TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
CompTIA
CompTIA A+ Core 2 (220-1202) V15
Curriculum
4 Sections
36 Lessons
16 Hours
Expand all sections
Collapse all sections
Operating Systems
11
1.1
Cloud-based productivity tools installation and configuration
1.2
Application installation according to requirements
1.3
Linux client/desktop operating system features and tools
1.4
macOS/desktop operating system features and tools
1.5
Microsoft Windows networking features on client/desktop
1.6
Microsoft Windows settings configuration
1.7
Microsoft command-line tools
1.8
Microsoft Windows operating system features and tools
1.9
Microsoft Windows editions features
1.10
OS installations and upgrades in diverse environments
1.11
Common operating system types and their purposes
02. Security
11
2.1
Browser security settings configuration
2.2
Data destruction and disposal methods
2.3
SOHO wireless and wired network security settings
2.4
Mobile device security methods
2.5
Workstation security options and hardening techniques
2.6
Malware types and detection, removal, and prevention tools/methods
2.7
SOHO malware removal procedures
2.8
Social engineering attacks, threats, and vulnerabilities
2.9
Wireless security protocols and authentication methods
2.10
Microsoft Windows OS security settings configuration
2.11
Security measures and purposes
03. Software Troubleshooting
4
3.1
Personal computer security issues troubleshooting
3.2
Mobile OS and application security issues troubleshooting
3.3
Mobile OS and application issues troubleshooting
3.4
Windows OS issues troubleshooting
04. Operational Procedures
10
4.1
Documentation and support systems information management best practices
4.2
Remote access technologies
4.3
Artificial intelligence basic concepts
4.4
Environmental impacts and local environment controls
4.5
Scripting basics
4.6
Communication techniques and professionalism
4.7
Prohibited content/activity and privacy, licensing, and policy concepts
4.8
Common safety procedures
4.9
Workstation backup and recovery methods
4.10
Change management procedures
This content is protected, please
login
and
enroll
in the course to view this content!