Companies Home Search Profile

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2

35:48:54

148 View
  • 1. Welcome.mp4
    15:46
  • 2. Exam Tips.mp4
    03:47
  • 1. Operating System Types (OBJ. 1.8).mp4
    07:58
  • 2. Windows (OBJ. 1.8).mp4
    07:43
  • 3. Linux (OBJ. 1.8).mp4
    09:06
  • 4. Android (OBJ. 1.8).mp4
    04:15
  • 5. Chrome OS (OBJ. 1.8).mp4
    05:34
  • 6. macOS (OBJ. 1.8).mp4
    03:07
  • 7. iOS and iPadOS (OBJ. 1.8).mp4
    04:24
  • 8. Operating Systems (OBJ. 1.8).mp4
    18:13
  • 9. Filesystem Types (OBJ. 1.8).mp4
    12:56
  • 10. Compatibility Concerns (OBJ. 1.8).mp4
    07:05
  • 1. Windows Versions (OBJ. 1.1 & 1.7).mp4
    02:00
  • 2. 64-bit vs 32-bit Versions (OBJ. 1.7).mp4
    04:32
  • 3. Windows Home (OBJ. 1.1).mp4
    06:22
  • 4. Windows Pro (OBJ. 1.1).mp4
    08:30
  • 5. Windows Enterprise and Education (OBJ. 1.1).mp4
    06:06
  • 6. Upgrading Windows (OBJ. 1.1).mp4
    05:04
  • 7. In-place Upgrade (OBJ. 1.1).mp4
    08:54
  • 1. Windows Installation (OBJ. 1.9).mp4
    02:36
  • 2. Installation Types (OBJ. 1.9).mp4
    08:31
  • 3. Upgrade Considerations (OBJ. 1.9).mp4
    06:42
  • 4. Product Lifecycle (OBJ. 1.9).mp4
    06:06
  • 5. Boot Methods (OBJ. 1.9).mp4
    05:37
  • 6. Partitioning Storage Devices (OBJ. 1.9).mp4
    07:30
  • 7. Recovery and Reset (OBJ. 1.9).mp4
    05:23
  • 8. Using a Recovery Partition (OBJ. 1.9).mp4
    10:48
  • 1. Application Configuration (OBJ. 1.7).mp4
    02:44
  • 2. Application Requirements (OBJ. 1.7).mp4
    08:46
  • 3. Distribution Methods (OBJ. 1.7).mp4
    09:30
  • 4. Business Impacts (OBJ. 1.7).mp4
    07:06
  • 5. Operational Impacts (OBJ. 1.7).mp4
    03:18
  • 6. Device Impacts (OBJ. 1.7).mp4
    03:32
  • 7. Network Impacts (OBJ. 1.7).mp4
    03:38
  • 8. Installing Applications (OBJ. 1.7).mp4
    19:50
  • 1. Windows Networking (OBJ. 1.6).mp4
    03:59
  • 2. Wired Connections (OBJ. 1.6).mp4
    08:12
  • 3. Wireless Connections (OBJ. 1.6).mp4
    07:32
  • 4. WWAN Connections (OBJ. 1.6).mp4
    06:20
  • 5. VPN Connections (OBJ. 1.6).mp4
    04:31
  • 6. Network Client Configuration (OBJ. 1.6).mp4
    06:52
  • 7. Network Locations (OBJ. 1.6).mp4
    08:42
  • 8. Proxy Settings (OBJ. 1.6).mp4
    05:11
  • 1. Windows Control Panel (OBJ. 1.4).mp4
    06:22
  • 2. Account Settings (OBJ. 1.4).mp4
    12:41
  • 3. Programs and Features (OBJ. 1.4).mp4
    05:31
  • 4. Devices and Printers (OBJ. 1.4).mp4
    08:44
  • 5. Internet Options (OBJ. 1.4).mp4
    09:13
  • 6. Network and Sharing Center (OBJ. 1.4).mp4
    08:12
  • 7. Windows Defender Firewall (OBJ. 1.4).mp4
