CompTIA A+ 220-902 Training Course

4k learners

The CompTIA A+ 220-902 certification course is meant for professionals wanting to enhance their skills in IT infrastructure. It is the stepping stone to gain the CompTIA A+ certification. This course covers the fundamental concepts of installing and configuring operating systems including Windows, iOS, Android, Apple OS X, and Linux.

  • 1-year e-learning access

  • Course completion certificate

  • 100% money-back guarantee

Online Self Learning USD 199 (USD 249) Enroll Now
Live Online Training -- Get Quote
Traditional Classroom -- Get Quote

Group Training

Looking for a personalized training for a group (3 or more participants) at your preferred location?
Contact us

Course Overview

CompTIA A+ 220-902 is the second of the two exams that one needs to pass for achieving the CompTIA A+ Certification. In this course, we will discuss the installation of Operating systems, networking, and configuring operating systems on android and IOS. We will also discuss the maintenance of Operating systems of Windows, Android and Apple IOS. This course is meant for those who are interested in learning the basics of computers. It is also for people who deal with hardware of computers and those who are looking for a certification.

Course Outline

Introduction
Features and Requir...
Features and Requir...
Identifying Features
Windows Features
System Restore and Event Viewer
File Structure and Paths
Other Features
Upgrade Path
Upgrade Tools
System Tools Demonstration Part1
System Tools Demonstration Part2
System Tools Demonstration Part3
System Tools Demonstration Part4
Installing Windows PC Operating Systems Part 1
Installing Windows PC Operating Systems Part 2
Boot Methods
Types of Installations Part 1
Types of Installations Part2
Partitioning
File System Types a...
Installation Parameters
Microsoft Command Line Tools Part1
Microsoft Command Line Tools Part2
Commands To Know
Available Command Privileges
Command Prompt Navigation Commands Demonstration
Operating System Fe...
Operating System Features and Tools Part2
Windows Administrative Tools
MSCONFIG
Task Manager
Disk Management
Clean Installation ...
System Utilities
Computer Management...
Device Manager Demonstration
User Accounts Demonstration
Performance Monitor Demonstration
Windows Services Demonstration
Print Management
System Configuration Demonstration
Task Manager Console Demonstration
Registry Editor Demonstration
Microsoft Managemen...
Defragmenting Optic...
Control Panel Utilities Part1
Control Panel Utilities Part2
Internet Options
Display Settings
User Accounts and Folder Options
System Properties
Security Center/Action Center
Power Options
Programs and Features/Homegroups
Devices and Printers/Sounds
Troubleshooting/Net...
Control Panel/Internet Options Demonstration
Display Demonstration
Power Options Demonstration
Programs and Features Demonstration
Homegroup Demonstration
Sound Demonstration
Troubleshooting/Network and Sharing Demonstration
Client and Desktop Windows Networking Part1
Client and Desktop ...
Homegroup vs Workgroup
Domain Setup
Network and Administrative Shares
Establishing Networ...
Remote Desktop Conn...
Network Sharing Settings
Firewall Settings
Alternative IP Address Configuration
Network Card Properties
Joining a Computer to a Domain Demonstration
Administrative Shares
Mapping Drives Demo...
LAN Setting for Proxy Server Demonstration
Connecting to a Remote Desktop Demonstration
Alternate IP Addressing Demonstration
Preventive Maintenance Tools and Procedures Part1
Preventive Maintenance Tools and Procedures Part2
Scheduled Backups
Scheduled Disk Maintenance
Maintenance Updates
Maintenance Tools
Managing Windows Up...
Diskcheck and Defrag Demonstration
Operating Systems Features and Functionality Part1
Operating System Features
Best Practices
Disk Maintenance Utilities
Shell/Terminal Tool
Screen Sharing Tool
Force Quit and skill Tool
Operating System Features
Basic Linux Commands
Setup and Usage Of ...
Setup and Usage Of ...
Virtual Machines Re...
Client Side Virtual...
Basic Cloud Concepts Part1
Basic Cloud Concept...
Cloud Based Services
Cloud Models
Cloud Benefits and Resource Pooling
Measured Service
Network Host Servic...
Network Host Services Part2
Server Roles
Internet Appliances
Legacy Embedded Systems
Mobile Operating Systems Part1
Mobile Operating Systems Part2
Android vs. IOS
Application Sources
Screen Orientation and Calibration
Common Mobile Features
Downloading Mobile Applications
