CompTIA A+ 220-1001 & 1002

CompTIA A+ 220-1001 & 1002

£395.00 Inc. VAT

Description

IT success stories start with CompTIA A+ certification. It validates understanding of the most common hardware and software technologies in business and certifies the skills necessary to support complex IT infrastructures. CompTIA A+ is a powerful credential that helps IT professionals worldwide ignite their IT career.
 
Held by over 1 million IT professionals worldwide, CompTIA A+ is the most essential IT certification for establishing an IT career. If you’re new to the IT industry, this will help you put your best foot forward. And if you’re already an IT professional, the CompTIA A+ certification validates your skills and can boost your career.
 
What are the benefits of getting A+ certified?
 
A+ is comprehensive and vendor-neutral
A+ certified professionals have mastered the technologies found in today’s extensive and varied IT environments, from mobile to traditional devices and operating systems. They can confidently handle the most challenging technology problems more efficiently.
 
A+ validates foundational skills
A+ establishes best practices in troubleshooting, networking and security across a variety of devices to set the stage for IT careers. The certification also matches professional tech skills with communication skills.
 
A+ is trusted by employers
As businesses and governments worldwide continue to adopt mobile and cloud technology, they trust A+ certified professionals to keep their devices running and organizations working smoothly.
 
A+ is globally recognized and accredited
CompTIA A+ is compliant with ISO 17024 standards and is approved by the U.S. Department of Defense to meet directive 8570.01-M requirements.
 
A+ is industry supported
A+ is developed and maintained by leading IT experts. Content for the exams stems from a combination of industry-wide survey feedback and contributions from our team of subject matter experts. Learn more about the people behind the CompTIA A+ exam development and the CompTIA A+ Advisory Committee.
 
Companies that hire people with CompTIA A+ include:

  • Canon
  • Dell
  • HP
  • Intel
  • U.S. Department of Defense

 
Jobs that use the CompTIA A+:

  • Technical Support Specialist
  • Field Service Technician
  • IT Support Technician
  • IT Support Administrator

 
Course Delivery: Online
Access Period: 12 months
 
What’s covered in this course?
 
The CompTIA A+ is divided into parts: 220-1001 and 220-1002. The CompTIA A+ 220-1001 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues. The CompTIA A+ 220-1002 covers installing and configuring operating systems including Windows. It also addresses security, the fundamentals of cloud computing and operational procedures. You must pass both exams to become A+ certified. Click on the course titles to reveal the complete course syllabus.



CompTIA A+ 220-1001
 
Mobile Devices
• 1.0 What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile devices
• 1.5 Given a scenario, connect and configure accessories and ports of other mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization
Networking
• 2.0 What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their features
• 2.8 Given a scenario, use appropriate networking tools
Hardware
• 3.0 What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and settings
• 3.11 Given a scenario, install and maintain various print technologies
Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization
Hardware and Network Troubleshooting
• 5.0 What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network problems
 
CompTIA A+ 220-1002
 
Operation Systems
• 1.1 Compare and contrast common operating system types and their purposes
• 1.2 Compare and contrast features of Microsoft Windows versions
• 1.3 Summarize general OS installation considerations and upgrade methods
• 1.4 Given a scenario, use appropriate Microsoft command line tools
• 1.5 Given a scenario, use Microsoft operating system features and tools
• 1.6 Given a scenario, use Microsoft Windows Control Panel utilities
• 1.7 Summarize application installation and configuration concepts
• 1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop
• 1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems
Security
• 2.1 Summarize the importance of physical security measures
• 2.2 Explain logical security concepts
• 2.3 Compare and contrast wireless security protocols and authentication methods
• 2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• 2.5 Compare and contrast social engineering, threats, and vulnerabilities
• 2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings
• 2.7 Given a scenario, implement security best practices to secure a workstation
• 2.8 Given a scenario, implement methods for securing mobile devices
• 2.9 Given a scenario, implement appropriate data destruction and disposal methods
• 2.10 Given a scenario, configure security on SOHO wireless and wired networks
Software Troubleshooting
• 3.1 Given a scenario, troubleshoot Microsoft Windows OS problems
• 3.2 Given a scenario, troubleshoot and resolve PC security issues
• 3.3 Given a scenario, use best practice procedures for malware removal
• 3.4 Given a scenario, troubleshoot mobile OS and application issues
• 3.5 Given a scenario, troubleshoot mobile OS and application security issues
Operational Procedures
• 4.1 Compare and contrast best practices associated with types of documentation
• 4.2 Given a scenario, implement basic change management best practices
• 4.3 Given a scenario, implement basic disaster prevention and recovery methods
• 4.4 Explain common safety procedures • Explain environmental impacts and appropriate controls
• 4.5 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
• 4.6 Given a scenario, use proper communication techniques and professionalism
• 4.7 Identify the basics of scripting • Given a scenario, use remote access technologies