    09:23
  • 8. Mail (OBJ. 1.4).mp4
    08:26
  • 9. Sound (OBJ. 1.4).mp4
    09:04
  • 10. System (OBJ. 1.4).mp4
    11:40
  • 11. Device Manager (OBJ. 1.4).mp4
    05:13
  • 12. Administrative Tools (OBJ. 1.4).mp4
    03:29
  • 13. Indexing Options (OBJ. 1.4).mp4
    04:30
  • 14. File Explorer Options (OBJ. 1.4).mp4
    07:15
  • 15. Power Options (OBJ. 1.4).mp4
    07:25
  • 16. Ease of Access (OBJ. 1.4).mp4
    03:08
  • 1. Windows Settings (OBJ. 1.5).mp4
    04:44
  • 2. Accounts (OBJ. 1.5).mp4
    06:07
  • 3. System Settings (OBJ. 1.5).mp4
    07:29
  • 4. Update and Security (OBJ. 1.5).mp4
    07:30
  • 5. Network and Internet (OBJ. 1.5).mp4
    04:38
  • 6. Devices (OBJ. 1.5).mp4
    04:32
  • 7. Privacy (OBJ. 1.5).mp4
    05:40
  • 8. Time and Language (OBJ. 1.5).mp4
    06:51
  • 9. Personalization (OBJ. 1.5).mp4
    07:16
  • 10. Apps (OBJ. 1.5).mp4
    06:39
  • 11. Gaming (OBJ. 1.5).mp4
    04:35
  • 1. Windows Tools (OBJ. 1.3).mp4
    05:01
  • 2. Task Manager (OBJ. 1.3).mp4
    10:34
  • 3. Device Manager (OBJ. 1.3).mp4
    07:54
  • 4. Disk Management Console (OBJ. 1.3).mp4
    10:31
  • 5. Disk Maintenance Tools (OBJ. 1.3).mp4
    08:54
  • 6. Task Scheduler (OBJ. 1.3).mp4
    10:01
  • 7. Event Viewer (OBJ. 1.3).mp4
    08:35
  • 8. Performance Monitor (OBJ. 1.3).mp4
    10:14
  • 9. Local Users and Groups (OBJ. 1.3).mp4
    06:42
  • 10. Group Policy Editor (OBJ. 1.3).mp4
    10:01
  • 11. Certificate Manager (OBJ. 1.3).mp4
    03:51
  • 12. System Information (OBJ. 1.3).mp4
    05:04
  • 13. Resource Monitor (OBJ. 1.3).mp4
    04:06
  • 14. System Configuration (OBJ. 1.3).mp4
    06:46
  • 15. Registry Editor (OBJ. 1.3).mp4
    09:03
  • 16. Microsoft Management Console (OBJ. 1.3).mp4
    03:52
  • 1. Windows Command Line Tools (OBJ. 1.2).mp4
    08:08
  • 2. Using the GUI (OBJ. 1.2).mp4
    10:47
  • 3. Using the Command Prompt (OBJ. 1.2).mp4
    10:30
  • 4. Navigation Commands (OBJ. 1.2).mp4
    12:15
  • 5. Copying Commands (OBJ. 1.2).mp4
    05:49
  • 6. Disk Management Commands (OBJ. 1.2).mp4
    10:54
  • 7. Shutdown (OBJ. 1.2).mp4
    03:37
  • 8. System File Checker (OBJ. 1.2).mp4
    02:43
  • 9. Windows Version (OBJ. 1.2).mp4
    03:10
  • 10. Network Troubleshooting Commands (OBJ. 1.2).mp4
    16:26
  • 11. Name Resolution Commands (OBJ. 1.2).mp4
    06:07
  • 12. The netstat Command (OBJ. 1.2).mp4
    05:38
  • 13. Group Policy Commands (OBJ. 1.2).mp4
    04:47
  • 1. Windows Shares (OBJ. 1.2, 1.6, & 2.5).mp4
    03:25
  • 2. Workgroups and Domains (OBJ. 1.6).mp4
    08:01
  • 3. File Sharing (OBJ. 2.5).mp4