Mobile Device Network Connectivity and Email Configuration Part1
Mobile Device Network Connectivity and Email Configuration Part2
Enabling and Disabling Wireless/Cellular Networks
Corporate and ISP Email Configuration and Security
PRI/PRL/Baseband Updates
Radio Firmware Updates
IMEI vs. IMSI
VPN Connection Configuration
Mobile Device Synchronization Part1
Mobile Device Synchronization Part2
Synchronization Data Types and Methods
Mutual Authentication
Synch Installation Requirements
Synchronization Connection Types
Common Security Threats and Vulnerabilities Part1
Common Security Threats and Vulnerabilities Part2
Malware Viruses Part1
Malware Viruses Part2
Social Engineering and Spoofing Attacks
Zero Day and Zombie/Botnet Attacks
Password Attacks and Other Considerations
Hot to Change a MAC Address
Common Prevention Methods Part1
Common Prevention Methods Part2
Physical Security
Biometrics
Physical Identification
Digital Security Tools and Password Guidelines
Firewalls
User Education/AUP
Least Privilege Principals
Managing Multiple Displays
Basic Windows OS Security Settings Part1
Basic Windows OS Security Settings Part2
Users and Groups
Setting File Permissions
NTFS Directory and File Permissions
Sharing Files/Folders and Profile Options
Administrative Shares
System Files and Folders and Authentication Concepts
Encrypting Data at Rest
Configuring NTFS Permissions and File Encryption Part1
Configuring NTFS Permissions and File Encryption Part2
Enforcing Security Best Practices Part1
Enforcing Security Best Practices Part2
Password Best Practices
Account Management
Disable AutoRun and Data Encryption
Patch/Update Management
Methods for Securing Mobile Devices Part1
Methods for Securing Mobile Devices Part2
Screen Locks and Remote Wipes
Device Locator and Remote Backup
Login Restrictions and Maintaining Updates
Device Authentication and Trusted Sources
Firewalls and Policies and Procedures
Downloading a Smartphone Firewall Application
Data Destruction and Disposal Methods Part1
Data Destruction and Disposal Methods Part2
Physical Destruction
Recycling and Repurposing
Securing SOHO Wireless/Wired Networks Part1
Wireless Precautions Part1
Wireless Precautions Part2
Changing Default Access Credentials
Enabling MAC Filtering
Wireless Network Security Measures
Troubleshooting PC Operating Systems Part1
Troubleshooting PC Operating Systems Part2
Common OS Symptoms Part1
Common OS Symptoms Part2
Common Error Messages
Compatibility Error
Slow System Performance
Boots to Safe Mode and Files Failing to Open
OS Boot issues
Multiple Monitor Orientation
Repairing Disks
Pre-Installation Environments
MSCONFIG and Defrag Tools
Registry Editors and Other Tools
Uninstall/Reinstall/Repair
Windows OS Recovery Settings Demonstration
Troubleshooting Common PC Security Issues Part1
Troubleshooting Common PC Security Issues Part2
Common Security Issue Symptoms
Security Tools
Malware Removal Best Practices
Troubleshooting Common Mobile OS and Application Issues Part1
Troubleshooting Common Mobile OS and Application Issues Part2
Common Mobile Device Symptoms Part1
Common Mobile Device Symptoms Part2
Troubleshooting Tools
Troubleshooting Mobile OS and Application Security Issues Part1
Troubleshooting Mobile OS and Application Security Issues Part2
Common Security Symptoms
Mobile Device Security Tools
Appropriate Safety Procedures Part1
Appropriate Safety Procedures Part2
Equipment Grounding
Toxic Waste Handling
Personal Safety
Government Regulations Compliance
Applying Environmental Impact Controls Part1
Applying Environmental Impact Controls Part1
MSDS Documentation
Temperature/Humidity Levels and Proper Ventilation
Power Issues
Protecting the Computer
Local Government Regulations Compliance
Addressing Prohibited Content and Policy Concepts Part2
Addressing Prohibited Content and Policy Concepts Part2
Incident Response
Documentation and Chain of Custody
Software Licensing
Personally Identifiable Information
Security Policies Best Practices
Communication Techniques and Professionalism Part1
Communication Techniques and Professionalism Part2
Using Proper Language and Guidelines
Customer Related Situations and Difficulties
Set and Meet Client Expectations
Customer Confidential and Private Material
Troubleshooting Theory Part1
Troubleshooting Theory Part2
CompTIA Steps to Tro...
Course End

CALL

Call us

CHAT

Live chat

CONTACT

Contact us
500 +

Expert Instructors

100 +

PROFESSIONAL Courses

150000 +

Professionals Trained

Got queries?

Acknowledgements