| All About the CompTIA A+ | |||
| What is the CompTIA A+? | 00:02:00 | ||
| Why Get CompTIA A+ Certified? | 00:05:00 | ||
| How to Take the A+ Exam | 00:02:00 | ||
| What’s on the CompTIA A+ Core 2 (220-1102) Exam? | 00:04:00 | ||
| How to Pass the CompTIA A+ Exams | 00:02:00 | ||
| How to Use this Video Course | 00:02:00 | ||
| Section 01 - Safety and Professionalism | |||
| Professional Communication, Part 1 | 00:06:00 | ||
| Professional Communication, Part 2 | 00:07:00 | ||
| Dealing with Difficult Customers | 00:05:00 | ||
| Physical Safety | 00:07:00 | ||
| Section 02 - The Visible Computer | |||
| Common Safety Procedures | 00:04:00 | ||
| What Is an Operating System? | 00:09:00 | ||
| Users and Super Users | 00:05:00 | ||
| Why Windows? | 00:08:00 | ||
| Touring Windows 10 and 11 | 00:05:00 | ||
| Touring the macOS | 00:06:00 | ||
| Touring Linux | 00:08:00 | ||
| Section 03 - Power Supplies | |||
| Power Protection | 00:09:00 | ||
| Section 04 - Mass Storage Technologies | |||
| Boot Order | 00:07:00 | ||
| Section 05 - Implementing Mass Storage | |||
| Understanding Partitioning | 00:04:00 | ||
| MBR Partitioning | 00:12:00 | ||
| GPT Partitioning | 00:06:00 | ||
| Understanding File Systems | 00:11:00 | ||
| Popular File Systems | 00:06:00 | ||
| Formatting in Action | 00:11:00 | ||
| Dynamic Disks | 00:07:00 | ||
| New Installation – First Drive | 00:05:00 | ||
| Software RAID in Storage Spaces | 00:09:00 | ||
| Encrypting Mass Storage | 00:09:00 | ||
| Maintaining Storage Disks (previously Ch 14 Working with Disks) | 00:06:00 | ||
| Section 06 - Essential Peripherals | |||
| Understanding USB | 00:11:00 | ||
| Webcams and Videoconferencing | 00:03:00 | ||
| Section 07 - Installing and Upgrading Operating Systems | |||
| Windows 10 Editions and Features | 00:07:00 | ||
| Windows 11 Editions and Features | 00:05:00 | ||
| Boot from Everything | 00:12:00 | ||
| Installing and Upgrading Windows 10 | 00:06:00 | ||
| Post-Installation Tasks | 00:11:00 | ||
| Installing and Updating Linux | 00:03:00 | ||
| Upgrading macOS | 00:02:00 | ||
| Section 08 - Working with Operating Systems | |||
| The Task Manager | 00:06:00 | ||
| The Control Panel | 00:10:00 | ||
| Windows Settings | 00:06:00 | ||
| MMC and Additional Tools | 00:08:00 | ||
| What Is the Registry? | 00:10:00 | ||
| macOS Core Tools | 00:12:00 | ||
| Section 09 - Users, Groups, and Permissions | |||
| Introduction to Users and Groups | 00:06:00 | ||
| Managing Users and Groups | 00:12:00 | ||
| NTFS Permissions | 00:08:00 | ||
| Linux and macOS Permissions | 00:05:00 | ||
| File Explorer | 00:13:00 | ||
| Sharing Resources | 00:10:00 | ||
| Security Policies | 00:08:00 | ||
| Section 10 - Maintaining and Optimizing Operating Systems | |||
| Maintaining Windows | 00:03:00 | ||
| Maintaining macOS | 00:09:00 | ||
| Maintaining Linux | 00:03:00 | ||
| Working with Applications | 00:09:00 | ||
| Backing Up Your Data in Windows | 00:09:00 | ||
| Backing Up Your Data in Linux and macOS | 00:04:00 | ||
| Section 11 - Working with the Command-Line Interface | |||
| Understanding the CLI | 00:11:00 | ||
| Navigating the CLI | 00:14:00 | ||
| Working with Folders | 00:06:00 | ||
| Working with Files | 00:11:00 | ||
| Working with Drives | 00:13:00 | ||
| Super Copy Commands | 00:08:00 | ||