    09:26
  • 4. NTFS Permissions (OBJ. 2.5).mp4
    11:15
  • 5. Mapping Drives (OBJ. 1.6).mp4
    05:16
  • 6. The net Command (OBJ. 1.2).mp4
    08:47
  • 7. User Data on Domains (OBJ. 1.6).mp4
    10:43
  • 8. Printer Sharing (OBJ. 1.6).mp4
    03:55
  • 1. macOS (OBJ. 1.10).mp4
    06:44
  • 2. Finder, Dock, and Spotlight (OBJ. 1.10).mp4
    16:36
  • 3. Mission Control (OBJ. 1.10).mp4
    04:42
  • 4. Terminal (OBJ. 1.10).mp4
    05:35
  • 5. Disk Utility (OBJ. 1.10).mp4
    06:22
  • 6. File Vault (OBJ. 1.10).mp4
    02:51
  • 7. Remote Disc (OBJ. 1.10).mp4
    02:02
  • 8. Gestures (OBJ. 1.10).mp4
    08:24
  • 9. Keychain (OBJ. 1.10).mp4
    05:05
  • 10. iCloud and Apple ID (OBJ. 1.10).mp4
    06:49
  • 11. System Preferences (OBJ. 1.10).mp4
    18:26
  • 12. Managing macOS Applications (OBJ. 1.10).mp4
    09:40
  • 13. Best Practices for macOS (OBJ. 1.10).mp4
    08:02
  • 1. Linux (OBJ. 1.11).mp4
    09:54
  • 2. Shells and Terminals (OBJ. 1.11).mp4
    03:50
  • 3. Linux Navigation (OBJ. 1.11).mp4
    10:40
  • 4. File Management Commands (OBJ. 1.11).mp4
    11:34
  • 5. Disk Usage Commands (OBJ. 1.11).mp4
    05:19
  • 6. Text Manipulation (OBJ. 1.11).mp4
    11:44
  • 7. Search Commands (OBJ. 1.11).mp4
    06:28
  • 8. User Management (OBJ. 1.11).mp4
    09:39
  • 9. File Permission Commands (OBJ. 1.11).mp4
    07:26
  • 10. Application Management (OBJ. 1.11).mp4
    08:29
  • 11. Resource Management Commands (OBJ. 1.11).mp4
    06:29
  • 12. Networking Commands (OBJ. 1.11).mp4
    07:00
  • 13. Getting Help in Linux (OBJ. 1.11).mp4
    03:25
  • 14. Best Practices for Linux (OBJ. 1.11).mp4
    07:15
  • 1. Threats and Vulnerabilities (OBJ. 2.4).mp4
    14:17
  • 2. CIA Triad (OBJ. 2.4).mp4
    07:01
  • 3. Vulnerabilities (OBJ. 2.4).mp4
    08:48
  • 4. Zero-day Attack (OBJ. 2.4).mp4
    05:06
  • 5. DoS and DDoS (OBJ. 2.4).mp4
    08:05
  • 6. Spoofing (OBJ. 2.4).mp4
    04:20
  • 7. On-path Attack (OBJ. 2.4).mp4
    04:01
  • 8. SQL Injection (OBJ. 2.4).mp4
    06:09
  • 9. XSS and XSRF (OBJ. 2.4).mp4
    03:06
  • 10. Password Cracking (OBJ. 2.4).mp4
    08:22
  • 11. Insider Threat (OBJ. 2.4).mp4
    03:15
  • 1. Malware (OBJ. 2.3).mp4
    02:30
  • 2. Viruses, Worms, and Trojans (OBJ. 2.3).mp4
    11:24
  • 3. Viruses and Trojans (OBJ. 2.3).mp4
    06:18
  • 4. Ransomware (OBJ. 2.3).mp4
    02:33
  • 5. Spyware (OBJ. 2.3).mp4
    02:41
  • 6. Rootkits (OBJ. 2.3).mp4
    03:31
  • 7. Botnets and Zombies (OBJ. 2.3).mp4
    03:33
  • 8. Symptoms of Infection (OBJ. 2.3).mp4
    04:13
  • 9. Removing Malware (OBJ. 3.3).mp4
