وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA A+ Core 2 (220-1102) Complete Course & Practice Exam

سرفصل های دوره

Pass the CompTIA A+ (220-1102) Core 2 exam with help from a top expert in the field!


1. Introduction
  • 1. Welcome
  • 2. Exam Tips

  • 2. Operating System Types
  • 1. Operating System Types (OBJ. 1.8)
  • 2. Windows (OBJ. 1.8)
  • 3. Linux (OBJ. 1.8)
  • 4. Android (OBJ. 1.8)
  • 5. Chrome OS (OBJ. 1.8)
  • 6. macOS (OBJ. 1.8)
  • 7. iOS and iPadOS (OBJ. 1.8)
  • 8. Operating Systems (OBJ. 1.8)
  • 9. Filesystem Types (OBJ. 1.8)
  • 10. Compatibility Concerns (OBJ. 1.8)

  • 3. Windows Versions
  • 1. Windows Versions (OBJ. 1.1 & 1.7)
  • 2. 64-bit vs 32-bit Versions (OBJ. 1.7)
  • 3. Windows Home (OBJ. 1.1)
  • 4. Windows Pro (OBJ. 1.1)
  • 5. Windows Enterprise and Education (OBJ. 1.1)
  • 6. Upgrading Windows (OBJ. 1.1)
  • 7. In-place Upgrade (OBJ. 1.1)

  • 4. Windows Installation
  • 1. Windows Installation (OBJ. 1.9)
  • 2. Installation Types (OBJ. 1.9)
  • 3. Upgrade Considerations (OBJ. 1.9)
  • 4. Product Lifecycle (OBJ. 1.9)
  • 5. Boot Methods (OBJ. 1.9)
  • 6. Partitioning Storage Devices (OBJ. 1.9)
  • 7. Recovery and Reset (OBJ. 1.9)
  • 8. Using a Recovery Partition (OBJ. 1.9)

  • 5. Application Configuration
  • 1. Application Configuration (OBJ. 1.7)
  • 2. Application Requirements (OBJ. 1.7)
  • 3. Distribution Methods (OBJ. 1.7)
  • 4. Business Impacts (OBJ. 1.7)
  • 5. Operational Impacts (OBJ. 1.7)
  • 6. Device Impacts (OBJ. 1.7)
  • 7. Network Impacts (OBJ. 1.7)
  • 8. Installing Applications (OBJ. 1.7)

  • 6. Windows Networking
  • 1. Windows Networking (OBJ. 1.6)
  • 2. Wired Connections (OBJ. 1.6)
  • 3. Wireless Connections (OBJ. 1.6)
  • 4. WWAN Connections (OBJ. 1.6)
  • 5. VPN Connections (OBJ. 1.6)
  • 6. Network Client Configuration (OBJ. 1.6)
  • 7. Network Locations (OBJ. 1.6)
  • 8. Proxy Settings (OBJ. 1.6)

  • 7. Windows Control Panel
  • 1. Windows Control Panel (OBJ. 1.4)
  • 2. Account Settings (OBJ. 1.4)
  • 3. Programs and Features (OBJ. 1.4)
  • 4. Devices and Printers (OBJ. 1.4)
  • 5. Internet Options (OBJ. 1.4)
  • 6. Network and Sharing Center (OBJ. 1.4)
  • 7. Windows Defender Firewall (OBJ. 1.4)
  • 8. Mail (OBJ. 1.4)
  • 9. Sound (OBJ. 1.4)
  • 10. System (OBJ. 1.4)
  • 11. Device Manager (OBJ. 1.4)
  • 12. Administrative Tools (OBJ. 1.4)
  • 13. Indexing Options (OBJ. 1.4)
  • 14. File Explorer Options (OBJ. 1.4)
  • 15. Power Options (OBJ. 1.4)
  • 16. Ease of Access (OBJ. 1.4)

