Oreilly – CompTIA A+ Core 2 (220-1202) 2025-6
Oreilly – CompTIA A+ Core 2 (220-1202) 2025-6 Downloadly IRSpace
CompTIA A+ Core 2 (220-1202) Course. This course thoroughly teaches the concepts and skills necessary to pass the CompTIA A+ Core 2 (220-1202) exam and prepares you to troubleshoot and support computer systems. This course is suitable for those who are planning to obtain the CompTIA A+ certification and want to specialize in the field of information technology and network support. The course content is presented in four main sections: operating systems, security, software troubleshooting, and operational procedures. The operating systems section examines the differences between Windows, macOS, and Linux operating systems and teaches topics such as installation, configuration, command-line tools, and network management. The security section includes concepts such as physical and logical security, authentication, firewalls, wireless security protocols, malware protection, and mobile device security. In the software troubleshooting section, methods for solving common problems in operating systems and mobile applications are taught using specialized tools. The final section covers operational procedures such as documentation, change management, data recovery, security principles, professional communication, and scripting basics. At the end of the course, key points for taking the exam and an introductory introduction to artificial intelligence are provided. This course, by combining theoretical knowledge and practical skills, prepares you to enter the IT job market.
What you will learn
- Compare and understand different types of operating systems: You will learn about the features and differences between Windows, macOS, and Linux operating systems.
- Installing and Configuring Operating Systems: You will learn how to install and upgrade operating systems, including partitioning and formatting file systems.
- Using Microsoft command-line and administrative tools: You work with Windows command-line and administrative tools such as Computer Management, Task Manager, and Disk Management.
- Network Settings in Windows: You will learn about the concepts of networking in Windows, sharing, and remote network connections.
- macOS and Linux Basics: You will learn about file structure, system settings, and basic commands in macOS and Linux.
- Cybersecurity Concepts: You will learn about physical and logical security, wireless security protocols, malware detection and removal, and security best practices.
- Software and Hardware Troubleshooting: You will learn the processes for troubleshooting operating systems, security problems, and issues related to mobile devices.
- IT Operational Procedures: You will learn about documentation, change management, disaster prevention, safety procedures, and scripting basics.
- CompTIA A+ Core 2 Exam Preparation (220-1202): This course will prepare you to pass this important exam and includes sample questions and exam tips.
This course is suitable for people who:
- Are looking to earn the CompTIA A+ Core 2 (220-1202) certification.
- They plan to enter the field of IT support and information technology.
- Want to expand their knowledge in operating systems, security, and software troubleshooting.
- Have no prior experience in IT and are looking for a comprehensive starting point.
CompTIA A+ Core 2 (220-1202) Course Specifications
Publisher: Oreilly
Instructor: Dave Prowse
Level of instruction: Beginner to Advanced
Number of lessons: 37
Duration of instruction: 37 hours and 40 minutes
Course headings
- Introduction
CompTIA A+ Core 2 (220-1202): Introduction - Module 1: Operating Systems
Module Introduction - Lesson 1: Compare and Contrast Operating Systems
Learning objectives
1.1 Overview of Workstation Operating Systems
1.2 Windows
1.3 macOS
1.4 Linux
1.5 32-bit versus 64-bit
1.6 Smartphone Tablet Operating Systems
1.7 Vendor Life-Cycle Limitations - Lesson 2: Windows Versions and Features
Learning objectives
2.1 Comparison of Windows Editions and Features
2.2 Corporate versus Personal Needs
2.3 Application Requirements and Install Methods - Lesson 3: Operating System Installation
Learning objectives
3.1 Installation Methods
3.2 Types of Installations
3.3 Install/Upgrade Considerations
3.4 Multiboot
3.5 Partitioning
3.6 File Systems Formatting
3.7 More File Systems - Lesson 4: Microsoft Command-line Tools