    05:04
  • 10. Preventing Malware (OBJ. 2.3).mp4
    05:52
  • 1. Social Engineering (OBJ. 2.3 & 2.4).mp4
    03:26
  • 2. Phishing Attacks (OBJ. 2.4).mp4
    12:14
  • 3. Anti-phishing Training (OBJ. 2.3).mp4
    05:22
  • 4. Spam (OBJ. 2.3).mp4
    02:59
  • 5. Impersonation (OBJ. 2.4).mp4
    04:05
  • 6. Pretexting (OBJ. 2.4).mp4
    04:17
  • 7. Social Engineering Attacks (OBJ. 2.4).mp4
    04:26
  • 8. Evil Twin (OBJ. 2.4).mp4
    04:45
  • 9. Software Firewalls (OBJ. 2.3).mp4
    04:18
  • 10. Using Software Firewalls (OBJ. 2.3).mp4
    06:33
  • 11. User Education (OBJ. 2.3).mp4
    04:46
  • 1. Security Controls (OBJ. 2.1).mp4
    05:50
  • 2. Perimeter Defense (OBJ. 2.1).mp4
    05:59
  • 3. Surveillance (OBJ. 2.1).mp4
    07:08
  • 4. Physical Access Controls (OBJ. 2.1).mp4
    13:28
  • 5. Security Principles (OBJ. 2.1).mp4
    11:21
  • 6. Multifactor Authentication (OBJ. 2.1).mp4
    08:25
  • 7. Mobile Device Management (OBJ. 2.1).mp4
    08:19
  • 8. Active Directory Security (OBJ. 2.1).mp4
    09:09
  • 1. Wireless Security (OBJ. 2.2 & 2.9).mp4
    03:13
  • 2. Wireless Encryption (OBJ. 2.2).mp4
    05:23
  • 3. Cracking Wireless Networks (OBJ. 2.2).mp4
    07:42
  • 4. WPA3 (OBJ. 2.2).mp4
    07:20
  • 5. Wireless Authentication (OBJ. 2.2).mp4
    10:00
  • 6. Wireless Network Security (OBJ. 2.9).mp4
    09:51
  • 7. Configuring SOHO Networks (OBJ. 2.9).mp4
    26:31
  • 8. Securing Wireless Networks (OBJ. 2.9).mp4
    13:45
  • 9. Configuring SOHO Firewalls (OBJ. 2.9).mp4
    08:51
  • 1. Mobile Device Security (OBJ. 2.7).mp4
    02:06
  • 2. Securing Wireless Devices (OBJ. 2.7).mp4
    05:01
  • 3. Mobile Device Unlocking (OBJ. 2.7).mp4
    09:02
  • 4. Mobile Malware (OBJ. 2.7).mp4
    06:21
  • 5. Mobile Device Theft (OBJ. 2.7).mp4
    03:13
  • 6. Mobile App Security (OBJ. 2.7).mp4
    05:09
  • 7. Deployment Options (OBJ. 2.7).mp4
    07:12
  • 8. Hardening Mobile Devices (OBJ. 2.7).mp4
    03:51
  • 9. Implementing Mobile Device Security (OBJ. 2.7).mp4
    15:42
  • 10. IoT Vulnerabilities (OBJ. 2.7).mp4
    07:13
  • 1. Windows Security (OBJ. 2.5).mp4
    02:38
  • 2. Login Options (OBJ. 2.5).mp4
    09:26
  • 3. Users and Groups (OBJ. 2.5).mp4
    10:13
  • 4. Encrypting Windows Devices (OBJ. 2.5).mp4
    05:55
  • 5. File Permissions (OBJ. 2.5).mp4
    07:53
  • 6. Microsoft Defender Antivirus (OBJ. 2.5).mp4
    07:09
  • 7. Microsoft Defender Firewall (OBJ. 2.5).mp4
    08:30
  • 1. Securing Workstations (OBJ. 2.6 & 2.8).mp4
    03:20
  • 2. Account Management (OBJ. 2.6).mp4
    14:12
  • 3. AutoRun and AutoPlay (OBJ. 2.6).mp4
