CompTIA A+(Plus) 220-1002 Overview
Click on the arrows next to each subject to expand the topics.
1. Operating Systems
- 1.1 32-bit vs. 64-bit Operating Systems
- 1.1 Operating Systems
- 1.1 OS Vendor Specific Limitations
- 1.1 Compatibility concerns between operating systems
- 1.2 Compare and contrast features of Microsoft Windows versions.
- 1.2 Corporate vs. Personal Needs
- 1.2 Desktop Styles / User Interface
- 1.3 Boot Methods
- 1.3 Types of OS Installations
- 1.3 Partitioning
- 1.3 File System Types
- 1.3 File System Formatting
- 1.3 Load alternate third-party drivers when necessary
- 1.3 Workgroup vs. Domain setup
- 1.3 Time / Date / Region / Language Settings
- 1.3 Driver installation, software, and Windows updates
- 1.3 Factory recovery partition
- 1.3 Properly formatted boot drive with the correct partitions/format
- 1.3 Prerequisites / Hardware Compatibility
- 1.3 Application Compatibility
- 1.3 OS Compatibility / Upgrade Path
- 1.4 Microsoft Command Line Navigation
- 1.4 Microsoft Command Line: ipconfig
- 1.4 Microsoft Command Line: ping
- 1.4 Microsoft Command Line: tracert
- 1.4 Microsoft Command Line: netstat
- 1.4 Microsoft Command Line: nslookup
- 1.4 Microsoft Command Line: shutdown
- 1.4 Microsoft Command Line: dism
- 1.4 Microsoft Command Line: sfc
- 1.4 Microsoft Command Line: chkdsk
- 1.4 Microsoft Command Line: diskpart
- 1.4 Microsoft Command Line: taskkill
- 1.4 Microsoft Command Line: gpupdate and gpresult
- 1.4 Microsoft Command Line: format
- 1.4 Microsoft Command Line: copy, xcopy, robocopy
- 1.4 Microsoft Command Line: net
- 1.4 Microsoft Command Line: [command name] /?
- 1.4 Commands available with standard privileges vs. administrative privileges
- 1.5 Computer Management
- 1.5 Device Manager
- 1.5 Local Users and Groups
- 1.5 Local Security Policy
- 1.5 Performance Monitor
- 1.5 Services
- 1.5 System Configuration
- 1.5 Task Scheduler
- 1.5 Component Services
- 1.5 Data Sources
- 1.5 Print Management
- 1.5 Windows Memory Diagnostics
- 1.5 Windows Firewall
- 1.5 Windows Advanced Security
- 1.5 Windows Event Viewer
- 1.5 Windows User Account Management
- 1.5 Msconfig
- 1.5 Disk Management
- 1.5 System Utilities: regedit
- 1.5 System Utilities: command
- 1.5 System Utilities: services.msc
- 1.5 System Utilities: mmc
- 1.5 System Utilities: mstsc
- 1.5 System Utilities: notepad
- 1.5 System Utilities: explorer
- 1.5 System Utilities: msinfo32
- 1.5 System Utilities: dxdiag
- 1.5 System Utilities: Disk Defragmenter
- 1.5 System Utilities: System Restore
- 1.5 System Utilities: Windows Update
- 1.6 Internet Options
- 1.6 Display Settings
- 1.6 User Accounts
- 1.6 Folder Options
- 1.6 System
- 1.6 Windows Firewall
- 1.6 Power Options
- 1.6 Credential Manager
- 1.6 Programs and Features
- 1.6 HomeGroup
- 1.6 Devices and Printers
- 1.6 Control Panel: Sound
- 1.6 Control Panel: Troubleshooting
- 1.6 Control Panel: Networking and Sharing Center
- 1.6 Control Panel: Device Manager
- 1.6 Control Panel: BitLocker
- 1.6 Control Panel: Sync Center