| Command-Line Permissions | 00:07:00 | ||
| Advanced Windows Commands | 00:08:00 | ||
| Advanced Linux Commands | 00:11:00 | ||
| Introduction to Scripting | 00:10:00 | ||
| Interpreted Languages | 00:12:00 | ||
| Scripting and the Terminal | 00:09:00 | ||
| Section 12 - Troubleshooting Operating Systems | |||
| Windows Recovery Environment | 00:05:00 | ||
| Advanced Windows Startup Options | 00:07:00 | ||
| Troubleshooting Boot Problems | 00:10:00 | ||
| Troubleshooting at the GUI | 00:08:00 | ||
| Troubleshooting Applications | 00:07:00 | ||
| Kernel Panic | 00:05:00 | ||
| Section 13 - Local Area Networking | |||
| Introduction to TCP/IP | 00:14:00 | ||
| Network IDs and Subnet Masks | 00:05:00 | ||
| Special IP Addresses | 00:09:00 | ||
| Network Address Translation (NAT) | 00:07:00 | ||
| Dynamic IP Addressing | 00:10:00 | ||
| Working with Connections | 00:09:00 | ||
| Understanding DNS | 00:11:00 | ||
| Working with DNS | 00:07:00 | ||
| Windows Naming | 00:06:00 | ||
| Working with Workgroups | 00:07:00 | ||
| Working with Active Directory | 00:14:00 | ||
| Windows Sharing with macOS and Linux | 00:07:00 | ||
| The net Command | 00:04:00 | ||
| Routers | 00:11:00 | ||
| Basic Router Configuration | 00:12:00 | ||
| Firewall Configuration | 00:11:00 | ||
| Windows Firewall | 00:08:00 | ||
| Port Forwarding | 00:07:00 | ||
| Advanced Router Configuration | 00:06:00 | ||
| Virtual LANs (VLANs) | 00:08:00 | ||
| Section 14 - Wireless Networking | |||
| Basic WAP Setup | 00:11:00 | ||
| Wireless Encryption | 00:10:00 | ||
| Connecting to a Wi-Fi Network | 00:09:00 | ||
| Enterprise Wireless | 00:16:00 | ||
| Troubleshooting Wireless Connections | 00:07:00 | ||
| Section 15 - The Internet | |||
| Telnet and SSH | 00:07:00 | ||
| Remote Desktop Connections | 00:08:00 | ||
| The World Wide Web | 00:09:00 | ||
| File Transfer Protocol (FTP) | 00:08:00 | ||
| Proxy Servers | 00:06:00 | ||
| Virtual Private Networks (VPNs) | 00:08:00 | ||
| Internet of Things (IoT) | 00:03:00 | ||
| Troubleshooting Internet Connections | 00:07:00 | ||
| Browser Security | 00:09:00 | ||
| Section 16 - Portable Computing | |||
| Power Management | 00:11:00 | ||
| Section 17 - Mobile Devices | |||
| Touring Android | 00:10:00 | ||
| Touring iOS | 00:07:00 | ||
| Virtual Reality | 00:02:00 | ||
| Section 18 - Maintaining and Securing Mobile Devices | |||
| Maintaining Mobile Devices | 00:11:00 | ||
| Mobile Devices and E-mail | 00:09:00 | ||
| Mobile Device Security | 00:08:00 | ||
| Mobile Device Troubleshooting | 00:09:00 | ||
| Section 19 - Securing Computers | |||
| Threats | 00:10:00 | ||
| Dealing with Threats | 00:08:00 | ||
| Physical Security | 00:08:00 | ||
| Passwords and Authentication | 00:14:00 | ||
| Multifactor Authentication (MFA) | 00:05:00 | ||
| Malware | 00:13:00 | ||
| Anti-Malware | 00:11:00 | ||
| Social Engineering | 00:06:00 | ||
| Licensing | 00:09:00 | ||
| Incident Response | 00:05:00 | ||
| Environmental Controls | 00:06:00 | ||
| Malware in Action | 00:08:00 | ||
| Section 20 - Operational Procedures | |||
| Documents You Need to Know | 00:09:00 | ||
| Data You Need to Know | 00:04:00 | ||
| Change Management | 00:06:00 | ||
| The Zen of Backup | 00:11:00 | ||
| Recycling and Data Destruction | 00:07:00 | ||
| Ticketing Systems | 00:07:00 | ||