Companies Home Search Profile

CompTIA A+ Core 2 (220-1002)

Focused View

29:48:44

75 View
  • 001 - CompTIA A+ Core 2 (220-1002) Introduction.mp4
    06:15
  • 002 - Domain Introduction.mp4
    01:29
  • 003 - Learning Objectives.mp4
    01:11
  • 004 - 1.1 Types of Workstation Operating Systems.mp4
    14:03
  • 005 - 1.2 32-bit versus 64-bit.mp4
    03:43
  • 006 - 1.3 Smartphone & Tablet Operating Systems.mp4
    19:38
  • 007 - 1.4 Vendor-Specific Limitations & OS Compatibility.mp4
    11:27
  • 008 - Learning Objectives.mp4
    00:27
  • 009 - 2.1 Comparison of Windows Versions and Features.mp4
    16:48
  • 010 - 2.2 Corporate versus Personal Needs.mp4
    10:47
  • 011 - Learning Objectives.mp4
    00:40
  • 012 - 3.1 Boot Methods.mp4
    13:15
  • 013 - 3.2 Types of Installations.mp4
    19:55
  • 014 - 3.3 Partitioning.mp4
    17:34
  • 015 - 3.4 File Systems & Formatting.mp4
    08:24
  • 016 - 3.5 Installation Considerations Part 1.mp4
    07:47
  • 017 - 3.6 Installation Considerations Part 2.mp4
    18:51
  • 018 - Learning Objectives.mp4
    01:04
  • 019 - 4.1 Introduction to Microsoft Command-Line Tools and Help.mp4
    14:54
  • 020 - 4.2 Command Prompt Basics (using Windows 8.1).mp4
    08:30
  • 021 - 4.3 File-related Commands Part 1.mp4
    12:38
  • 022 - 4.4 File-related Commands Part 2.mp4
    12:52
  • 023 - 4.5 Disk and File Checking Tools.mp4
    13:56
  • 024 - 4.6 Working with Tasks.mp4
    04:31
  • 025 - 4.7 Command-Line Networking in Windows Part 1 (ipconfig and ping).mp4
    21:42
  • 026 - 4.8 Command-Line Networking in Windows Part 2.mp4
    21:38
  • 027 - 4.9 DISM.mp4
    16:00
  • 028 - 4.10 Policy-based Commands.mp4
    04:03
  • 029 - 4.11 Additional Command-Line Tools.mp4
    02:34
  • 030 - Learning Objectives.mp4
    01:10
  • 031 - 5.1 Administrative Tools Part 1 (Computer Management and the MMC).mp4
    16:50
  • 032 - 5.2 Administrative Tools Part 2 (Performance Monitor and WMD).mp4
    16:56
  • 033 - 5.3 Administrative Tools Part 3 (Task Scheduler and Print Management).mp4
    14:04
  • 034 - 5.4 Administrative Tools Part 4 (Local Users and Groups and Event Viewer).mp4
    16:50
  • 035 - 5.5 Administrative Tools Part 5 (Windows Firewall and Local Security Policy).mp4
    09:18
  • 036 - 5.6 Administrative Tools Part 6 (Component Services and Data Sources).mp4
    05:26
  • 037 - 5.7 System Configuration Utility.mp4
    08:46
  • 038 - 5.8 Task Manager.mp4
    10:55
  • 039 - 5.9 Disk Management.mp4
    16:07
  • 040 - 5.10 System Utilities Part 1.mp4
    14:46
  • 041 - 5.11 System Utilities Part 2.mp4
    17:50
  • 042 - Learning Objectives.mp4
    00:41
  • 043 - 6.1 Internet Options.mp4
    09:35
  • 044 - 6.2 Refresh Rates and Frame Rates.mp4
    04:33
  • 045 - 6.3 Resolution.mp4
    06:02
  • 046 - 6.4 Color Depth.mp4
    02:53
  • 047 - 6.5 Aspect Ratio.mp4
    03:08
  • 048 - 6.6 Folder Options.mp4
    11:03
  • 049 - 6.7 System Properties - Windows 8.1.mp4
    12:21
  • 050 - 6.8 Power Options.mp4
    06:43
  • 051 - 6.9 Additional CP Icons Part 1 (Windows 8.1).mp4
    10:01
  • 052 - 6.10 Additional CP Icons Part 2 ( Windows 10).mp4
    12:37
  • 053 - Learning Objectives.mp4
    00:30
  • 054 - 7.1 System OS Requirements for Applications, Install Methods, and Security.mp4
    12:42
  • 055 - Learning Objectives.mp4
    01:06
  • 056 - 8.1 Introduction to Windows Networking.mp4
    14:43
  • 057 - 8.2 Types of Windows Networks.mp4
    14:56
  • 058 - 8.3 Sharing and Mapping.mp4
    15:19
  • 059 - 8.4 Administrative and Hidden Shares.mp4
    17:36
  • 060 - 8.5 Establishing Network Connections.mp4
