Comptia A+ Core 2 (220-1002)

US$ 8.99 US$ 14.99
0
Number of Students Registered

CompTIA A+ Core II (220-1002) Course covers all the information you need to pass the CompTIA A+ Core II (220-1002) exam. The workbook is designed to take a practical approach of learning with real life examples and case studies.

  • Covers complete Core II 220-1002 blueprint
  • Summarized content
  • Case Study based approach
  • 100% passing guarantee
  • Mind maps

About the CompTIA A+ Core II Exam
  • Exam Number: 220-1002 Core II
  • Associated Certifications: CompTIA A+
  • Duration: 90 minutes (90 questions)
  • Type of Questions: Multiple choice and Practical based questions

Candidates are encouraged to use this document to help prepare for CompTIA A+ Core 1. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220-1001) and Core 2 (220-1002). CompTIA A+ Core 1 measures the necessary skills for an entry-level IT professional. Successful candidates will have the knowledge required to:

  • Assemble components based on customer requirements
  • Install, configure, and maintain PCs, mobile devices, and software for end users
  • Understand the basics of networking and security forensics
  • Properly and safely diagnose, resolve, and document common hardware and software issues
  • Apply troubleshooting skills
  • Provide appropriate customer support
  • Understand the basics of scripting, virtualization, desktop imaging, and deployment

The following topics are general guidelines for the content likely to be included on the exam
  • Operating Systems              27%
  • Security                              24%
  • Software Troubleshooting    26%
  • Operational Procedures      23%
  • Total  –                              100%

How to become CompTIA A+ certified?
Step 1: Choose a Certification:

Explore what is available and choose an IT certification that will benefit you in accomplishing your career target.

To study about various IT career tracks and to choose the best certification for yourself, you can use the “CompTIA Career Roadmap”.

CompTIA has four core IT certifications that is; IT Fundamental, A+, Comptia Network+, and Security+ that examine your knowledge from the entry to the expert level.

If you have the skills to secure a network & deter hackers and want to become a highly efficient IT Security Tech, then CompTIA Security+ is the right type of certification for you.

Step 2: Learning & Training:

Exam preparation can be done through self-study with textbooks, practice exams, and online classroom programs. However, this workbook provides you with all the information and complete assessments gathered in one place to help you pass the CompTIA Security+ Exam.

IPSpecialist offers full support to the candidates in order for them to pass the exam.

Step 3: Familiarization with Exam:

A great suggestion is to first understand what you are training for. For that, we are providing you not only the exam objectives but practice questions as well, in order to give you a thorough idea about your certification exam.

Step 4: Register & Take Exam for Certification:

After all the learning process, the next step is to take your test. Certification exams are offered at different locations all over the world. To register for an exam, contact the authorized test delivery partner of CompTIA, Pearson VUE.

The following are the steps for registration and scheduling an exam:

  1. Buy the exam voucher from “Buy a certification exam voucher”.
  2. Find and visit a testing center “testing center”.
  3. Create Pearson VUE account & schedule your exam. Here is a link for that “Create a Pearson VUE testing account and schedule your exam”.
  4. You will receive a confirmation email having testing information after the registration process.
  5. Get ready for the test.
Step 5: Results:

After you complete an exam at an authorized testing center, you’ll get immediate, online notification of your pass or fail status. If you have passed the exam, a congratulatory email will be forwarded to you with guidelines to access your record.

Make sure to keep a record of the email address you used for registration and score report with exam registration number. This information is required to log in to your certification account.

