Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Comptia A+ 1102 (Core 2) Exam Course

Rekomendowane odpowiedzi

3fa4dc6de5af4c9559501fedcecc4582.jpeg
Free Download Comptia A+ 1102 (Core 2) Exam Course
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.94 GB | Duration: 8h 5m
This course will cover the entirety of the A+ 1102 Exam Objectives

What you'll learn
Operating Systems
Security
Software Troubleshooting
Operational Procedures
Requirements
A+ 1102 is the foundational Comptia IT certification. Core 2 / A+ 1102 is the second half of the two-part A+ exam.
Description
Third Level Technology is proud to offer the CompTIA A+ 1102 (Core 2) Exam Course. TLT is the leading provider of CompTIA instruction on the Spotify platform and excited to begin offering our educational materials on Udemy!The CompTIA A+ Exam is a foundational IT certification consisting of two separate exams: Core 1 - 1101 & Core 2 - 1102. This course will cover A+ 1102 (Core 2) and review all of the Exam Objectives sequentially. It is recommended to have a copy of the A+ 1102 Exam Objectives as you go through this course.This course will cover the following topics and modules in sequential order:Module 1 : Operating SystemsModule 2 : SecurityModule 3 : Software TroubleshootingModule 4 : Operational ProceduresMODULE 1 : OPERATING SYSTEMS1.1 : Microsoft Windows - Identify basic features of Microsoft Windows editions.1.2 : Windows Command Line - Given a scenario, use the appropriate Microsoft command-line tool.1.3 : Microsoft Windows Features - Given a scenario, use features and tools of the Microsoft Windows 10/11 operating system (OS).1.4 : Windows Control Panel - Given a scenario, use the appropriate Microsoft Windows Control Panel utility.1.5 : Windows System Settings - Given a scenario, use the appropriate Windows settings.1.6 : Windows Networking Features - Given a scenario, configure Microsoft Windows networking features on a client/desktop.1.7 : Application Installations - Given a scenario, apply application installation and configuration concepts.1.8 : Operating System Types - Explain common OS types and their purposes.1.9 : OS Installs & Upgrades - Given a scenario, perform OS installations and upgrades in a diverse OS environment.1.10 : Apple MacOS Settings - Identify common features and tools of the macOS/desktop OS.1.11 : Linux OS & Commands - Identify common features and tools of the Linux client/desktop OS.MODULE 2 : SECURITY2.1 : Physical & Logical Security - Summarize various security measures and their purposes.2.2 : Wireless Security Protocols - Compare and contrast wireless security protocols and authentication methods.2.3 : Malware Types & Prevention - Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods.2.4 : Social Engineering - Explain common social-engineering attacks, threats, and vulnerabilities.2.5 : Windows OS Security - Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.2.6 : Workstation Security - Given a scenario, configure a workstation to meet best practices for security.2.7 : Mobile Device Security - Explain common methods for securing mobile and embedded devices.2.8 : Data Destruction & Disposal - Given a scenario, use common data destruction and disposal methods.2.9 : SOHO Network Security - Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.2.10 : Browser Security - Given a scenario, install and configure browsers and relevant security settings.MODULE 3 : SOFTWARE TROUBLESHOOTING3.1 : Windows OS Troubleshooting - Given a scenario, troubleshoot common Windows OS problems.3.2 : PC Troubleshooting - Given a scenario, troubleshoot common personal computer (PC) security issues.3.3 : Malware Removal - Given a scenario, use best practice procedures for malware removal.3.4 : Mobile Device Troubleshooting - Given a scenario, troubleshoot common mobile OS and application issues.3.5 : Mobile Operating Systems - Given a scenario, troubleshoot common mobile OS and application security issues.MODULE 4 : Operational Procedures4.1 : Support System Management - Implement best practices associated with documentation and support systems information management.4.2 : Change Management - Explain basic change-management best practices.4.3 : Backup & Recovery Methods - Given a scenario, implement workstation backup and recovery methods.4.4 : Personal Safety Procedures - Given a scenario, use common safety procedures.4.5 : Environmental Controls - Summarize environmental impacts and local environmental controls.4.6 : Incident Response & Licensing - Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.4.7 : Professionalism - Given a scenario, use proper communication techniques and professionalism.4.8 : Scripting Basics - Identify the basics and common use cases of scripting.4.9 : Remote Access Technologies - Given a scenario, understand the best uses of remote access technologies.As your going through the course if you have any specific questions or inquiries on a topic please submit them via email
Overview
Section 1: Module 1 : Operating Systems
Lecture 1 1.1 - Microsoft Windows Editions
Lecture 2 1.2 - Microsoft Command Line
Lecture 3 1.3 - Microsoft Windows Features
Lecture 4 1.4 - Windows Control Panel
Lecture 5 1.5 - Windows System Settings
Lecture 6 1.6 - Windows Networking Features
Lecture 7 1.7 - Application Installations
Lecture 8 1.8 - Operating System Types
Lecture 9 1.9 - OS Installs & Upgrades
Lecture 10 1.10 - Apple MacOS Settings
Lecture 11 1.11 - Linux OS & Commands
Section 2: Module 2 : Security
Lecture 12 2.1 - Physical Security
Lecture 13 2.1 - Logical Security
Lecture 14 2.2 - Wireless Security Protocols
Lecture 15 2.3 - Malware Types & Prevention
Lecture 16 2.4 - Social Engineering Threats
Lecture 17 2.5 - Windows OS Security Settings
Lecture 18 2.6 - Workstation Security
Lecture 19 2.7 - Mobile Device Security
Lecture 20 2.8 - Data Destruction & Disposal
Lecture 21 2.9 - SOHO Network Security
Lecture 22 2.10 - Browser Security
Section 3: Module 3 : Software Troubleshooting
Lecture 23 3.1 - Windows OS Troubleshooting
Lecture 24 3.2 - PC Troubleshooting
Lecture 25 3.3 - Malware Removal
Lecture 26 3.4 - Mobile Device Troubleshooting
Lecture 27 3.5 - Mobile Operating Systems
Section 4: Module 4 : Operational Procedures
Lecture 28 4.1 - Support System Management
Lecture 29 4.2 - Change Management
Lecture 30 4.3 - Backup & Recovery Methods
Lecture 31 4.4 - Personal Safety Procedures
Lecture 32 4.5 - Environmental Controls
Lecture 33 4.6 - Incident Response, Licensing & Regulation
Lecture 34 4.7 - Professionalism
Lecture 35 4.8 - Scripting Basics
Lecture 36 4.9 - Remote Access Technologies
Section 5: Acronym List Flash Cards
Lecture 37 Acronym List : Page 1
Lecture 38 Acronym List : Page 2
Lecture 39 Acronym List : Page 3
Section 6: Acronym List Glossary of Terms
Lecture 40 Acronym List Definitions : Page 1
Lecture 41 Acronym List Definitions : Page 2
Lecture 42 Acronym List Definitions ; Page 3
This course is designed for those IT professionals looking to achieve Comptia A+ certification.
Screenshot
Homepage

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.






Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 3 Views
    • 1 Posts
    • 3 Views
    • 1 Posts
    • 4 Views
    • 1 Posts
    • 7 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.