CompTIA Computer Software Technician (A+ 220-1002)

(A-220-1002) / ISBN : 978-1-64459-047-8
Lessons
Lab
TestPrep
AI Tutor (Add-on)
41 Reviews
Get A Free Trial

About This Course

Kick start your prep for the 220-1002 exam in your first attempt with the CompTIA Computer Software Technician (A+ 220-1002) course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The CompTIA A+ study guide comprehensively covers the 220-1002 exam objectives and helps you understand expanded security, software troubleshooting, and operational procedures; and how to install and configure operating systems with its various learning resources.

Skills You’ll Get

After passing the 220-1001 and 220-1002 certification exams, you can earn the CompTIA A+ Core Series certification. The 220-1001 exam covers mobile devices, networking technology, hardware, virtualization, and cloud computing; and network troubleshooting, while the 220-1002 exam covers installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures.

1

Operating systems

  • Module A: Windows versions and features
  • Module B: Non-Windows operating systems
  • Module C: Operating system installation and upgrades
  • Module D: Applications and scripting
  • Summary
2

Windows management

  • Module A: Operating system features and tools
  • Module B: Control Panel utilities
  • Module C: Command-line tools
  • Module D: Operating system troubleshooting
  • Summary
3

Windows networking

  • Module A: Network shares
  • Module B: Network connections
  • Module C: Connection troubleshooting
  • Summary
4

Security principles

  • Module A: Threats and vulnerabilities
  • Module B: Security controls
  • Summary
5

Security technologies

  • Module A: Operating system security
  • Module B: Security hardware and software
  • Summary
6

Securing devices and data

  • Module A: Workstation security
  • Module B: Mobile device security
  • Module C: Network security
  • Module D: Security troubleshooting
  • Summary
7

Operational procedures

  • Module A: IT operations
  • Module B: Incident response
  • Module C: Backup and recovery
  • Summary
8

Safety and professionalism

  • Module A: Safety
  • Module B: Environmental factors
  • Module C: Professionalism
  • Summary
A

Appendix A

1

Operating systems

  • Creating and Running a ps1 File
  • Executing the Basic Commands through a ps1 File
  • Creating Variables
  • Creating a Loop in PowerShell
  • Enabling BranchCache
  • Implementing EFS File Sharing
  • Displaying Windows Versions
  • Adding an MMC snap-in
  • Displaying Windows PowerShell snap-ins
  • Creating a Restore Point
  • Using Cortana
  • Using Windows Event Viewer
  • Using Basic Linux Commands
  • Listing Files in a Directory
  • Verifying the Working Directory
  • Working with Directories
  • Performing a Text Search
  • Managing NTFS Permissions
  • Converting a FAT32 Partition to NTFS
  • Disabling a Service
2

Windows management

  • Converting a Basic Disk to a Dynamic Disk
  • Setting Automatic Windows Update
  • Viewing the Status of a Disk
  • Mounting a Drive to a Folder
  • Editing a Drive Letter
  • Using MSConfig
  • Using Task Manager to Start an Application
  • Configuring Windows Defender Firewall
  • Configuring Computer Management Services
  • Observing the Control Panel options in different views
  • Uninstalling a Program
  • Entering Commands at the Command-line
3

Windows networking

  • Joining Workgroups or Domains
  • Changing Network Locations
  • Managing Offline Files
  • Sharing a Printer
  • Sharing Folders
  • Using the net Command
  • Creating a Dial-up Connection
  • Connecting to a Remote Computer using a Remote Desktop Connection
  • Creating a Remote Access VPN Connection
  • Configuring a Proxy Server
  • Using the nbtstat command
  • Using the netstat Command
  • Using the nslookup Command
  • Using the ping Command
  • Tracing Route Using Tracert
4

Security principles

  • Identifying Virus Threats
  • Reviewing the Top 10 OWASP Attacks
  • Conducting a DoS Attack using Smurf Attack
  • Performing a MITM Attack
  • Conducting IP Spoofing
  • Using a Symmetric Encryption Algorithm
  • Using an Asymmetric Encryption Algorithm
5

Security technologies

  • Stopping Permissions Inheritance
  • Propagating Permissions
  • Removing a Credential
  • Configuring an Audit Group Policy
  • Configuring an Account Password Policy
6

Securing devices and data

  • Disabling AutoPlay
  • Configuring Screensavers
  • Securing User Accounts
  • Creating a New User
  • Using BitLocker 
  • Locking an iPhone with a Password
  • Using Windows Security
7

Operational procedures

  • Backing up Files
  • Restoring Files
8

Safety and professionalism

  • Setting Up a Surge Protected Computer System
  • Using a UPS to Power the Computer Components and Ensure the Network Connectivity

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

CompTIA Computer Software Technician (A+ 220-1002)

$ 442.1

Buy Now

Related Courses

All Course
scroll to top