Chapter 01: Operating Systems
Compare and Contrast Common Operating Systems
32-bit vs. 64-bit
Workstation Operating Systems
Cell Phone/Tablet Operating Systems
Vendor-Specific Limitations
Compatibility Concerns between Operating Systems
OS Type Mind Map
Compare and Contrast Features of Microsoft Windows Versions
Windows 7
Windows 8
Windows 8.1
Windows 10
Corporate vs. Personal Needs
Desktop Styles / User Interfaces
Microsoft Windows Version Mind Map
General OS Installation Considerations and Upgrade Methods
Boot Methods
Type of Installations
Partitioning
File System Types/Formatting
Load Alternate Third-party Drivers when Necessary
Workgroup vs. Domain Setup
Time/Date/Region/Language Settings
Driver Installation, Software, and Windows Updates
Factory Recovery Partition
Properly Formatting the Boot Drive
Hardware Compatibility
Application Compatibility
OS Compatibility and Upgrade Path
OS Installation Mind Map
Microsoft Command Line Tools
Navigation
Ipconfig
Ping
Tracert
Netstat
Nslookup
Shutdown
Dism
SFC
CHKDSK
Diskpart
Taskkill
Gpupdate
Gpresult
Format
Copy
XCOPY
Robocopy
Net Use
Net User
[command name] /?
Standard Privileges vs. Administrative Privileges
OS Commands Mind Map
Using Microsoft Operating System Features and Tools
Administrative
MSConfig
Task Manager
Disk Management
System Utilities
Microsoft Windows Control Panel Utilities
Internet Options
Display/Display Settings
User Accounts
Folder Options
System
Windows Firewall
Power Options
Credential Manager
Programs and Features
HomeGroup
Devices and Printers
Sound
Troubleshooting
Network and Sharing Center
Device Manager
BitLocker
Sync Center
Control Panel Utilities Mind Map
Application Installation and Configuration
System Requirements
OS Requirements
Methods of Installation and Deployment
Local User Permissions
Security Considerations
Application Installation and Configuration Mind Map
Configuring Microsoft Windows Networking on a Client or Desktop
HomeGroup vs. Workgroup
Domain Setup
Network Shares, Administrative Shares and Mapping Drives
Printer Sharing vs. Network Printer Mapping
Establish Networking Connections
Proxy Settings
Remote Desktop Connection
Remote Assistance
Home vs. Work vs. Public Network Settings
Firewall Settings
Configuring an Alternative
IP Address in Windows
Network Card Properties
Microsoft Windows Networking Mind Map
Features and Tools of the Mac OS and Linux Client and Desktop Operating Systems
Best Practices
Tools
Features
Basic Linux Commands
Mac and Linux OS Mind Map
Summary
Operating System Types and their Purposes:
Versions of Microsoft Windows:
OS Installation Considerations and Upgrade Methods:
Microsoft Command Line Tools:
Operating System Features and Tools:
Microsoft Windows Control Panel Utilities:
Practice Questions


Chapter 02: Security
The Importance of Physical Security Measures
Mantrap
Badge Reader
Smart Card
Security Guard
Door Lock
Biometric Locks
Hardware Tokens
Cable Locks
Server Locks
USB Locks
Privacy Screen
Key Fobs
Entry Control Roster
Physical Security Mind Map
Logical Security Concepts
Active Directory
Software Tokens
MDM Policies
Port Security
MAC Address Filtering
Certificates
Anti-Malware and Anti-Virus
Firewalls
User Authentication/Strong Password
Multifactor Authentication
Directory Permissions
VPN
Data Loss Prevention (DLP)
Access Control Lists
Smart Card
Email Filtering
Trusted and Untrusted Software Sources
Principal of Least Privilege
Logical Security Concepts Mind Map
Wireless Security Protocol and Authentication Method
Authentication Methods
Wireless Security Protocol and Authentication Methods Mind Map
Tools and Methods to Detect, Remove, and Prevent Malware
Malware
Tools and Methods
Detecting, Removing, and Preventing Malware Mind Map
Social Engineering, Threats, and Vulnerabilities
Social Engineering
DDoS
Denial of Service (DoS)
Zero-day Attack
Man-In-The-Middle
Brute Force Attack
Dictionary Attack
Rainbow Table
Spoofing
Non-compliant Systems
Zombie
Social Engineering Threats and Vulnerability Mind Map
Basic Microsoft Windows OS Security Settings
User and Groups
NTFS vs Share Permissions
Shared Files and Folders
System Files and Folders
User Authentication
Administrator vs. Standard User
BitLocker
BitLocker-To-Go
Encrypting File System (EFS)
MS Windows OS Security Mind Map
Security Best Practices to Secure a Workstation
Password Best Practices
Account Management
Disable AutoRun
Data Encryption
Patch and Update Management
Security Best Practices to Secure a Workstation Mind Map
Securing Mobile Devices
Screen Lock
Remote Wipes
Locator Applications
Remote Backup Applications
Failed Login Attempts Restrictions
Anti-Virus and Anti-Malware
Patching and OS Updates
Biometric Authentication
Full Device Encryption
Multifactor Authentication
Authenticator Application
Trusted Sources vs Untrusted Sources
Firewalls
Policies and Procedures
Securing Mobile Devices Mind Map
Data Destruction and Disposal Methods
Physical Destruction
Recycling or Repurposing Best Practices
Destruction and Disposal Methods Mind Map
Configuring Security on SOHO Wireless and Wired Networks
Wireless-Specific
Change Default Usernames and Passwords
Enable MAC Filtering
Assign Static IP Addresses
Firewall Settings
Disabling Ports
Content Filtering and Parental Controls
Update Firmware
Physical Security
SOHO Wired and Wireless Network Mind Map
Summary
The Importance of Physical Security Measures
Logical Security Concepts
Wireless Security Protocol and Authentication Method
Detect, Remove, and Prevent Malware using Tools and Methods
Social Engineering, Threats, and Vulnerabilities
Basic Microsoft Windows OS Security Settings
Security Best Practices to Secure a Workstation
Methods for Securing Mobile Devices
Data Destruction and Disposal Methods
Security on SOHO Wireless and Wired Networks
Practice Questions


