CompTIA A+ 220-902

The CompTIA A+ certification course is a preparatory course for the CompTIA A+ certification exam. It is a vendor-neutral and internationally recognized certification which covers the fundamental concepts of an entry-level IT infrastructure. An A+ certified professional has the knowledge of installing, configuring and troubleshooting common personal computer systems.

Request a quote Review training schedules

Learn more about the course below.

TRAINING SCHEDULES

CompTIA A+ 220-902 Training program course overview

CompTIA A+ Certification training course covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues. It is a basic course that helps the candidates to establish their credentials in the field of IT troubleshooting and support.

There are no pre-requisites for this course. The course is an entry-level course designed in such a way that non-conversant people in IT could learn and understand the fundamentals of IT operations and be able to technically support the day-to-day IT needs of their organization.

The course is intended for fresh graduates and job seekers with zero to one year of professional experience. The course will help the candidates to increase their knowledge of IT literacy and enhance their chances of securing a good job in the IT sector.

After successfully completing this course, the students shall be able to:

  • Identify the hardware components of personal computers
  • Identify network components
  • Setup a personal computer along with display screen
  • Install peripheral devices and accessories with personal computers
  • Manage personal data storage
  • Understand network technologies
  • Support and troubleshoot mobile devices
  • Install and troubleshoot printers and scanners

The registration process

Once you have completed our simplified enrolment process, you’ll receive an email confirmation with your payment receipt in your registered email ID. Yoau can then access the entire content of the online student portal immediately by logging in to your account on our site. Should you require any assistance please reach out to us via email (support@greycampus.com) or via our online chat system.

The course curriculum

The curriculum for this CompTIA A+ 220-902 training incorporates all updates The following is a list of broad topics covered

