Companies Home Search Profile

CompTIA A+ (220-1102) Online Training

Focused View

James Conrad

28:07:12

143 View
  • 1. Basic Features of Microsoft Windows Editions .mp4
    10:33
  • 2. Windows 10 Editions Overview .mp4
    09:09
  • 3. Windows 10 Editions and Limits .mp4
    14:11
  • 4. Upgrade Paths and Higher-Level Features .mp4
    17:58
  • 1. Configure Policy with Group Policy Editor .mp4
    08:16
  • 2. Gather Data with System Information .mp4
    09:27
  • 3. Manage Windows with System Configuration .mp4
    12:54
  • 4. Optimize Storage with Disk Cleanup and Disk Defragment .mp4
    09:59
  • 5. Edit the Registry .mp4
    10:13
  • 1. Introduction to the Command Line .mp4
    11:25
  • 2. Navigation Commands .mp4
    10:43
  • 3. Copy, Xcopy, and Robocopy .mp4
    16:18
  • 4. Manage Disks with Diskpart and Format .mp4
    09:58
  • 1. Learn IP Info with IPCONFIG .mp4
    10:21
  • 2. Confirm Reachability with PING .mp4
    06:25
  • 3. Identify Network Hops with Tracert and PathPing .mp4
    09:22
  • 4. Identify Open Ports with Netstat .mp4
    08:38
  • 5. Network Management with Additional Commands .mp4
    11:38
  • 6. Implement Group Policy Commands .mp4
    09:16
  • 7. Final Command-Line Commands .mp4
    05:54
  • 1. Task Manager .mp4
    14:32
  • 2. Validate Resource Usage with Performance Monitor .mp4
    15:25
  • 3. Spot Check Resources with Resource Monitor .mp4
    06:25
  • 4. Identify Incidents in Event Viewer .mp4
    15:16
  • 1. Administer Storage with Disk Management .mp4
    09:04
  • 2. Automate with Task Scheduler .mp4
    07:51
  • 3. Administration with Device Manager .mp4
    08:51
  • 4. Manage Certificates with Certificate Manager .mp4
    12:20
  • 5. Manage Local Users and Groups .mp4
    11:01
  • 1. Internet Settings .mp4
    18:58
  • 2. Devices and Printers, Programs and Features .mp4
    09:01
  • 3. Configure System Settings .mp4
    13:28
  • 4. Control Panel Views and Mail .mp4
    06:46
  • 1. Understanding Firewall Concepts .mp4
    05:18
  • 2. Configuring Windows Defender Firewall .mp4
    08:34
  • 3. Configure Sound Settings .mp4
    06:23
  • 4. Manage Indexing Options .mp4
    08:03
  • 5. Provide Assistance with Ease of Access .mp4
    06:10
  • 6. Access Administrative Tools and Set File Explorer Options .mp4
    08:38
  • 7. Choose Power Options .mp4
    04:49
  • 1. Set Gaming and Personalization Preferences .mp4
    06:10
  • 2. Configure Date, Time, and Language .mp4
    05:22
  • 3. Configure Update and Security Settings .mp4
    10:25
  • 4. Configure Apps .mp4
    05:57
  • 5. Set Privacy Preferences .mp4
    05:47
  • 6. Use a Microsoft Account .mp4
    12:56
  • 1. Benefit from Domain vs Workgroup Resources .mp4
    10:01
  • 2. Configure Local OS Firewall Settings .mp4
    06:25
  • 3. Client Network Configuration .mp4
    06:47
  • 4. Differentiate Public and Private IP Addresses .mp4
    13:25
  • 5. Establish Network Connections .mp4
    12:07
  • 1. 32-Bit vs 64-Bit Applications .mp4
    09:19
  • 2. Evaluate Application System Requirements .mp4
    09:55
  • 3. Examples of System Requirements .mp4
    06:36
  • 4. Software Distribution Methods .mp4
    09:41
  • 5. Create and Use Media .mp4
    07:41
  • 6. Consider Application Impact .mp4
    11:34
  • 1. Workstation Operating System Overview .mp4
    11:39
  • 2. Navigate the Mac OS .mp4
    13:01
  • 3. Navigate Linux and Chromebook .mp4