    05:50
  • 061 - 8.6 Alternate IP Address.mp4
    03:59
  • 062 - 8.7 Proxy Settings.mp4
    09:16
  • 063 - 8.8 Remote Control of Windows Systems.mp4
    12:59
  • 064 - 8.9 Firewall Settings.mp4
    05:47
  • 065 - 8.10 Network Card Properties.mp4
    10:35
  • 066 - Learning Objectives.mp4
    00:28
  • 067 - 9.1 Basic Linux Commands Part 1.mp4
    23:42
  • 068 - 9.2 Basic Linux Commands Part 2.mp4
    30:58
  • 069 - 9.3 macOS and Linux Best Practices.mp4
    10:50
  • 070 - Domain Introduction.mp4
    01:11
  • 071 - Learning Objectives.mp4
    00:33
  • 072 - 1.1 Physical Security.mp4
    11:56
  • 073 - Learning Objectives.mp4
    00:53
  • 074 - 2.1 Active Directory.mp4
    23:46
  • 075 - 2.2 User Authentication.mp4
    04:00
  • 076 - 2.3 Firewall Security.mp4
    14:48
  • 077 - 2.4 MDM Policies and DLP.mp4
    05:00
  • 078 - 2.5 Certificates and Trust.mp4
    17:21
  • 079 - 2.6 Principle of Least Privilege.mp4
    03:56
  • 080 - Learning Objectives.mp4
    00:33
  • 081 - 3.1 Wireless Encryption Protocols.mp4
    07:01
  • 082 - 3.2 Wireless Authentication (Enterprise).mp4
    05:57
  • 083 - Learning Objectives.mp4
    00:47
  • 084 - 4.1 Malware Part 1 Viruses and Worms.mp4
    09:57
  • 085 - 4.2 Malware Part 2 Trojans, Rootkits, Ransomware, and More.mp4
    09:09
  • 086 - 4.3 Keyloggers.mp4
    05:28
  • 087 - 4.4 Tools and Methods for Defeating Malware.mp4
    12:51
  • 088 - Learning Objectives.mp4
    00:52
  • 089 - 5.1 Social Engineering Part 1 Impersonation and Dumpster Diving.mp4
    05:41
  • 090 - 5.2 Social Engineering Part 2 Phishing, Shoulder Surfing, and Tailgating.mp4
    09:01
  • 091 - 5.3 Attacks on Passwords.mp4
    11:32
  • 092 - 5.4 Spoofing and MITM.mp4
    07:36
  • 093 - 5.5 DoS, DDoS, Botnets, and Zero-day Attacks.mp4
    08:13
  • 094 - Learning Objectives.mp4
    00:39
  • 095 - 6.1 Users and Groups.mp4
    10:22
  • 096 - 6.2 Shared Files and Folders.mp4
    11:30
  • 097 - 6.3 Permissions.mp4
    16:23
  • 098 - 6.4 System Files and Folders Part 1.mp4
    09:05
  • 099 - 6.5 System Files and Folders Part 2.mp4
    04:47
  • 100 - 6.6 BitLocker and EFS.mp4
    13:25
  • 101 - Learning Objectives.mp4
    00:32
  • 102 - 7.1 Password Best Practices.mp4
    16:33
  • 103 - 7.2 Account Management.mp4
    11:27
  • 104 - 7.3 Basic Active Directory Functions.mp4
    19:10
  • 105 - 7.4 Disabling AutoPlay Autorun.mp4
    05:36
  • 106 - Learning Objectives.mp4
    00:23
  • 107 - 8.1 Screen Locks.mp4
    12:07
  • 108 - 8.2 Best Practices in the Case of Loss or Theft.mp4
    05:53
  • 109 - 8.3 Additional Mobile Device Security.mp4
    17:43
  • 110 - Learning Objectives.mp4
    00:45
  • 111 - 9.1 Recycling & Repurposing Best Practices.mp4
    06:34
  • 112 - 9.2 Physical Destruction.mp4
    07:59
  • 113 - Learning Objectives.mp4
    00:38
  • 114 - 10.1 SOHO Wireless Security Part 1.mp4
    15:14
  • 115 - 10.2 SOHO Wireless Security Part 2.mp4
    16:58
  • 116 - Domain Introduction.mp4
    01:01
  • 117 - Learning Objectives.mp4
    01:29
  • 118 - 1.1 Review of the A+ Troubleshooting Process.mp4
    08:50
  • 119 - 1.2 Troubleshooting Windows Operating System Failures Part 1.mp4
    12:08
  • 120 - 1.3 Troubleshooting Windows Operating System Failures Part 2.mp4
    09:39
  • 121 - 1.4 Windows 10 Recovery Environment.mp4
    00:42
  • 122 - 1.5 Windows 8 7 Recovery Environment.mp4
    18:53
  • 123 - 1.6 Service Failures.mp4
    18:39
  • 124 - 1.7 Performance and Application Issues.mp4
    23:37
  • 125 - 1.8 Windows Troubleshooting Utilities Part 1.mp4
    15:12