  • 8. Windows Settings
  • 1. Windows Settings (OBJ. 1.5)
  • 2. Accounts (OBJ. 1.5)
  • 3. System Settings (OBJ. 1.5)
  • 4. Update and Security (OBJ. 1.5)
  • 5. Network and Internet (OBJ. 1.5)
  • 6. Devices (OBJ. 1.5)
  • 7. Privacy (OBJ. 1.5)
  • 8. Time and Language (OBJ. 1.5)
  • 9. Personalization (OBJ. 1.5)
  • 10. Apps (OBJ. 1.5)
  • 11. Gaming (OBJ. 1.5)

  • 9. Windows Tools
  • 1. Windows Tools (OBJ. 1.3)
  • 2. Task Manager (OBJ. 1.3)
  • 3. Device Manager (OBJ. 1.3)
  • 4. Disk Management Console (OBJ. 1.3)
  • 5. Disk Maintenance Tools (OBJ. 1.3)
  • 6. Task Scheduler (OBJ. 1.3)
  • 7. Event Viewer (OBJ. 1.3)
  • 8. Performance Monitor (OBJ. 1.3)
  • 9. Local Users and Groups (OBJ. 1.3)
  • 10. Group Policy Editor (OBJ. 1.3)
  • 11. Certificate Manager (OBJ. 1.3)
  • 12. System Information (OBJ. 1.3)
  • 13. Resource Monitor (OBJ. 1.3)
  • 14. System Configuration (OBJ. 1.3)
  • 15. Registry Editor (OBJ. 1.3)
  • 16. Microsoft Management Console (OBJ. 1.3)

  • 10. Windows Command Line Tools
  • 1. Windows Command Line Tools (OBJ. 1.2)
  • 2. Using the GUI (OBJ. 1.2)
  • 3. Using the Command Prompt (OBJ. 1.2)
  • 4. Navigation Commands (OBJ. 1.2)
  • 5. Copying Commands (OBJ. 1.2)
  • 6. Disk Management Commands (OBJ. 1.2)
  • 7. Shutdown (OBJ. 1.2)
  • 8. System File Checker (OBJ. 1.2)
  • 9. Windows Version (OBJ. 1.2)
  • 10. Network Troubleshooting Commands (OBJ. 1.2)
  • 11. Name Resolution Commands (OBJ. 1.2)
  • 12. The netstat Command (OBJ. 1.2)
  • 13. Group Policy Commands (OBJ. 1.2)

  • 11. Windows Shares
  • 1. Windows Shares (OBJ. 1.2, 1.6, & 2.5)
  • 2. Workgroups and Domains (OBJ. 1.6)
  • 3. File Sharing (OBJ. 2.5)
  • 4. NTFS Permissions (OBJ. 2.5)
  • 5. Mapping Drives (OBJ. 1.6)
  • 6. The net Command (OBJ. 1.2)
  • 7. User Data on Domains (OBJ. 1.6)
  • 8. Printer Sharing (OBJ. 1.6)

  • 12. macOS
  • 1. macOS (OBJ. 1.10)
  • 2. Finder, Dock, and Spotlight (OBJ. 1.10)
  • 3. Mission Control (OBJ. 1.10)
  • 4. Terminal (OBJ. 1.10)
  • 5. Disk Utility (OBJ. 1.10)
  • 6. File Vault (OBJ. 1.10)
  • 7. Remote Disc (OBJ. 1.10)
  • 8. Gestures (OBJ. 1.10)
  • 9. Keychain (OBJ. 1.10)
  • 10. iCloud and Apple ID (OBJ. 1.10)
  • 11. System Preferences (OBJ. 1.10)
  • 12. Managing macOS Applications (OBJ. 1.10)
  • 13. Best Practices for macOS (OBJ. 1.10)