Learning objectives
4.1 Introduction to Microsoft Command-Line Tools and Help Part 1
4.2 Introduction to Microsoft Command-Line Tools and Help Part 2
4.3 Challenge – Access Microsoft Command-line Tools
4.4 File-related Commands Part 1
4.5 File-related Commands Part 2
4.6 File-related Commands Part 3
4.7 Disk and File Checking Tools
4.8 Working with Tasks
4.9 Command-Line Networking in Windows Part 1 (ipconfig and ping)
4.10 Command-Line Networking in Windows Part 2
4.11 Winver, Hostname, and Pathping
4.12 Policy-based Commands
4.13 Windows Terminal Usage - Lesson 5: Microsoft Operating System Features and Tools
Learning objectives
5.1 Administrative Tools Part 1 (Computer Management and the MMC)
5.2 Administrative Tools Part 2 (Performance Monitor and WMD)
5.3 Administrative Tools Part 3 (Task Scheduler and Print Management)
5.4 Administrative Tools Part 4 (Local Users and Groups and Event Viewer)
5.5 Administrative Tools Part 5 (Windows Firewall and Local Security Policy)
5.6 Additional Windows Tools
5.7 System Configuration Utility
5.8 Task Manager
5.9 Disk Management - Lesson 6: Windows Control Panel Utilities
Learning objectives
6.1 How to Access the Control Panel
6.2 Internet Options
6.3 Display Resolution
6.4 Folder/File Explorer Options
6.5 System Properties
6.6 Power Options
6.7 Additional CP Icons (Part 1 – Windows 10)
6.8 Additional CP Icons (Part 2 – Windows 11) - Lesson 7: Windows Settings
Learning objectives
7.1 How to Access Windows Settings
7.2 Time Language
7.3 Update Security
7.4 Personalization and Apps
7.5 Privacy
7.6 System: Video, Power, Storage, and Remote Desktop
7.7 System: About and System Properties
7.8 Virtual Memory
7.9 Devices
7.10 Network Internet
7.11 Accounts - Lesson 8: Windows Networking
Learning objectives
8.1 Introduction to Windows Networking
8.2 Static Vs. Dynamic IP
8.3 Workgroup Vs. Domain
8.4 Sharing and Mapping Part 1
8.5 Sharing and Mapping Part 2
8.6 Administrative and Hidden Shares
8.7 Establishing Network Connections
8.8 Proxy Settings
8.9 Remote Control of Windows Systems
8.10 Firewall Settings - Lesson 9: macOS
Learning objectives
9.1 Introduction to macOS
9.2 Apple ID
9.3 Apple File Types for Applications
9.4 Best Practices Part 1
9.5 Best Practices Part 2
9.6 System Folders
9.7 System Settings
9.8 Features
9.9 More macOS Tools - Lesson 10: Linux 101
Learning objectives
10.1 Introduction to Linux
10.2 The Terminal
10.3 Basic Linux Commands and Help System
10.4 Working with Directories and Files Part 1
10.5 Working with Directories and Files Part 2
10.6 Administrative Access in Linux
10.7 Linux Analysis
10.8 Using Text Editors
10.9 Linux Networking Part 1
10.10 Linux Networking Part 2
10.11 File System Management
10.12 Common Configuration Files
10.13 OS Components
10.14 Linux Best Practices
10.15 Challenge – Use Linux Tools - Lesson 11: Cloud-based Productivity Tools
Learning objectives
11.1 Email Systems
11.2 Collaboration Tools and Storage - Module 2: Security
Module Introduction - Lesson 12: Physical Logical Security
Learning objectives
12.1 Physical Security
12.2 Active Directory
12.3 User Authentication
12.4 Firewall Security
12.5 MDM Policies and DLP
12.6 Certificates and Trust
12.7 Principle of Least Privilege
12.8 Hard vs. Soft Tokens
12.9 Authenticator Apps and SMS Security
12.10 More Security Measures - Lesson 13: Wireless Security Protocols and Authentication Methods
Learning objectives
13.1 Wireless Encryption Protocols
13.2 Wireless Authentication (Enterprise)
13.3 Kerberos - Lesson 14: Malware Prevention, Detection, and Removal
Learning objectives
14.1 Malware Part 1
14.2 Malware Part 2
14.3 Malware Part 3
14.4 Keyloggers
14.5 Cryptominers
14.6 Tools and Methods for Defeating Malware
14.7 More Malware Defeating Tools - Lesson 15: Best Practices for Malware Removal
Learning objectives
15.1 Malware Removal Procedure
15.2 Scenario – Scan For and Quarantine a Virus - Lesson 16: Social Engineering and Additional Attacks and Threats
Learning objectives
16.1 Social Engineering Part 1
16.2 Social Engineering Part 2
16.3 Attacks on Passwords
16.4 DoS, DDoS, Botnets, and Zero-day Attacks
16.5 Additional Threats - Lesson 17: Windows Security Settings
Learning objectives
17.1 Login Options
17.2 Users and Groups
17.3 Sharing and Permissions
17.4 BitLocker and EFS
17.5 Windows Defender Antivirus
17.6 Windows Defender Firewall