- 1.7 Application Installation and Configuration Concepts
- 1.8 HomeGroup vs. Workgroup
- 1.8 Domain Setup
- 1.8 Network Shares / Administrative Shares / Mapping Drives
- 1.8 Printer Sharing vs Network Printer Mapping
- 1.8 Establish Networking Connections
- 1.8 Proxy Settings
- 1.8 Remote Desktop Connection
- 1.8 Remote Assistance
- 1.8 Home vs. Work vs. Public network settings
- 1.8 Firewall Settings
- 1.8 Configuring an alternative IP address in Windows
- 1.8 Network Card Properties
- 1.8 QoS
- 1.8 BIOS (On-Board NIC)
- 1.9 Mac OS and Linux Best Practices
- 1.9 Mac OS and Linux Tools: Backup / Time Machine
- 1.9 Mac OS and Linux Tools: Restore / Snapshot
- 1.9 Mac OS and Linux Tools: Image Recovery
- 1.9 Mac OS and Linux Tools: Disk Maintenance Utilities
- 1.9 Mac OS and Linux Tools: Shell / Terminal
- 1.9 Mac OS and Linux Tools: Screen Sharing
- 1.9 Mac OS and Linux Tools: Force Quit
- 1.9 Mac OS Features
- 1.9 Basic Linux Commands: ls, grep, cd, shutdown, pwd, passwd
- 1.9 Basic Linux Commands: mv, cp, rm, chmod, chown
- 1.9 Basic Linux Commands: iwconfig, ipconfig, ps, su, sudo, apt-get, vi, dd, kill
2. Security
- 2.1 Physical Security: Mantrap
- 2.1 Physical Security: Badge Reader
- 2.1 Physical Security: Smart Card
- 2.1 Physical Security: Security Guard and Door Locks
- 2.1 Physical Security: Biometric Locks
- 2.1 Physical Security: Hardware Tokens
- 2.1 Physical Security: Cable, Server, USB Locks
- 2.1 Physical Security: Privacy Screen
- 2.1 Physical Security: Key Fobs
- 2.1 Physical Security: Entry Control Roster
- 2.2 Active Directory Security Concepts
- 2.2 Software Tokens
- 2.2 MDM Policies
- 2.2 Port Security
- 2.2 MAC Address Filtering
- 2.2 Certificates
- 2.2 Antivirus / Anti-malware
- 2.2 Firewalls
- 2.2 User Authentication / Strong Passwords
- 2.2 Multifactor Authentication
- 2.2 Directory Permissions
- 2.2 VPN
- 2.2 DLP
- 2.2 Access Control List
- 2.2 Smart Card
- 2.2 Email Filtering
- 2.2 Trusted / Untrusted Software Sources
- 2.2 Principle of Least Privilege
- 2.3 Wireless Security Protocols
- 2.3 Wireless Authentication Methods
- 2.4 Malware: Ransomware
- 2.4 Malware: Trojan
- 2.4 Malware: Keylogger
- 2.4 Malware: Rootkit
- 2.4 Malware: Virus
- 2.4 Malware: Botnet
- 2.4 Malware: Worm
- 2.4 Malware: Spyware
- 2.4 Malware Prevention Tools and Methods: Antivirus / Anti-malware
- 2.4 Malware Prevention Tools and Methods: Recovery Console
- 2.4 Malware Prevention Tools and Methods: Backup / Restore
- 2.4 Malware Prevention Tools and Methods: End User Education
- 2.4 Malware Prevention Tools and Methods: Software Firewalls
- 2.4 Malware Prevention Tools and Methods: DNS Configuration
- 2.5 Social Engineering
- 2.5 Denial of Service (DDos & Dos)
- 2.5 Zero Day
- 2.5 Man in the Middle
- 2.5 Brute Force
- 2.5 Dictionary Attack
- 2.5 Rainbow Table
- 2.5 Spoofing
- 2.5 Non Compliant Systems
- 2.5 Zombie
- 2.6 Windows User and Groups
- 2.6 NTFS vs Share Permissions
- 2.6 Shared Files and Folders
- 2.6 Windows Security Settings: System Files and Folders
- 2.6 User Authentication