  • Introduction
  • Features and Requirements Of Microsoft Operating Systems
  • Identifying Features
  • Windows Features
  • System Restore and Event Viewer
  • File Structure and Paths
  • Other Features
  • Upgrade Path
  • Upgrade Tools
  • System Tools Demonstration
  • Installing Windows PC Operating Systems
  • Boot Methods
  • Types of Installations
  • Partitioning
  • File System Types and Formatting
  • Installation Parameters
  • Microsoft Command Line Tools
  • Commands To Know
  • Available Command Privileges
  • Command Prompt Navigation Commands Demonstration
  • Operating System Features and Tools
  • Windows Administrative Tools (6:00)
  • MSCONFIG
  • Task Manager
  • Disk Management
  • Clean Installation Tools
  • System Utilities
  • Computer Management Demonstration
  • Device Manager Demonstration
  • User Accounts Demonstration
  • Performance Monitor Demonstration
  • Windows Services Demonstration
  • Print Management (8:02)
  • System Configuration Demonstration
  • Task Manager Console Demonstration
  • Registry Editor Demonstration
  • Microsoft Management Console Demonstration
  • Defragmenting Optical Drives
  • Control Panel Utilities Part1
  • Control Panel Utilities Part2
  • Internet Options
  • Display Settings
  • User Accounts and Folder Options
  • System Properties
  • Security Center/Action Center
  • Power Options
  • Programs and Features/Homegroups
  • Devices and Printers/Sounds
  • Troubleshooting/Network and Sharing Center
  • Control Panel/Internet Options Demonstration
  • Display Demonstration
  • Power Options Demonstration
  • Programs and Features Demonstration
  • Homegroup Demonstration
  • Sound Demonstration
  • Troubleshooting/Network and Sharing Demonstration
  • Client and Desktop Windows Networking Part1
  • Client and Desktop Windows Networking Part2
  • Homegroup vs Workgroup
  • Domain Setup
  • Network and Administrative Shares
  • Establishing Network Connections
  • Remote Desktop Connections
  • Network Sharing Settings
  • Firewall Settings
  • Alternative IP Address Configuration
  • Network Card Properties
  • Joining a Computer to a Domain Demonstration
  • Administrative Shares
  • Mapping Drives Demonstration
  • LAN Setting for Proxy Server Demonstration
  • Connecting to a Remote Desktop Demonstration
  • Alternate IP Addressing Demonstration
  • Preventive Maintenance Tools and Procedures Part1
  • Preventive Maintenance Tools and Procedures Part2
  • Scheduled Backups
  • Scheduled Disk Maintenance
  • Maintenance Updates
  • Maintenance Tools
  • Managing Windows Update Settings
  • Diskcheck and Defrag Demonstration
  • Operating Systems Features and Functionality Part1
  • Operating Systems Features and Functionality Part2
  • Best Practices
  • Disk Maintenance Utilities
  • Shell/Terminal Tool
  • Screen Sharing Tool
  • Force Quit and skill Tool
  • Operating System Features
  • Basic Linux Commands
  • Setup and Usage Of Client Side Virtualization Part1
  • Setup and Usage Of Client Side Virtualization Part2
  • Virtual Machines Requirements
  • Client Side Virtualization Demonstration
  • Basic Cloud Concepts Part1
  • Basic Cloud Concepts Part2
  • Cloud Based Services
  • Cloud Models
  • Cloud Benefits and Resource Pooling
  • Measured Service
  • Network Host Services Part1
  • Network Host Services Part2
  • Server Roles
  • Internet Appliances
  • Legacy Embedded Systems
  • Mobile Operating Systems Part1
  • Mobile Operating Systems Part2
  • Android vs. IOS
  • Application Sources
  • Screen Orientation and Calibration
  • Common Mobile Features
  • Downloading Mobile Applications
  • Mobile Device Network Connectivity and Email Configuration Part1
  • Mobile Device Network Connectivity and Email Configuration Part2
  • Enabling and Disabling Wireless/Cellular Networks
  • Corporate and ISP Email Configuration and Security
  • PRI/PRL/Baseband Updates
  • Radio Firmware Updates
  • IMEI vs. IMSI
  • VPN Connection Configuration
  • Mobile Device Synchronization Part1
  • Mobile Device Synchronization Part2
  • Synchronization Data Types and Methods
  • Mutual Authentication
  • Synch Installation Requirements
  • Synchronization Connection Types
  • Common Security Threats and Vulnerabilities Part1
  • Common Security Threats and Vulnerabilities Part2
  • Malware Viruses Part1
  • Malware Viruses Part2
  • Social Engineering and Spoofing Attacks
  • Zero Day and Zombie/Botnet Attacks
  • Password Attacks and Other Considerations
  • Hot to Change a MAC Address
  • Common Prevention Methods Part1
  • Common Prevention Methods Part2
  • Physical Security
  • Biometrics
  • Physical Identification
  • Digital Security Tools and Password Guidelines
  • Firewalls
  • User Education/AUP
  • Least Privilege Principals
  • Managing Multiple Displays
  • Basic Windows OS Security Settings Part1
  • Basic Windows OS Security Settings Part2
  • Users and Groups
  • Setting File Permissions
  • NTFS Directory and File Permissions
  • Sharing Files/Folders and Profile Options
  • Administrative Shares
  • System Files and Folders and Authentication Concepts
  • Encrypting Data at Rest
  • Configuring NTFS Permissions and File Encryption Part1
  • Configuring NTFS Permissions and File Encryption Part2
  • Enforcing Security Best Practices Part1
  • Enforcing Security Best Practices Part2
  • Password Best Practices
  • Account Management
  • Disable AutoRun and Data Encryption
  • Patch/Update Management
  • Methods for Securing Mobile Devices Part1
  • Methods for Securing Mobile Devices Part2
  • Screen Locks and Remote Wipes
  • Device Locator and Remote Backup
  • Login Restrictions and Maintaining Updates
  • Device Authentication and Trusted Sources
  • Firewalls and Policies and Procedures
  • Downloading a Smartphone Firewall Application
  • Data Destruction and Disposal Methods Part1
  • Data Destruction and Disposal Methods Part2
  • Physical Destruction
  • Recycling and Repurposing
  • Securing SOHO Wireless/Wired Networks Part1
  • Wireless Precautions Part1
  • Wireless Precautions Part2
  • Changing Default Access Credentials
  • Enabling MAC Filtering
  • Wireless Network Security Measures
  • Troubleshooting PC Operating Systems Part1
  • Troubleshooting PC Operating Systems Part2
  • Common OS Symptoms Part1
  • Common OS Symptoms Part2
  • Common Error Messages
  • Compatibility Error
  • Slow System Performance
  • Boots to Safe Mode and Files Failing to Open
  • OS Boot issues
  • Multiple Monitor Orientation
  • Repairing Disks
  • Pre-Installation Environments
  • MSCONFIG and Defrag Tools
  • Registry Editors and Other Tools
  • Uninstall/Reinstall/Repair
  • Windows OS Recovery Settings Demonstration
  • <
  • Troubleshooting Common PC Security Issues Part1
  • Troubleshooting Common PC Security Issues Part2
  • Common Security Issue Symptoms
  • Security Tools
  • Malware Removal Best Practices
  • <
  • Troubleshooting Common Mobile OS and Application Issues Part1
  • Troubleshooting Common Mobile OS and Application Issues Part2
  • Common Mobile Device Symptoms Part1
  • Common Mobile Device Symptoms Part2
  • Troubleshooting Tools
  • Troubleshooting Mobile OS and Application Security Issues Part1
  • Troubleshooting Mobile OS and Application Security Issues Part2
  • Common Security Symptoms
  • Mobile Device Security Tools
  • Appropriate Safety Procedures Part1
  • Appropriate Safety Procedures Part2
  • Equipment Grounding
  • Toxic Waste Handling
  • Personal Safety
  • Government Regulations Compliance
  • Applying Environmental Impact Controls Part1
  • Applying Environmental Impact Controls Part2
  • MSDS Documentation
  • Temperature/Humidity Levels and Proper Ventilation
  • Power Issues
  • Protecting the Computer
  • Local Government Regulations Compliance
  • Addressing Prohibited Content and Policy Concepts Part1
  • Addressing Prohibited Content and Policy Concepts Part2
  • Incident Response
  • Documentation and Chain of Custody
  • Software Licensing
  • Personally Identifiable Information
  • Security Policies Best Practices
  • Communication Techniques and Professionalism Part1
  • Communication Techniques and Professionalism Part2
  • Using Proper Language and Guidelines
  • Customer Related Situations and Difficulties
  • Set and Meet Client Expectations
  • Customer Confidential and Private Material
  • Troubleshooting Theory Part1
  • Troubleshooting Theory Part2
  • CompTIA Steps to Troubleshooting
  • Course End