    10:10
  • 4. Navigate the Android OS .mp4
    08:14
  • 5. Navigate iOS and iPadOS .mp4
    08:55
  • 6. Identify ext3, ext4, APFS and Compatibility .mp4
    03:29
  • 7. End-of-Life and Update Considerations .mp4
    07:36
  • 1. Local OS Installation Methods .mp4
    07:13
  • 2. Network OS Installation Methods .mp4
    05:58
  • 3. Install Using Windows Deployment Services .mp4
    05:21
  • 4. Perform a Clean Installation .mp4
    05:53
  • 5. Perform and Upgrade .mp4
    07:34
  • 6. Implement a Repair Installation .mp4
    05:13
  • 7. Access Recovery Partitions and Images .mp4
    07:36
  • 8. Implement MBR and GPT Disks .mp4
    06:02
  • 1. Get Acquainted with the macOS.mp4
    04:56
  • 2. Manage macOS Apps.mp4
    11:49
  • 3. Authenticate with Apple ID.mp4
    10:23
  • 4. Backup with Time Machine Backup.mp4
    05:06
  • 5. Protect Your Mac with Antivirus and Updates.mp4
    06:02
  • 6. Adjust System Preferences.mp4
    09:36
  • 7. Configure Features.mp4
    12:07
  • 8. Implement Disk Management.mp4
    06:15
  • 1. Intro to Security Measures and Their Purposes .mp4
    00:27
  • 2. Security Overview .mp4
    09:02
  • 3. Multi-Factor Authentication (MFA) .mp4
    12:21
  • 4. Physical SecurityControls .mp4
    04:14
  • 5. Logical SecurityControls .mp4
    08:17
  • 6. Administrative SecurityControls .mp4
    05:23
  • 7. Active Directory SSO .mp4
    07:37
  • 1. Intro to Wireless Security and Authentication Methods .mp4
    00:32
  • 2. Wireless Security and Authentication Methods Overview .mp4
    07:15
  • 3. WPA2 Personal .mp4
    10:25
  • 4. WPA3 Personal .mp4
    08:31
  • 5. Enterprise Authentication .mp4
    15:11
  • 6. Open Authentication and OWE .mp4
    09:42
  • 1. Intro to Detect, Remove, and Prevent Malware .mp4
    00:39
  • 2. Malware Overview .mp4
    17:45
  • 3. Detecting Malware .mp4
    12:28
  • 4. Removing Malware .mp4
    06:48
  • 5. Malware Prevention .mp4
    10:46
  • 6. End User Education .mp4
    04:42
  • 1. Intro to Social Engineering Attacks, Threats, and Vulnerabilities .mp4
    00:46
  • 2. Attacks, Threats, & Vulnerabilities Overview .mp4
    26:29
  • 3. Phishing Attacks .mp4
    08:21
  • 4. Wi-Fi Evil Twin .mp4
    04:18
  • 5. Dealing with Social-Engineering Attacks .mp4
    04:34
  • 6. Tools of the Attacker .mp4
    04:49
  • 1. Intro to Configure Windows for Security .mp4
    01:02
  • 2. Overview of Windows Security .mp4
    16:13
  • 3. MS Defender Antivirus .mp4
    11:24
  • 4. Windows Defender Firewall .mp4
    16:28
  • 5. Users and Groups .mp4
    13:30
  • 6. Login Options .mp4
    07:29
  • 7. NTFS Security and Sharing .mp4
    07:31
  • 8. BitLocker and EFS .mp4
    07:23
  • 1. Intro to Securing Mobile Devices .mp4
    01:06
  • 2. Securing Mobile Devices Overview .mp4
    09:03
  • 3. Login and Locking .mp4
    04:47
  • 4. Locator Apps & Remote Wipe .mp4
    04:59
  • 5. Backups and Encryption .mp4
    06:20
  • 6. BYOD and More .mp4
    03:34
  • 7. MDM Solutions .mp4
    06:30
  • 8. Internet of Things .mp4
    09:16
  • 1. Intro to Data Destruction and Disposal Methods .mp4
    00:50
  • 2. Data Destruction and Disposal Methods Overview .mp4
    13:14
  • 3. Data Disposal on Hard Disks .mp4
    15:38
  • 4. Shredding .mp4
    03:31
  • 5. Degaussing .mp4
    02:32
  • 6. Incinerating .mp4
    03:10
  • 7. Outsourcing Data Destruction and Disposal .mp4
    08:36