  • 13. Linux
  • 1. Linux (OBJ. 1.11)
  • 2. Shells and Terminals (OBJ. 1.11)
  • 3. Linux Navigation (OBJ. 1.11)
  • 4. File Management Commands (OBJ. 1.11)
  • 5. Disk Usage Commands (OBJ. 1.11)
  • 6. Text Manipulation (OBJ. 1.11)
  • 7. Search Commands (OBJ. 1.11)
  • 8. User Management (OBJ. 1.11)
  • 9. File Permission Commands (OBJ. 1.11)
  • 10. Application Management (OBJ. 1.11)
  • 11. Resource Management Commands (OBJ. 1.11)
  • 12. Networking Commands (OBJ. 1.11)
  • 13. Getting Help in Linux (OBJ. 1.11)
  • 14. Best Practices for Linux (OBJ. 1.11)

  • 14. Threats and Vulnerabilities
  • 1. Threats and Vulnerabilities (OBJ. 2.4)
  • 2. CIA Triad (OBJ. 2.4)
  • 3. Vulnerabilities (OBJ. 2.4)
  • 4. Zero-day Attack (OBJ. 2.4)
  • 5. DoS and DDoS (OBJ. 2.4)
  • 6. Spoofing (OBJ. 2.4)
  • 7. On-path Attack (OBJ. 2.4)
  • 8. SQL Injection (OBJ. 2.4)
  • 9. XSS and XSRF (OBJ. 2.4)
  • 10. Password Cracking (OBJ. 2.4)
  • 11. Insider Threat (OBJ. 2.4)

  • 15. Malware
  • 1. Malware (OBJ. 2.3)
  • 2. Viruses, Worms, and Trojans (OBJ. 2.3)
  • 3. Viruses and Trojans (OBJ. 2.3)
  • 4. Ransomware (OBJ. 2.3)
  • 5. Spyware (OBJ. 2.3)
  • 6. Rootkits (OBJ. 2.3)
  • 7. Botnets and Zombies (OBJ. 2.3)
  • 8. Symptoms of Infection (OBJ. 2.3)
  • 9. Removing Malware (OBJ. 3.3)
  • 10. Preventing Malware (OBJ. 2.3)

  • 16. Social Engineering
  • 1. Social Engineering (OBJ. 2.3 & 2.4)
  • 2. Phishing Attacks (OBJ. 2.4)
  • 3. Anti-phishing Training (OBJ. 2.3)
  • 4. Spam (OBJ. 2.3)
  • 5. Impersonation (OBJ. 2.4)
  • 6. Pretexting (OBJ. 2.4)
  • 7. Social Engineering Attacks (OBJ. 2.4)
  • 8. Evil Twin (OBJ. 2.4)
  • 9. Software Firewalls (OBJ. 2.3)
  • 10. Using Software Firewalls (OBJ. 2.3)
  • 11. User Education (OBJ. 2.3)

  • 17. Security Controls
  • 1. Security Controls (OBJ. 2.1)
  • 2. Perimeter Defense (OBJ. 2.1)
  • 3. Surveillance (OBJ. 2.1)
  • 4. Physical Access Controls (OBJ. 2.1)
  • 5. Security Principles (OBJ. 2.1)
  • 6. Multifactor Authentication (OBJ. 2.1)
  • 7. Mobile Device Management (OBJ. 2.1)
  • 8. Active Directory Security (OBJ. 2.1)

  • 18. Wireless Security
  • 1. Wireless Security (OBJ. 2.2 & 2.9)
  • 2. Wireless Encryption (OBJ. 2.2)
  • 3. Cracking Wireless Networks (OBJ. 2.2)
  • 4. WPA3 (OBJ. 2.2)
  • 5. Wireless Authentication (OBJ. 2.2)
  • 6. Wireless Network Security (OBJ. 2.9)
  • 7. Configuring SOHO Networks (OBJ. 2.9)
  • 8. Securing Wireless Networks (OBJ. 2.9)
  • 9. Configuring SOHO Firewalls (OBJ. 2.9)

