Oreilly – CompTIA A+ Core 2 (220-1202) 2025-6

Oreilly – CompTIA A+ Core 2 (220-1202) 2025-6 Downloadly IRSpace

Oreilly – CompTIA A+ Core 2 (220-1202) 2025-6
Oreilly – CompTIA A+ Core 2 (220-1202) 2025-6

CompTIA A+ Core 2 (220-1202) Course. This course thoroughly teaches the concepts and skills necessary to pass the CompTIA A+ Core 2 (220-1202) exam and prepares you to troubleshoot and support computer systems. This course is suitable for those who are planning to obtain the CompTIA A+ certification and want to specialize in the field of information technology and network support. The course content is presented in four main sections: operating systems, security, software troubleshooting, and operational procedures. The operating systems section examines the differences between Windows, macOS, and Linux operating systems and teaches topics such as installation, configuration, command-line tools, and network management. The security section includes concepts such as physical and logical security, authentication, firewalls, wireless security protocols, malware protection, and mobile device security. In the software troubleshooting section, methods for solving common problems in operating systems and mobile applications are taught using specialized tools. The final section covers operational procedures such as documentation, change management, data recovery, security principles, professional communication, and scripting basics. At the end of the course, key points for taking the exam and an introductory introduction to artificial intelligence are provided. This course, by combining theoretical knowledge and practical skills, prepares you to enter the IT job market.

What you will learn

  • Compare and understand different types of operating systems: You will learn about the features and differences between Windows, macOS, and Linux operating systems.
  • Installing and Configuring Operating Systems: You will learn how to install and upgrade operating systems, including partitioning and formatting file systems.
  • Using Microsoft command-line and administrative tools: You work with Windows command-line and administrative tools such as Computer Management, Task Manager, and Disk Management.
  • Network Settings in Windows: You will learn about the concepts of networking in Windows, sharing, and remote network connections.
  • macOS and Linux Basics: You will learn about file structure, system settings, and basic commands in macOS and Linux.
  • Cybersecurity Concepts: You will learn about physical and logical security, wireless security protocols, malware detection and removal, and security best practices.
  • Software and Hardware Troubleshooting: You will learn the processes for troubleshooting operating systems, security problems, and issues related to mobile devices.
  • IT Operational Procedures: You will learn about documentation, change management, disaster prevention, safety procedures, and scripting basics.
  • CompTIA A+ Core 2 Exam Preparation (220-1202): This course will prepare you to pass this important exam and includes sample questions and exam tips.

This course is suitable for people who:

  • Are looking to earn the CompTIA A+ Core 2 (220-1202) certification.
  • They plan to enter the field of IT support and information technology.
  • Want to expand their knowledge in operating systems, security, and software troubleshooting.
  • Have no prior experience in IT and are looking for a comprehensive starting point.

CompTIA A+ Core 2 (220-1202) Course Specifications

Publisher: Oreilly
Instructor: Dave Prowse
Level of instruction: Beginner to Advanced
Number of lessons: 37
Duration of instruction: 37 hours and 40 minutes