    05:14
  • 4. Password Best Practices (OBJ. 2.6).mp4
    10:35
  • 5. Encryption Best Practices (OBJ. 2.6).mp4
    07:30
  • 6. End-user Best Practices (OBJ. 2.6).mp4
    06:49
  • 7. Data Destruction (OBJ. 2.8).mp4
    05:07
  • 8. Data Destruction Methods (OBJ. 2.8).mp4
    12:34
  • 1. Securing Web Browsers (OBJ. 2.10).mp4
    03:19
  • 2. Web Browser Installation (OBJ. 2.10).mp4
    07:29
  • 3. Extensions and Plug-ins (OBJ. 2.10).mp4
    10:38
  • 4. Password Managers (OBJ. 2.10).mp4
    10:31
  • 5. Encrypted Browsing (OBJ. 2.10).mp4
    05:10
  • 6. Private Browsing (OBJ. 2.10).mp4
    06:03
  • 7. Pop-up and Ad Blockers (OBJ. 2.10).mp4
    07:04
  • 8. Cache and History Clearing (OBJ. 2.10).mp4
    05:29
  • 9. Profile Synchronization (OBJ. 2.10).mp4
    04:39
  • 1. Supporting Network Operations (OBJ. 4.1 & 4.2).mp4
    03:00
  • 2. Ticketing System (OBJ. 4.1).mp4
    18:59
  • 3. Using a Ticketing System (OBJ. 4.1).mp4
    05:23
  • 4. Knowledge Base Articles (OBJ. 4.1).mp4
    07:23
  • 5. Asset Management (OBJ. 4.1).mp4
    13:04
  • 6. Change Management (OBJ. 4.2).mp4
    11:00
  • 7. Conducting Change Management (OBJ. 4.2).mp4
    13:51
  • 8. Documentation Types (OBJ. 4.1).mp4
    13:12
  • 1. Backup, Recovery, and Safety.mp4
    03:08
  • 2. Backup and Recovery (OBJ. 4.3).mp4
    11:09
  • 3. Backup Schemes (OBJ. 4.3).mp4
    13:53
  • 4. Redundant Power (OBJ. 4.5).mp4
    06:06
  • 5. Electrical Safety (OBJ. 4.4).mp4
    04:59
  • 6. Component Handling and Storage (OBJ. 4.4).mp4
    05:49
  • 7. HVAC Systems (OBJ. 4.5).mp4
    05:46
  • 8. Proper Handling and Disposal (OBJ. 4.4 & 4.5).mp4
    09:03
  • 9. Personal Safety (OBJ. 4.4 & 4.5).mp4
    11:04
  • 1. Policy and Privacy Concepts (OBJ. 4.6).mp4
    02:47
  • 2. Incident Response (OBJ. 4.6).mp4
    04:19
  • 3. Chain of Custody (OBJ. 4.6).mp4
    07:06
  • 4. Order of Volatility (OBJ. 4.6).mp4
    06:31
  • 5. Data Collection Procedures (OBJ. 4.6).mp4
    03:14
  • 6. Conduct Disk Imaging (OBJ. 4.6).mp4
    09:09
  • 7. Licensing, EULA, and DRM (OBJ. 4.6).mp4
    11:52
  • 8. Data Classification (OBJ. 4.6).mp4
    02:50
  • 9. Data Retention (OBJ. 4.6).mp4
    06:55
  • 10. PII, PHI, and PCI-DSS (OBJ. 4.6).mp4
    05:59
  • 11. Security Policies (OBJ. 4.6).mp4
    10:16
  • 1. Scripting (OBJ. 4.8).mp4
    04:42
  • 2. Script File Types (OBJ. 4.8).mp4
    10:02
  • 3. Variables (OBJ. 4.8).mp4
    07:43
  • 4. Loops (OBJ. 4.8).mp4
    05:22
  • 5. Logic Control (OBJ. 4.8).mp4
    04:37
  • 6. Bash Script Example (OBJ. 4.8).mp4
    04:10
  • 7. Automation Scripting (OBJ. 4.8).mp4