  • 1. Intro to Configure Security for a SOHO Network .mp4
    00:29
  • 2. Small Network Implementation and Security Overview .mp4
    13:30
  • 3. Initial Router Configuration and Firmware Update .mp4
    10:36
  • 4. Wireless Settings and Security .mp4
    05:21
  • 5. Firewall Settings .mp4
    18:41
  • 1. Intro to Browser Security .mp4
    00:45
  • 2. Browser & Security Overview .mp4
    08:03
  • 3. Installing a New Browser .mp4
    11:01
  • 4. Digital Certificates .mp4
    16:02
  • 5. Extensions and Plugins .mp4
    04:33
  • 6. Password Managers .mp4
    08:08
  • 7. Common Browser Settings .mp4
    11:52
  • 1. Analyze a Blue Screen of Death (BSOD) .mp4
    07:57
  • 2. Troubleshoot Sluggish Performance .mp4
    10:53
  • 3. Troubleshoot Boot Problems .mp4
    10:07
  • 4. Frequent Shutdowns .mp4
    09:15
  • 5. Resolve Application Crashes .mp4
    09:23
  • 6. Resolve Additional Windows Problems .mp4
    09:21
  • 7. Implement Common Troubleshooting Steps .mp4
    12:08
  • 1. Security Issues Network Access and Alerts .mp4
    11:20
  • 2. Security Issues Altered Files, Unwanted Notifications, and Update Failure .mp4
    07:48
  • 3. Implement Malware Removal Containment .mp4
    12:07
  • 4. Manage System Restore and Remediation .mp4
    10:23
  • 5. Prevent Future Malware Infection .mp4
    05:54
  • 1. Resolve Mobile OS Application Problems .mp4
    09:57
  • 2. Resolve Update Problems .mp4
    10:27
  • 3. Mitigate Battery Life Issues .mp4
    12:47
  • 4. Optimize Performance and Troubleshoot Reboots .mp4
    07:49
  • 5. Troubleshoot Autorotation and Connectivity .mp4
    12:53
  • 6. Mobile Apps and Security .mp4
    11:46
  • 1. Introducing Effective Communication .mp4
    01:48
  • 2. Network Documentation .mp4
    10:04
  • 3. Wikis and Knowledgebases .mp4
    08:07
  • 4. Regulatory Issues and Documents .mp4
    09:38
  • 5. I.T. Policies .mp4
    07:07
  • 6. Incident Response Documents .mp4
    03:56
  • 7. Effective Communication Techniques .mp4
    08:33
  • 8. Professional Behaviors .mp4
    08:41
  • 1. Introducing Change Management and Backups .mp4
    01:23
  • 2. Before the Change .mp4
    09:14
  • 3. During and After the Change .mp4
    11:11
  • 4. Types of Backups .mp4
    09:54
  • 5. Backup Methods .mp4
    07:13
  • 6. Backup Media .mp4
    11:42
  • 7. Restoration Objectives .mp4
    05:47
  • 1. Introducing Common Safety Procedures .mp4
    01:43
  • 2. Computer Component Hazards .mp4
    09:09
  • 3. Electrostatic Discharge Safety .mp4
    05:56
  • 4. Electromagnetic Interference .mp4
    04:30
  • 5. Workplace Safety Procedures .mp4
    10:40
  • 6. Common I.T. Toolkits .mp4
    09:01
  • 7. Equipment Disposal .mp4
    09:27
  • 8. Power Management .mp4
    04:20
  • 1. Introducing Scripting Basics .mp4
    01:20
  • 2. Installing Python and VS Code .mp4
    13:36
  • 3. Hello, World .mp4
    08:22
  • 4. Variables .mp4
    06:17
  • 5. Basic Data Types .mp4
    09:28
  • 6. Complex Data Types .mp4
    13:21
  • 7. Loops .mp4
    05:31
  • 8. Conditionals .mp4
    06:05
  • 9. Modules .mp4
    09:45
  • 1. Introducing Remote Access Technologies .mp4
    01:57
  • 2. Remote Desktop Protocol .mp4
    01:00
  • 3. VNC .mp4
    07:35
  • 4. Telnet .mp4
    08:27
  • 5. Secure Shell (SSH) .mp4
    07:41
  • 6. Remote Access Tools .mp4
    09:44
  • 7. Summarizing Remote Access .mp4
    01:28
  • Description


