settings

2.7 Implement Security Best Practices to Secure a Workstation Part2

2.7 Implement Security Best Practices to Secure a Workstation

2.8 Implement Methods for Securing Mobile Devices

2.9 Implement Appropriate Data Destruction & Disposal Methods

2.10 Configure Security on SOHO Wireless and Wired Networks Demo

2.10 Configure Security on SOHO Wireless and Wired Networks

Module 3 - Software Troubleshooting

3.1 Software Troubleshooting Demo

3.1 Software Troubleshooting Part1

3.1 Software Troubleshooting Part2

3.2 Troubleshoot and Resolve PC Security Issues Demo

3.2 Troubleshoot and Resolve PC Security Issues Part2

3.2 Troubleshoot and Resolve PC Security Issues

3.3 Best Practice Procedures for Malware Removal

3.4 Troubleshoot Mobile OS and Application

3.5 Troubleshoot Mobile OS and Application Security Issue

Module 4 - Operational Procedures

4.1 Operational Procedures

4.2 Implement Basic Change Management Best Practices

4.3 Implement Basic Disaster Prevention and Recovery Methods

4.4 Explain Common Safety Procedures

4.5 Explain Environmental Impacts and Appropriate Controls

4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts

4.7 Using Proper Communication Techniques and Professionalism

4.8 Identify the Basic of Scripting Demo

4.8 Identify the Basic of Scripting

4.9 Use Remote Access Technologies

E-COURSE E-Learning Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
USD 195
  • 16:41:00
    + Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top