Course headings

  • Introduction
    CompTIA A+ Core 2 (220-1202): Introduction
  • Module 1: Operating Systems
    Module Introduction
  • Lesson 1: Compare and Contrast Operating Systems
    Learning objectives
    1.1 Overview of Workstation Operating Systems
    1.2 Windows
    1.3 macOS
    1.4 Linux
    1.5 32-bit versus 64-bit
    1.6 Smartphone Tablet Operating Systems
    1.7 Vendor Life-Cycle Limitations
  • Lesson 2: Windows Versions and Features
    Learning objectives
    2.1 Comparison of Windows Editions and Features
    2.2 Corporate versus Personal Needs
    2.3 Application Requirements and Install Methods
  • Lesson 3: Operating System Installation
    Learning objectives
    3.1 Installation Methods
    3.2 Types of Installations
    3.3 Install/Upgrade Considerations
    3.4 Multiboot
    3.5 Partitioning
    3.6 File Systems Formatting
    3.7 More File Systems
  • Lesson 4: Microsoft Command-line Tools
    Learning objectives
    4.1 Introduction to Microsoft Command-Line Tools and Help Part 1
    4.2 Introduction to Microsoft Command-Line Tools and Help Part 2
    4.3 Challenge – Access Microsoft Command-line Tools
    4.4 File-related Commands Part 1
    4.5 File-related Commands Part 2
    4.6 File-related Commands Part 3
    4.7 Disk and File Checking Tools
    4.8 Working with Tasks
    4.9 Command-Line Networking in Windows Part 1 (ipconfig and ping)
    4.10 Command-Line Networking in Windows Part 2
    4.11 Winver, Hostname, and Pathping
    4.12 Policy-based Commands
    4.13 Windows Terminal Usage
  • Lesson 5: Microsoft Operating System Features and Tools
    Learning objectives
    5.1 Administrative Tools Part 1 (Computer Management and the MMC)
    5.2 Administrative Tools Part 2 (Performance Monitor and WMD)
    5.3 Administrative Tools Part 3 (Task Scheduler and Print Management)
    5.4 Administrative Tools Part 4 (Local Users and Groups and Event Viewer)
    5.5 Administrative Tools Part 5 (Windows Firewall and Local Security Policy)
    5.6 Additional Windows Tools
    5.7 System Configuration Utility
    5.8 Task Manager
    5.9 Disk Management
  • Lesson 6: Windows Control Panel Utilities
    Learning objectives
    6.1 How to Access the Control Panel
    6.2 Internet Options
    6.3 Display Resolution
    6.4 Folder/File Explorer Options
    6.5 System Properties
    6.6 Power Options
    6.7 Additional CP Icons (Part 1 – Windows 10)
    6.8 Additional CP Icons (Part 2 – Windows 11)
  • Lesson 7: Windows Settings
    Learning objectives
    7.1 How to Access Windows Settings
    7.2 Time Language
    7.3 Update Security
    7.4 Personalization and Apps
    7.5 Privacy
    7.6 System: Video, Power, Storage, and Remote Desktop
    7.7 System: About and System Properties
    7.8 Virtual Memory
    7.9 Devices
    7.10 Network Internet
    7.11 Accounts
  • Lesson 8: Windows Networking
    Learning objectives
    8.1 Introduction to Windows Networking
    8.2 Static Vs. Dynamic IP
    8.3 Workgroup Vs. Domain
    8.4 Sharing and Mapping Part 1
    8.5 Sharing and Mapping Part 2
    8.6 Administrative and Hidden Shares
    8.7 Establishing Network Connections
    8.8 Proxy Settings
    8.9 Remote Control of Windows Systems
    8.10 Firewall Settings
  • Lesson 9: macOS
    Learning objectives
    9.1 Introduction to macOS
    9.2 Apple ID
    9.3 Apple File Types for Applications
    9.4 Best Practices Part 1
    9.5 Best Practices Part 2
    9.6 System Folders
    9.7 System Settings
    9.8 Features
    9.9 More macOS Tools
  • Lesson 10: Linux 101
    Learning objectives
    10.1 Introduction to Linux
    10.2 The Terminal
    10.3 Basic Linux Commands and Help System
    10.4 Working with Directories and Files Part 1
    10.5 Working with Directories and Files Part 2
    10.6 Administrative Access in Linux
    10.7 Linux Analysis
    10.8 Using Text Editors
    10.9 Linux Networking Part 1
    10.10 Linux Networking Part 2
    10.11 File System Management
    10.12 Common Configuration Files
    10.13 OS Components
    10.14 Linux Best Practices
    10.15 Challenge – Use Linux Tools
  • Lesson 11: Cloud-based Productivity Tools
    Learning objectives
    11.1 Email Systems
    11.2 Collaboration Tools and Storage
  • Module 2: Security
    Module Introduction
  • Lesson 12: Physical Logical Security
    Learning objectives
    12.1 Physical Security
    12.2 Active Directory
    12.3 User Authentication
    12.4 Firewall Security
    12.5 MDM Policies and DLP
    12.6 Certificates and Trust
    12.7 Principle of Least Privilege
    12.8 Hard vs. Soft Tokens
    12.9 Authenticator Apps and SMS Security
    12.10 More Security Measures
  • Lesson 13: Wireless Security Protocols and Authentication Methods
    Learning objectives
    13.1 Wireless Encryption Protocols
    13.2 Wireless Authentication (Enterprise)
    13.3 Kerberos
  • Lesson 14: Malware Prevention, Detection, and Removal
    Learning objectives
    14.1 Malware Part 1
    14.2 Malware Part 2
    14.3 Malware Part 3
    14.4 Keyloggers
    14.5 Cryptominers
    14.6 Tools and Methods for Defeating Malware
    14.7 More Malware Defeating Tools
  • Lesson 15: Best Practices for Malware Removal
    Learning objectives
    15.1 Malware Removal Procedure
    15.2 Scenario – Scan For and Quarantine a Virus
  • Lesson 16: Social Engineering and Additional Attacks and Threats
    Learning objectives
    16.1 Social Engineering Part 1
    16.2 Social Engineering Part 2