17.7 Enabling and Disabling Windows Features - Lesson 18: Workstation Security
Learning objectives
18.1 Password Best Practices
18.2 Account Management
18.3 Basic Active Directory Functions
18.4 Disabling AutoPlay/Autorun
18.5 Disabling Unused Services - Lesson 19: Mobile Device Security
Learning objectives
19.1 Screen Locks
19.2 Best Practices in the Case of Loss or Theft
19.3 Additional Mobile Device Security
19.4 Internet of Things (IoT) - Lesson 20: Data Disposal and Destruction
Learning objectives
20.1 Recycling Repurposing Best Practices
20.2 Physical Destruction
20.3 Regulatory and Environmental Considerations - Lesson 21: SOHO Security
Learning objectives
21.1 SOHO Wireless Security Part 1
21.2 SOHO Wireless Security Part 2
21.3 SOHO Wireless Security Part 3
21.4 SOHO Secure Management Access - Lesson 22: Browser Security
Learning objectives
22.1 Browser Download/Installation
22.2 Browser Settings
22.3 Extensions and Plug-ins
22.4 Password Managers
22.5 Secure Connections
22.6 Proxies and Secure DNS
22.7 Browser Patching
22.8 More Browser Security Settings - Module 3: Software Troubleshooting
Module Introduction - Lesson 23: Troubleshoot Microsoft Windows
Learning objectives
23.1 A+ Troubleshooting Process
23.2 Troubleshooting Windows Operating System Failures Part 1
23.3 Troubleshooting Windows Operating System Failures Part 2
23.4 Troubleshooting Windows Operating System Failures Part 3
23.5 Windows 10 Recovery Environment and Troubleshooting
23.6 Windows 11 Recovery Environment
23.7 Service Failures
23.8 Performance and Application Issues
23.9 Windows Troubleshooting Utilities Part 1
23.10 Windows Troubleshooting Utilities Part 2 - Lesson 24: Troubleshoot PC Security Issues
Learning objectives
24.1 Common Symptoms and Potential Culprits Part 1
24.2 Common Symptoms and Potential Culprits Part 2
24.3 Invalid Certificate Issues
24.4 Tools Used to Solve Security Problems - Lesson 25: Troubleshoot Mobile OS and Application Issues
Learning objectives
25.1 Common Symptoms of Mobile OS/App Issues
25.2 Troubleshooting Android and iOS - Lesson 26: Troubleshoot Mobile OS Security Issues
Learning objectives
26.1 Mobile OS Security Issues – Symptoms and Concerns
26.2 Tools Used to Solve Mobile OS Security Problems - Module 4: Operational Procedures
Module Introduction - Lesson 27: Documentation
Learning objectives
27.1 Ticketing Systems
27.2 Asset Management
27.3 Types of Documents
27.4 Network Documentation
27.5 Knowledge Bases and Articles - Lesson 28: Change Management
Learning objectives
28.1 Change Management Best Practices Part 1
28.2 Change Management Best Practices Part 2
28.3 Change Management – Additional Terms - Lesson 29: Disaster Prevention and Recovery
Learning objectives
29.1 Power Problems and Protective Devices
29.2 Backup Methods and Testing
29.3 Backup Demonstrations
29.4 Account Recovery Options - Lesson 30: Safety Procedures
Learning objectives
30.1 ESD Prevention
30.2 Equipment Grounding
30.3 Personal Safety - Lesson 31: Environmental Impacts and Controls
Learning objectives
31.1 MSDS Documentation
31.2 Toxic Waste Handling
31.3 Environmental Controls - Lesson 32: Incident Response, Licensing, and Regulated Data
Learning objectives
32.1 Incident Response
32.2 Licensing
32.3 Non-Disclosure Agreements (NDA)
32.4 Regulated Data - Lesson 33: Communication and Professionalism
Learning objectives
33.1 Communication Techniques
33.2 Professionalism - Lesson 34: Basic Scripting
Learning objectives
34.1 Introduction to Scripting
34.2 Challenge – Use PowerShell and VSC
34.3 Challenge – Linux, Nano, Vim, and Bash
34.4 Use Cases for Scripting - Lesson 35: Remote Access Technologies
Learning objectives
35.1 RDP
35.2 SSH
35.3 More Remote Access Technologies
35.4 Remote Access Security Considerations - Lesson 36: Artificial Intelligence
Learning objectives
36.1 Introduction to “AI”
36.2 AI Examples - Lesson 37: Exam Tips and Examples
Learning objectives
37.1 A+ Test Taking Tips Techniques
37.2 Sample A+ Core 2 Question #1
37.3 Sample A+ Core 2 Question #2
37.4 Sample A+ Core 2 Question #3
37.5 Sample A+ Core 2 Question #4
37.6 Sample A+ Core 2 Question #5
37.7 Sample A+ Core 2 Question #6 - Summary
CompTIA A+ Core 2 (220-1202): Summary
Course images

Sample course video
Installation Guide
After Extract, view with your favorite player.
Subtitles: None
Quality: 720p
Download link
File(s) password: www.downloadly.ir
File size
6.05 GB
Super Admin