Section 01: All About the CompTIA A+ 2019 Core 2 Exam |
|
CompTIA A+ 2019 Core 2 (220-1002) Course Introduction |
|
00:02:00 |
|
What is the CompTIA A+ |
|
00:02:00 |
|
Why Get A+ Certified? |
|
00:03:00 |
|
What is on the CompTIA A+ Core 2 (220-1002) Exam? |
|
00:04:00 |
|
How to Pass the CompTIA A+ Exam |
|
00:04:00 |
|
How to use this Video Course |
|
00:03:00 |
Section 02: Safety and Professionalism |
|
Professional Communication Part 1 |
|
00:06:00 |
|
Professional Communication Part 2 |
|
00:07:00 |
|
Physical Safety |
|
00:07:00 |
Section 03: The Visible Computer |
|
What is an Operating System? |
|
00:09:00 |
|
Users and Super Users |
|
00:05:00 |
|
Why Windows? |
|
00:08:00 |
|
Windows Editions and Versions |
|
00:12:00 |
|
Touring the macOS |
|
00:06:00 |
|
Touring Linux |
|
00:08:00 |
Section 04: CPUs |
|
32-Bit vs. 64-Bit Processing |
|
00:12:00 |
Section 05: RAM |
|
Virtual Memory |
|
00:06:00 |
Section 06: Power Supply |
|
Power Protection |
|
00:10:00 |
Section 07: Implementing Mass Storage |
|
Understanding Partitioning |
|
00:04:00 |
|
MBR Partitioning |
|
00:12:00 |
|
GPT Partitioning |
|
00:09:00 |
|
Understanding File Systems |
|
00:12:00 |
|
Popular File Systems |
|
00:07:00 |
|
Formatting in Action |
|
00:11:00 |
|
Dynamic Disks |
|
00:09:00 |
|
Software RAID in Storage Spaces |
|
00:10:00 |
|
Encrypting Mass Storage |
|
00:09:00 |
Section 08: Building a PC |
|
Boot from Everything |
|
00:12:00 |
|
Installing Windows |
|
00:12:00 |
|
Post-Installation Tasks |
|
00:12:00 |
|
Windows Installation options |
|
00:07:00 |
Section 09: Windows under the Hood |
|
What is the Registry? |
|
00:11:00 |
|
Processes |
|
00:07:00 |
|
Services |
|
00:04:00 |
|
Your Windows Toolset |
|
00:08:00 |
|
Windows 7 Task Manager |
|
00:09:00 |
|
Windows 10 Task Manager |
|
00:06:00 |
|
Information and Configuration Tools |
|
00:11:00 |
|
Performance Monitor |
|
00:12:00 |
|
Event Viewer |
|
00:07:00 |
|
Tools for Programmers |
|
00:08:00 |
Section 10: Users, Groups, and Permissions |
|
Introduction to Users and Groups |
|
00:06:00 |
|
Managing Users and Groups |
|
00:12:00 |
|
NTFS Permissions |
|
00:08:00 |
|
Linux and macOS Permissions |
|
00:05:00 |
|
File Explorer |
|
00:14:00 |
|
Sharing Resources |
|
00:11:00 |
|
Security Policies |
|
00:08:00 |
Section 11: Maintaining and Optimizing Operating Systems |
|
Patch Management |
|
00:11:00 |
|
Working with Disks |
|
00:06:00 |
|
Working with Applications |
|
00:07:00 |
|
System Restore |
|
00:05:00 |
|
Backing up Your Files |
|
00:07:00 |
|
Task Scheduler |
|
00:07:00 |
Section 12: Working with the Command-Line Interface |
|
Understanding the CLI |
|
00:11:00 |
|
Navigating the CLI |
|
00:14:00 |
|
Working with Folders |
|
00:07:00 |
|
Working with Files |
|
00:11:00 |
|
Working with Drives |
|
00:13:00 |
|
Super Copy Commands |
|
00:09:00 |
|
Advanced Windows Command Line |
|
00:08:00 |
|
Advanced Linux Commands |
|
00:13:00 |
|
Command-Line Permissions |
|
00:08:00 |
|
Introduction to Scripting |
|
00:10:00 |
|
Interpreted Languages |
|
00:12:00 |
Section 13: Troubleshooting Operating Systems |
|
Windows Recovery Environment |
|
00:05:00 |
|
Advanced Windows Startup Options |
|
00:07:00 |
|
Troubleshooting Boot Problems |
|
00:10:00 |
|
Troubleshooting at the GUI |
|
00:11:00 |
|
Troubleshooting Applications |
|
00:07:00 |
|
Kernel Panic |
|
00:05:00 |
Section 14: Display Technologies |
|
Resolutions and Aspect Ratios |
|
00:06:00 |
|
Multiple Monitors |
|
00:05:00 |
Section 15: Essentials of Networking |
|
Network Card Troubleshooting |
|
00:09:00 |
Section 16: Local Area Networking |
|
Working with Connections |
|
00:09:00 |
|
Working with Workgroups |
|
00:08:00 |
|
Working with Active Directory |
|
00:14:00 |
|
Windows Sharing with Mac and LInux |
|
00:07:00 |
|
Net Command |
|
00:04:00 |
|
Firewall Configuration |
|
00:11:00 |
|
Windows Firewall |
|
00:08:00 |
|
Port Forwarding |
|
00:07:00 |
Section 17: Wireless Networking |
|
Wireless Encryption |
|
00:11:00 |
|
Enterprise Wireless |
|
00:16:00 |
Section 18: The Internet |
|
Telnet and SSH |
|
00:07:00 |
|
Remote Desktop Connections |
|
00:06:00 |
|
The World Wide Web |
|
00:09:00 |
|
Troubleshooting Internet Connections |
|
00:07:00 |
Section 19: Portable Computing |
|
Power Management |
|
00:11:00 |
Section 20: Care and Feeding of Mobile Devices |
|
Mobile Device Security |
|
00:08:00 |
|
Mobile Security Troubleshooting |
|
00:06:00 |
|
Mobile Device Troubleshooting |
|
00:10:00 |
Section 21: Securing Computers |
|
Threats |
|
00:10:00 |
|
Physical Security |
|
00:08:00 |
|
Passwords and Authentication |
|
00:14:00 |
|
Malware |
|
00:14:00 |
|
Anti-Malware |
|
00:11:00 |
|
Social Engineering |
|
00:06:00 |
|
Licensing |
|
00:10:00 |
|
Incident Response |
|
00:05:00 |
|
Environmental Controls |
|
00:06:00 |
Section 22: Operational Procedures |
|
Documents You Need to Know |
|
00:09:00 |
|
Data You Need to Know |
|
00:04:00 |
|
Change Management |
|
00:06:00 |
|
The Zen of Backup |
|
00:11:00 |
|
Recycling and Data Destruction |
|
00:07:00 |