    16.3 Attacks on Passwords
    16.4 DoS, DDoS, Botnets, and Zero-day Attacks
    16.5 Additional Threats
  • Lesson 17: Windows Security Settings
    Learning objectives
    17.1 Login Options
    17.2 Users and Groups
    17.3 Sharing and Permissions
    17.4 BitLocker and EFS
    17.5 Windows Defender Antivirus
    17.6 Windows Defender Firewall
    17.7 Enabling and Disabling Windows Features
  • Lesson 18: Workstation Security
    Learning objectives
    18.1 Password Best Practices
    18.2 Account Management
    18.3 Basic Active Directory Functions
    18.4 Disabling AutoPlay/Autorun
    18.5 Disabling Unused Services
  • Lesson 19: Mobile Device Security
    Learning objectives
    19.1 Screen Locks
    19.2 Best Practices in the Case of Loss or Theft
    19.3 Additional Mobile Device Security
    19.4 Internet of Things (IoT)
  • Lesson 20: Data Disposal and Destruction
    Learning objectives
    20.1 Recycling Repurposing Best Practices
    20.2 Physical Destruction
    20.3 Regulatory and Environmental Considerations
  • Lesson 21: SOHO Security
    Learning objectives
    21.1 SOHO Wireless Security Part 1
    21.2 SOHO Wireless Security Part 2
    21.3 SOHO Wireless Security Part 3
    21.4 SOHO Secure Management Access
  • Lesson 22: Browser Security
    Learning objectives
    22.1 Browser Download/Installation
    22.2 Browser Settings
    22.3 Extensions and Plug-ins
    22.4 Password Managers
    22.5 Secure Connections
    22.6 Proxies and Secure DNS
    22.7 Browser Patching
    22.8 More Browser Security Settings
  • Module 3: Software Troubleshooting
    Module Introduction
  • Lesson 23: Troubleshoot Microsoft Windows
    Learning objectives
    23.1 A+ Troubleshooting Process
    23.2 Troubleshooting Windows Operating System Failures Part 1
    23.3 Troubleshooting Windows Operating System Failures Part 2
    23.4 Troubleshooting Windows Operating System Failures Part 3
    23.5 Windows 10 Recovery Environment and Troubleshooting
    23.6 Windows 11 Recovery Environment
    23.7 Service Failures
    23.8 Performance and Application Issues
    23.9 Windows Troubleshooting Utilities Part 1
    23.10 Windows Troubleshooting Utilities Part 2
  • Lesson 24: Troubleshoot PC Security Issues
    Learning objectives
    24.1 Common Symptoms and Potential Culprits Part 1
    24.2 Common Symptoms and Potential Culprits Part 2
    24.3 Invalid Certificate Issues
    24.4 Tools Used to Solve Security Problems
  • Lesson 25: Troubleshoot Mobile OS and Application Issues
    Learning objectives
    25.1 Common Symptoms of Mobile OS/App Issues
    25.2 Troubleshooting Android and iOS
  • Lesson 26: Troubleshoot Mobile OS Security Issues
    Learning objectives
    26.1 Mobile OS Security Issues – Symptoms and Concerns
    26.2 Tools Used to Solve Mobile OS Security Problems
  • Module 4: Operational Procedures
    Module Introduction
  • Lesson 27: Documentation
    Learning objectives
    27.1 Ticketing Systems
    27.2 Asset Management
    27.3 Types of Documents
    27.4 Network Documentation
    27.5 Knowledge Bases and Articles
  • Lesson 28: Change Management
    Learning objectives
    28.1 Change Management Best Practices Part 1
    28.2 Change Management Best Practices Part 2
    28.3 Change Management – Additional Terms
  • Lesson 29: Disaster Prevention and Recovery
    Learning objectives
    29.1 Power Problems and Protective Devices
    29.2 Backup Methods and Testing
    29.3 Backup Demonstrations
    29.4 Account Recovery Options
  • Lesson 30: Safety Procedures
    Learning objectives
    30.1 ESD Prevention
    30.2 Equipment Grounding
    30.3 Personal Safety
  • Lesson 31: Environmental Impacts and Controls
    Learning objectives
    31.1 MSDS Documentation
    31.2 Toxic Waste Handling
    31.3 Environmental Controls
  • Lesson 32: Incident Response, Licensing, and Regulated Data
    Learning objectives
    32.1 Incident Response
    32.2 Licensing
    32.3 Non-Disclosure Agreements (NDA)
    32.4 Regulated Data
  • Lesson 33: Communication and Professionalism
    Learning objectives
    33.1 Communication Techniques
    33.2 Professionalism
  • Lesson 34: Basic Scripting
    Learning objectives
    34.1 Introduction to Scripting
    34.2 Challenge – Use PowerShell and VSC
    34.3 Challenge – Linux, Nano, Vim, and Bash
    34.4 Use Cases for Scripting
  • Lesson 35: Remote Access Technologies
    Learning objectives
    35.1 RDP
    35.2 SSH
    35.3 More Remote Access Technologies
    35.4 Remote Access Security Considerations
  • Lesson 36: Artificial Intelligence
    Learning objectives
    36.1 Introduction to “AI”
    36.2 AI Examples
  • Lesson 37: Exam Tips and Examples
    Learning objectives
    37.1 A+ Test Taking Tips Techniques
    37.2 Sample A+ Core 2 Question #1
    37.3 Sample A+ Core 2 Question #2
    37.4 Sample A+ Core 2 Question #3
    37.5 Sample A+ Core 2 Question #4
    37.6 Sample A+ Core 2 Question #5
    37.7 Sample A+ Core 2 Question #6
  • Summary
    CompTIA A+ Core 2 (220-1202): Summary

Course images

CompTIA A+ Core 2 (220-1202)

Sample course video

Installation Guide

After Extract, view with your favorite player.

Subtitles: None

Quality: 720p

Download link

Download Part 1 – 1 GB

Download Part 2 – 1 GB

Download Part 3 – 1 GB

Download Part 4 – 1 GB

Download Part 5 – 1 GB

Download Part 6 – 1 GB

Download Part 7 – 56 MB

File(s) password: www.downloadly.ir

File size

6.05 GB