  • 126 - 1.9 Windows Troubleshooting Utilities Part 2.mp4
    08:48
  • 127 - Learning Objectives.mp4
    00:30
  • 128 - 2.1 Invalid Certificate Issues.mp4
    10:27
  • 129 - 2.2 Common Symptoms and Potential Culprits.mp4
    17:50
  • 130 - 2.3 Tools Used to Solve Security Problems.mp4
    12:18
  • 131 - Learning Objectives.mp4
    00:37
  • 132 - 3.1 Malware Removal Procedure.mp4
    03:03
  • 133 - 3.2 Scenario - Scan For and Quarantine a Virus.mp4
    07:41
  • 134 - Learning Objectives.mp4
    00:34
  • 135 - 4.1 Troubleshooting Android and iOS.mp4
    14:56
  • 136 - 4.2 Common Symptoms and Potential Culprits.mp4
    18:33
  • 137 - 4.3 Tools Used to Solve Mobile Device Issues.mp4
    09:44
  • 138 - Learning Objectives.mp4
    00:35
  • 139 - 5.1 Common Symptoms of Mobile OS Security Issues.mp4
    10:39
  • 140 - 5.2 Tools Used to Solve Mobile OS Security Problems.mp4
    13:11
  • 141 - Domain Introduction.mp4
    01:04
  • 142 - Learning Objectives.mp4
    00:31
  • 143 - 1.1 Network Documentation.mp4
    12:01
  • 144 - 1.2 Knowledge Bases and Articles.mp4
    17:02
  • 145 - 1.3 Policy Documentation.mp4
    14:18
  • 146 - Learning Objectives.mp4
    00:27
  • 147 - 2.1 Purpose, Scope, and Analysis of Business Process Change.mp4
    10:21
  • 148 - Learning Objectives.mp4
    00:32
  • 149 - 3.1 Power Problems and Protective Devices.mp4
    14:09
  • 150 - 3.2 Backup and Recovery.mp4
    12:00
  • 151 - 3.3 Account Recovery Options.mp4
    10:59
  • 152 - Learning Objectives.mp4
    00:30
  • 153 - 4.1 ESD Prevention.mp4
    05:07
  • 154 - 4.2 Equipment Grounding.mp4
    06:37
  • 155 - 4.3 Toxic Waste Handling.mp4
    05:39
  • 156 - 4.4 Personal Safety.mp4
    05:59
  • 157 - Learning Objectives.mp4
    00:29
  • 158 - 5.1 MSDS Documentation.mp4
    05:11
  • 159 - 5.2 Environmental Controls.mp4
    06:12
  • 160 - 5.3 Power Concerns.mp4
    04:09
  • 161 - Learning Objectives.mp4
    00:50
  • 162 - 6.1 Incident Response.mp4
    08:00
  • 163 - 6.2 Licensing.mp4
    04:57
  • 164 - 6.3 Regulated Data.mp4
    12:08
  • 165 - Learning Objectives.mp4
    00:24
  • 166 - 7.1 Communication Techniques.mp4
    05:17
  • 167 - 7.2 Professionalism.mp4
    05:41
  • 168 - Learning Objectives.mp4
    00:37
  • 169 - 8.1 Introduction to Scripting.mp4
    11:29
  • 170 - 8.2 Scripting in PowerShell.mp4
    15:05
  • 171 - 8.3 Scripting in Bash.mp4
    15:30
  • 172 - Learning Objectives.mp4
    00:50
  • 173 - 9.1 RDP.mp4
    11:10
  • 174 - 9.2 Telnet and SSH.mp4
    11:29
  • 175 - CompTIA A+ Core 2 (220-1002) Summary.mp4
    01:43
  • 176 - Appendix Overview.mp4
    00:34
  • 177 - 1.3 Windows 7 and 8 Upgrade Paths.mp4
    03:49
  • 178 - 2.6 Hands-on Windows 8 Installation Part 1.mp4
    26:26
  • 179 - 2.7 Hands-on Windows 8 Installation Part 2.mp4
    25:17
  • 180 - 4.1 Administrative Tools - Windows 8.1.mp4
    25:17
  • 181 - 4.5 Migration Upgrade Tools.mp4
    07:38
  • 182 - 6.2 Networking Connections - Windows 8.1.mp4
    05:50
  • 183 - 6.6 Remote Control - Windows 8.1.mp4
    07:53
  • 184 - 6.7 Proxy Settings - Windows 8.1.mp4
    09:16
  • 185 - 6.8 Firewall Settings - Windows 8.1.mp4
    05:47
  • 186 - 8.2 OS X and Linux Tools.mp4
    08:33
  • 187 - 8.3 OS X Features.mp4
    17:27
  • 188 - 17.3 Permissions - Windows 8.1.mp4
    16:23
  • 189 - 15.4 More Computerized Attacks.mp4
    10:26
  • 190 - 15.5 Protecting Systems From Threats.mp4
    13:41
  • 191 - 18.3 Best Practices - Windows 8.1.mp4
    18:12
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 191
    • duration 29:48:44
    • Release Date 2023/11/07