    08:17
  • 8. Scripting Considerations (OBJ. 4.8).mp4
    06:37
  • 1. Remote Access Support (OBJ. 4.9).mp4
    03:12
  • 2. Remote Access Protocols (OBJ. 4.9).mp4
    11:56
  • 3. Connecting to a VPN (OBJ. 4.9).mp4
    01:39
  • 4. Remote Monitoring and Management (RMM) (OBJ. 4.9).mp4
    07:00
  • 5. Microsoft Remote Assistance (MSRA) (OBJ. 4.9).mp4
    11:21
  • 6. Other Remote Access Tools (OBJ. 4.9).mp4
    05:10
  • 7. Desktop Management Software (OBJ. 4.9).mp4
    03:13
  • 1. Troubleshooting Windows (OBJ. 3.1).mp4
    01:56
  • 2. Boot Issues (OBJ. 3.1).mp4
    12:54
  • 3. Boot Recovery Tools (OBJ. 3.1).mp4
    05:43
  • 4. Update or Driver Rollback (OBJ. 3.1).mp4
    05:29
  • 5. System Restore (OBJ. 3.1).mp4
    06:54
  • 6. System Reinstall or Reimage (OBJ. 3.1).mp4
    13:09
  • 7. Performance Issues (OBJ. 3.1).mp4
    17:07
  • 8. System Fault Issues (OBJ. 3.1).mp4
    03:55
  • 9. System Instability Issues (OBJ. 3.1).mp4
    06:24
  • 10. Application and Service Issues (OBJ. 3.1).mp4
    10:49
  • 1. Troubleshooting Workstation Security (OBJ. 3.2 & 3.3).mp4
    03:02
  • 2. Malware Removal Process (OBJ. 3.3).mp4
    13:42
  • 3. Infected Browser Symptoms (OBJ. 3.2).mp4
    10:49
  • 4. Alerts and Notifications (OBJ. 3.2).mp4
    03:48
  • 5. OS Update Failures (OBJ. 3.2).mp4
    03:37
  • 6. File System Issues (OBJ. 3.2).mp4
    03:21
  • 1. Troubleshooting Mobile Issues (OBJ. 3.4).mp4
    01:28
  • 2. Reseting or Rebooting (OBJ. 3.4).mp4
    06:13
  • 3. Mobile OS Update Failure (OBJ. 3.4).mp4
    05:34
  • 4. Mobile Performance Issues (OBJ. 3.4).mp4
    07:07
  • 5. Mobile App Issues (OBJ. 3.4).mp4
    06:38
  • 6. Mobile Connectivity Issues (OBJ. 3.4).mp4
    09:51
  • 7. Mobile Battery Issues (OBJ. 3.4).mp4
    07:42
  • 8. Screen Autorotation Issues (OBJ. 3.4).mp4
    03:46
  • 1. Troubleshooting Mobile Security (OBJ. 3.5).mp4
    01:34
  • 2. Rooting and Jailbreaking (OBJ. 3.5).mp4
    06:40
  • 3. Sideloading Apps (OBJ. 3.5).mp4
    06:33
  • 4. Mobile Malware Symptoms (OBJ. 3.5).mp4
    04:11
  • 5. Unexpected Application Behavior (OBJ. 3.5).mp4
    02:45
  • 6. Leaked Mobile Data (OBJ. 3.5).mp4
    02:57
  • 1. Professionalism (OBJ. 4.7).mp4
    05:27
  • 2. Professional Appearance (OBJ. 4.7).mp4
    06:36
  • 3. Respect Others Time (OBJ. 4.7).mp4
    08:59
  • 4. Proper Communication (OBJ. 4.7).mp4
    15:15
  • 5. Dealing with Private Data (OBJ. 4.7).mp4
    06:05
  • 6. Difficult Situations (OBJ. 4.7).mp4
    06:35
  • 1. Conclusion.mp4
    11:41
  • 2. Bonus Whats Next.mp4
    04:05
  • Description