- 2.6 User Authentication
- 2.6 Run as Administrator. Vs Standard User
- 2.6 Bitlocker and Bitlocker To Go
- 2.6 EFS
- 2.7 Password Best Practices
- 2.7 Account Management Best Practices
- 2.7 Disable Account
- 2.7 Disable Autorun
- 2.7 Data Encryption
- 2.7 Patch / Update Management
- 2.8 Mobile Screen Locks
- 2.8 Mobile Device Security Part 1
- 2.8 Mobile Device Security Part 2
- 2.8 Mobile Device Security Part 3
- 2.8 Mobile Device Policies and Procedures
- 2.9 Physical Data Destruction
- 2.9 Recycling or Repurposing Best Practices
- 2.10 Configure Security on SOHO Wireless Network
- 2.10 Configure Security on SOHO Wireless and Wired Networks Part 1
- 2.10 Configure Security on SOHO Wireless and Wired Networks Part 2
- 2.10 Configure Security on SOHO Wireless and Wired Networks Part 3
- 3.1 Troubleshoot Windows: Limited Connectivity
3. Software Troubleshooting
- 3.1 Troubleshoot Windows: Slow Performance
- 3.1 Troubleshoot Windows: Failure to Boot or No OS Found
- 3.1 Troubleshoot Windows: Application Crashes
- 3.1 Troubleshoot Windows: Blue Screens or Black Screens
- 3.1 Troubleshoot Windows: Printing Issues
- 3.1 Troubleshoot Windows: Services Fail to Start
- 3.1 Troubleshoot Windows: Slow Bootup
- 3.1 Troubleshoot Windows: Slow Profile Load
- 3.1 Common Windows Solutions: Defragment the Hard Drive
- 3.1 Common Windows Solutions: Reboot or Kill Tasks
- 3.1 Common Windows Solutions: Restart Services
- 3.1 Common Windows Solutions: Update Network Settings
- 3.1 Common Windows Solutions: Reimage / Reload OS
- 3.1 Common Windows Solutions: Roll Back Updates or Device Drivers
- 3.1 Common Windows Solutions: Apply Updates
- 3.1 Common Windows Solutions: Repair Application
- 3.1 Common Windows Solutions: Update Boot Order
- 3.1 Common Windows Solutions: Disable Windows Services / Applications
- 3.1 Common Windows Solutions: Disable Application Startup
- 3.1 Common Windows Solutions: Safe Boot
- 3.1 Common Windows Solutions: Rebuild Windows Profiles
- 3.2 Common Security Issue Symptoms Part 1
- 3.2 Common Security Issue Symptoms Part 2
- 3.2 Common Security Issue Symptoms Part 3
- 3.2 Common Security Issue Symptoms: Hijacked Email
- 3.2 Common Security Issue Symptoms: Access Denied, Invalid Certificate, Logs
- 3.3 Best Practice Procedures for Malware Removal
- 3.4 Troubleshoot Mobile OS Application Issues: Dim Display
- 3.4 Troubleshoot Mobile OS Application Issues: Connectivity
- 3.4 Troubleshoot Mobile OS Application Issues: Touchscreen Non-Responsive or Inaccurate
- 3.4 Troubleshoot Mobile OS Application Issues: Apps Not Loading
- 3.4 Troubleshoot Mobile OS Application Issues: Slow Performance
- 3.4 Troubleshoot Mobile OS Application Issues: Unable to Decrypt Email
- 3.4 Troubleshoot Mobile OS Application Issues: Extremely Short Battery Life
- 3.4 Troubleshoot Mobile OS Application Issues: Overheating
- 3.4 Troubleshoot Mobile OS Application Issues: Frozen System
- 3.4 Troubleshoot Mobile OS Application Issues: No Sound From Speakers
- 3.4 Troubleshoot Mobile OS Application Issues: System Lockout