Chapter 03: Software Troubleshooting
Common symptoms
Common Solutions
Troubleshoot MS Windows OS Problems Mind Map
Troubleshoot and Resolve PC Security Issues
Common Symptoms
Troubleshoot and Resolve PC Security Issues Mind Map
Use Best Practice Procedures for Malware Removal
Quarantine the Infected Systems
Disable System Restore
Remediate the Infected Systems
Schedule Scans and Run Updates
Enable System Restore and Create a Restore Point
Educating the End User
Procedures for Malware Removal Mind Map
Troubleshooting Mobile OS and Application Issues
Mobile OS and Applications’ Common Issues
Mobile OS and Application Issues Mind Map
Troubleshooting Mobile OS and Application Security Issues
Common Symptoms
Mobile OS and Application Security Issues Mind Map
Summary
Troubleshooting Microsoft Windows OS Problems
Troubleshooting and Resolving PC Security Issues
Using Best Practice Procedures for Malware Removal
Troubleshooting Mobile OS and Application Issues
Troubleshooting Mobile OS and Application Security Issues
Practice Questions


Chapter 04: Operational Procedures
Documentation Best Practices
Network Documentation
Network Topology Diagrams
Knowledge Base and Company Articles
Incident Documentation
Regulatory Compliance
Acceptable Use Policy
Password Policy
Inventory Management
Best Practices Associated with Types of Documentation Mind Map
Managing Change Management
Change Management Processes
Documented Business Processes
Change Management Cycle
Implementing Change
Purpose of the Change
Scope of the Change
Risk Analysis
Plan for Change
End-User Acceptance
Change Board
Back-out Plan
Change Documentation
Change Management Best Practices Mind Map
Basic Disaster Prevention and Recovery Methods
Backup and Recovery Procedures
Backup Options
Backup Testing
UPS
Surge Protectors
Cloud Storage vs. Local Storage Backups
Account Recovery Options
Basic Disaster Prevention and Recovery Methods Mind Map
Appropriate Safety Procedures
Equipment Grounding
Component Handling and Storage
Toxic Waste Handling
Personal Safety
Compliance with Local Government Regulations
Appropriate Safety Procedures Mind Map
Potential Environmental Impacts and Appropriate Controls
MSDS Documentation for Handling and Disposal
Temperature, Humidity-Level Awareness, and Proper Ventilation
Power Surges, Brownouts, Blackouts
Protection from Airborne Particles
Dust and Debris
Compliance to Local Government Regulations
Potential Environmental Impacts and Appropriate Controls Mind Map
Processes for Addressing Prohibited Content and Activity, and Privacy, Licensing, and Policy Concepts
Incident Response
Use of Documentation and Documentation Changes
Chain of Custody –Tracking Evidence and the Documenting Process
Licensing/DRM/EULA
Regulated Data
Corporate End-User Policies and Security Best Practices
Addressing Prohibited Content and Activity Mind Map
Proper Communication Techniques and Professionalism
Using Proper Language
Maintain a Positive Attitude and Project Confidence
Actively Listen and Avoid Interrupting the Customer
Be Culturally Sensitive
Be Punctual
Avoid Distractions
Proper Communication Techniques and Professionalism Mind Map
Dealing with Difficult Customers or Situations
Set and Meet Expectations/Timeline and Communicate Clearly with the Customer
Deal Appropriately with Customers’ Confidential and Private Materials
Proper Communication Techniques and Professionalism Mind Map
Introduction to Scripting
What is Scripting
Script File Types
Environment Variables
Comment Syntax
Basic Script Constructs
Basic Data Types
Basic of Scripting Mind Map
Remote Access to Network Devices
Remote Access Protocols
Secure Shell (SSH):
Third-Party Tools for Screen or File Sharing
Security Considerations of Each Access Method
Use Remote Access Technologies Mind Map
Summary
Documentation Best Practices
Managing Change Management
Basic Disaster Prevention and Recovery Methods
Appropriate Safety Procedures
Potential Environmental Impact and Appropriate Controls
Process of Addressing Prohibited Content or Activity
Proper Communication Techniques and Professionalism
Introduction of Scripting
Remote Access to Network Devices


Practice Questions Answers
Acronyms
References
About Our Products

CompTIA is a performance-based certification that helps you develop a career in IT fundamental by approving the hands-on skills required to troubleshoot, configure, and manage both wired and wireless networks. CompTIA certifications help individuals build exceptional in Information Technology and enable organizations to form a skilled and confident staff.

CompTIA certifications have four IT certification series that test different knowledge standards-from entry level to expert level. CompTIA offers certification programs at the core level to professional level, which begins with the core IT fundamentals, infrastructure, cyber security leads to the professional level.

CompTIA certification helps to establish and build your IT career. It benefits you in various ways either seeking certification to have a job in IT or want to upgrade your IT career with a leading certification, that is, CompTIA certification.

comptia security + online course

Get 20% instant discount when shared to your social account

*Product must be added in cart to apply coupon

Buy Now
Send a Message