  • 19. Mobile Device Security
  • 1. Mobile Device Security (OBJ. 2.7)
  • 2. Securing Wireless Devices (OBJ. 2.7)
  • 3. Mobile Device Unlocking (OBJ. 2.7)
  • 4. Mobile Malware (OBJ. 2.7)
  • 5. Mobile Device Theft (OBJ. 2.7)
  • 6. Mobile App Security (OBJ. 2.7)
  • 7. Deployment Options (OBJ. 2.7)
  • 8. Hardening Mobile Devices (OBJ. 2.7)
  • 9. Implementing Mobile Device Security (OBJ. 2.7)
  • 10. IoT Vulnerabilities (OBJ. 2.7)

  • 20. Windows Security
  • 1. Windows Security (OBJ. 2.5)
  • 2. Login Options (OBJ. 2.5)
  • 3. Users and Groups (OBJ. 2.5)
  • 4. Encrypting Windows Devices (OBJ. 2.5)
  • 5. File Permissions (OBJ. 2.5)
  • 6. Microsoft Defender Antivirus (OBJ. 2.5)
  • 7. Microsoft Defender Firewall (OBJ. 2.5)

  • 21. Securing Workstations
  • 1. Securing Workstations (OBJ. 2.6 & 2.8)
  • 2. Account Management (OBJ. 2.6)
  • 3. AutoRun and AutoPlay (OBJ. 2.6)
  • 4. Password Best Practices (OBJ. 2.6)
  • 5. Encryption Best Practices (OBJ. 2.6)
  • 6. End-user Best Practices (OBJ. 2.6)
  • 7. Data Destruction (OBJ. 2.8)
  • 8. Data Destruction Methods (OBJ. 2.8)

  • 22. Securing Web Browsers
  • 1. Securing Web Browsers (OBJ. 2.10)
  • 2. Web Browser Installation (OBJ. 2.10)
  • 3. Extensions and Plug-ins (OBJ. 2.10)
  • 4. Password Managers (OBJ. 2.10)
  • 5. Encrypted Browsing (OBJ. 2.10)
  • 6. Private Browsing (OBJ. 2.10)
  • 7. Pop-up and Ad Blockers (OBJ. 2.10)
  • 8. Cache and History Clearing (OBJ. 2.10)
  • 9. Profile Synchronization (OBJ. 2.10)

  • 23. Supporting Network Operations
  • 1. Supporting Network Operations (OBJ. 4.1 & 4.2)
  • 2. Ticketing System (OBJ. 4.1)
  • 3. Using a Ticketing System (OBJ. 4.1)
  • 4. Knowledge Base Articles (OBJ. 4.1)
  • 5. Asset Management (OBJ. 4.1)
  • 6. Change Management (OBJ. 4.2)
  • 7. Conducting Change Management (OBJ. 4.2)
  • 8. Documentation Types (OBJ. 4.1)

  • 24. Backup, Recovery, and Safety
  • 1. Backup, Recovery, and Safety
  • 2. Backup and Recovery (OBJ. 4.3)
  • 3. Backup Schemes (OBJ. 4.3)
  • 4. Redundant Power (OBJ. 4.5)
  • 5. Electrical Safety (OBJ. 4.4)
  • 6. Component Handling and Storage (OBJ. 4.4)
  • 7. HVAC Systems (OBJ. 4.5)
  • 8. Proper Handling and Disposal (OBJ. 4.4 & 4.5)
  • 9. Personal Safety (OBJ. 4.4 & 4.5)

  • 25. Policy and Privacy Concepts
  • 1. Policy and Privacy Concepts (OBJ. 4.6)
  • 2. Incident Response (OBJ. 4.6)
  • 3. Chain of Custody (OBJ. 4.6)
  • 4. Order of Volatility (OBJ. 4.6)
  • 5. Data Collection Procedures (OBJ. 4.6)
  • 6. Conduct Disk Imaging (OBJ. 4.6)
  • 7. Licensing, EULA, and DRM (OBJ. 4.6)
  • 8. Data Classification (OBJ. 4.6)
  • 9. Data Retention (OBJ. 4.6)
  • 10. PII, PHI, and PCI-DSS (OBJ. 4.6)
  • 11. Security Policies (OBJ. 4.6)