    Pass the CompTIA A+ (220-1102) Core 2 exam with help from a top expert in the field!

    What You'll Learn?


    • How to pass the CompTIA A+ (220-1102) Core 2 exam on your first attempt
    • What your weak areas are in the CompTIA A+ curriculum so you can restudy those areas
    • Install, configure, and maintain computer equipment, mobile devices, and software for end users
    • Service components based on customer requirements
    • Understand networking basics and apply basic cybersecurity methods to mitigate threats
    • Properly and safely diagnose, resolve, and document common hardware and software issues
    • Apply troubleshooting skills and provide customer support using appropriate communication skills
    • Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments

    Who is this for?


  • Anyone looking to take and pass the CompTIA A+ (220-1102) Core 2 certification exam
  • More details


    Description

    *** Taught by a Best Selling Certification Instructor ***


    This course provides everything you need in order to study for the CompTIA A+ Core 2 (220-1102) exam, including a downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day!


    Jason Dion is an expert in information technology and cybersecurity with over 20 years of experience, and he has designed this course to be a fun way to learn what you need to know to pass the CompTIA A+ Core 2 (220-1102) exam or to better prepare yourself to serve as a service analyst or computer technician in your organization information technology (IT) divisions.


    The CompTIA A+ Core 2 (220-1102) certification is a vendor-neutral certification that validates your knowledge and ability to conduct install, configure, and troubleshoot software and operating system issues in your organization. This certification tests your ability to think on your feet while performing critical IT support functions. The CompTIA A+ certification is designed for early-career data analysts with the equivalent of 9-12 months of on-the-job knowledge.


    The CompTIA A+ Core 2 exam is focused on supporting operating systems and software in order to support a wide variety of different devices used by a diverse and global workforce. 


    CompTIA A+ Core 2 (220-1102) is an early-career IT support technician certification covering the theory and technical skills required to support operating system, applications, and security in a corporate environment using the proper operational procedures.


    To help you practice for the CompTIA A+ Core 2 (220-1102) exam, this course even comes with a realistic practice exam containing 90 multiple-choice questions spread across the four domains tested by the CompTIA A+ Core 2 (220-1102) certification exam!       


    This course will provide you with full coverage of the five domains of the CompTIA A+ Core 2 (220-1102) exam:   

    1. Operating Systems (31%)

    2. Security (25%)

    3. Software Troubleshooting (22%)

    4. Operational Procedures (22%)

    This course stays current and up-to-date with the latest release of the CompTIA A+ Core 2 exam (220-1102), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


    This course is brought to you by Dion Training Solutions, a CompTIA Platinum Delivery Partner, and aligns directly with the OFFICIAL CompTIA A+ (220-1102) Certification Study Guide.


    What Other Students Are Saying About Our Courses:

    • Jason's courses are immensely helpful - they dramatically expedite the learning process (this is my second certification that I've used Jason's resources to study for). The practice exams not only cover the full range of subject matter, but they also are structured in the same manner as those that can be expected on exam day using real-life scenarios and encouraging the mind to apply the knowledge more flexibly than just memorization/repeat learning. (Holly, 5 stars)

    • Great course, very detailed. Passed the exam on the first try. I have recommended this course to everyone I know. (Jose D., 5 stars)

    • I passed on 1st try, that's all I can ask for! (Tim, 5 stars)


    Who this course is for:

    • Anyone looking to take and pass the CompTIA A+ (220-1102) Core 2 certification exam

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 298
    • duration 35:48:54
    • Release Date 2023/01/22