    This entry-level CompTIA A+ (220-1102) training prepares learners to work with, manage, and troubleshoot problems with common software and operating systems.

    The A+ certification from CompTIA is one of the most well-known entry-level IT certifications in the world. The CompTIA A+ covers computer hardware, Windows and Unix-based operating systems, and networking fundamentals. Like other CompTIA certifications, the CompTIA A+ is vendor-agnostic, which means its lessons apply equally to any operating system or manufacturer.

    More details


    This course covers the second of the two exams you'll need to pass to earn the A+. The 220-1102 exam covers operating systems, security, software, and operational procedures.

    Once you're done with this CompTIA training, you'll know how to work with, manage, and troubleshoot problems with common software and operating systems.

    For IT managers, this CompTIA training can be used to onboard new technical support specialists, curated into individual or team training plans, or as a CompTIA reference resource.

    CompTIA A+ (220-1102): What You Need to Know

    This CompTIA A+ (220-1102) training has videos that cover topics such as:

    • Navigating, using, and managing different operating systems
    • Recognizing basic network and system security features and risks
    • Troubleshooting problems with applications and other software
    • Documenting steps taken to fix technology

    Who Should Take CompTIA A+ (220-1102) Training?

    This CompTIA A+ (220-1102) training is considered foundational-level CompTIA training, which means it was designed for technical support specialists. This desktop hardware skills course is valuable for new IT professionals with at least a year of experience with desktop support and experienced technical support specialists looking to validate their CompTIA skills.

    New or aspiring technical support specialists. It's hard to imagine a better first step for a new or aspiring technical support specialist than training for the A+. And if certification doesn’t interest you, taking this course is still recommended as it will make you a more competent and capable IT specialist. But earning the cert can help you with promotions and advancement.

    Experienced technical support specialists. If you've been working in IT for a few years, this CompTIA A+ training can help in two ways. First, it can help you pass the A+ 220-1102 exam and earn a career-defining certification. Second, it will help fill in knowledge gaps you have related to troubleshooting device software and operating systems.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    James Conrad
    James Conrad
    Instructor's Courses

    I really enjoy teaching someone a topic that was difficult for me to learn so they don’t have to go through the same pain that I did while learning that topic.

    James brings more than 30 years of IT experience to his training. He got his start in IT volunteering for a nonprofit and becoming their defacto IT pro — while using an MS-DOS portable computer. Before joining CBT Nuggets, James did freelance IT work, and wrote and reviewed technical books. His hobbies include photography, hiking, and traveling, especially to Eastern Europe and Russia.

    Certifications: Microsoft Certified Professional, Microsoft Certified Solutions Associate, Microsoft Certified Solutions Expert, Microsoft Certified Technician, Certified Ethical Hacker, and CompTIA A+

    Areas of expertise: Microsoft (Group Policy) and CompTIA

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 197
    • duration 28:07:12
    • Release Date 2023/02/25