  • 26. Scripting
  • 1. Scripting (OBJ. 4.8)
  • 2. Script File Types (OBJ. 4.8)
  • 3. Variables (OBJ. 4.8)
  • 4. Loops (OBJ. 4.8)
  • 5. Logic Control (OBJ. 4.8)
  • 6. Bash Script Example (OBJ. 4.8)
  • 7. Automation Scripting (OBJ. 4.8)
  • 8. Scripting Considerations (OBJ. 4.8)

  • 27. Remote Access Support
  • 1. Remote Access Support (OBJ. 4.9)
  • 2. Remote Access Protocols (OBJ. 4.9)
  • 3. Connecting to a VPN (OBJ. 4.9)
  • 4. Remote Monitoring and Management (RMM) (OBJ. 4.9)
  • 5. Microsoft Remote Assistance (MSRA) (OBJ. 4.9)
  • 6. Other Remote Access Tools (OBJ. 4.9)
  • 7. Desktop Management Software (OBJ. 4.9)

  • 28. Troubleshooting Windows
  • 1. Troubleshooting Windows (OBJ. 3.1)
  • 2. Boot Issues (OBJ. 3.1)
  • 3. Boot Recovery Tools (OBJ. 3.1)
  • 4. Update or Driver Rollback (OBJ. 3.1)
  • 5. System Restore (OBJ. 3.1)
  • 6. System Reinstall or Reimage (OBJ. 3.1)
  • 7. Performance Issues (OBJ. 3.1)
  • 8. System Fault Issues (OBJ. 3.1)
  • 9. System Instability Issues (OBJ. 3.1)
  • 10. Application and Service Issues (OBJ. 3.1)

  • 29. Troubleshooting Workstation Security
  • 1. Troubleshooting Workstation Security (OBJ. 3.2 & 3.3)
  • 2. Malware Removal Process (OBJ. 3.3)
  • 3. Infected Browser Symptoms (OBJ. 3.2)
  • 4. Alerts and Notifications (OBJ. 3.2)
  • 5. OS Update Failures (OBJ. 3.2)
  • 6. File System Issues (OBJ. 3.2)

  • 30. Troubleshooting Mobile Issues
  • 1. Troubleshooting Mobile Issues (OBJ. 3.4)
  • 2. Reseting or Rebooting (OBJ. 3.4)
  • 3. Mobile OS Update Failure (OBJ. 3.4)
  • 4. Mobile Performance Issues (OBJ. 3.4)
  • 5. Mobile App Issues (OBJ. 3.4)
  • 6. Mobile Connectivity Issues (OBJ. 3.4)
  • 7. Mobile Battery Issues (OBJ. 3.4)
  • 8. Screen Autorotation Issues (OBJ. 3.4)

  • 31. Troubleshooting Mobile Security
  • 1. Troubleshooting Mobile Security (OBJ. 3.5)
  • 2. Rooting and Jailbreaking (OBJ. 3.5)
  • 3. Sideloading Apps (OBJ. 3.5)
  • 4. Mobile Malware Symptoms (OBJ. 3.5)
  • 5. Unexpected Application Behavior (OBJ. 3.5)
  • 6. Leaked Mobile Data (OBJ. 3.5)

  • 32. Professionalism
  • 1. Professionalism (OBJ. 4.7)
  • 2. Professional Appearance (OBJ. 4.7)
  • 3. Respect Others Time (OBJ. 4.7)
  • 4. Proper Communication (OBJ. 4.7)
  • 5. Dealing with Private Data (OBJ. 4.7)
  • 6. Difficult Situations (OBJ. 4.7)

  • 33. Conclusion
  • 1. Conclusion
  • 2. Bonus Whats Next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 4969
    حجم: 4071 مگابایت
    مدت زمان: 2149 دقیقه
    تاریخ انتشار: 12 بهمن 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید