وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
8

CompTIA A+ (220-1102) Online Training

سرفصل های دوره

This entry-level CompTIA A+ (220-1102) training prepares learners to work with, manage, and troubleshoot problems with common software and operating systems.

The A+ certification from CompTIA is one of the most well-known entry-level IT certifications in the world. The CompTIA A+ covers computer hardware, Windows and Unix-based operating systems, and networking fundamentals. Like other CompTIA certifications, the CompTIA A+ is vendor-agnostic, which means its lessons apply equally to any operating system or manufacturer.


1. Basic Features of Microsoft Windows Editions
  • 1. Basic Features of Microsoft Windows Editions
  • 2. Windows 10 Editions Overview
  • 3. Windows 10 Editions and Limits
  • 4. Upgrade Paths and Higher-Level Features

  • 2. Additional Windows Tools
  • 1. Configure Policy with Group Policy Editor
  • 2. Gather Data with System Information
  • 3. Manage Windows with System Configuration
  • 4. Optimize Storage with Disk Cleanup and Disk Defragment
  • 5. Edit the Registry

  • 3. Introducing the Command-Line, File and Disk Commands
  • 1. Introduction to the Command Line
  • 2. Navigation Commands
  • 3. Copy, Xcopy, and Robocopy
  • 4. Manage Disks with Diskpart and Format

  • 4. Networking, Policy, and Management Tools
  • 1. Learn IP Info with IPCONFIG
  • 2. Confirm Reachability with PING
  • 3. Identify Network Hops with Tracert and PathPing
  • 4. Identify Open Ports with Netstat
  • 5. Network Management with Additional Commands
  • 6. Implement Group Policy Commands
  • 7. Final Command-Line Commands

  • 5. Monitor Windows Performance and Events
  • 1. Task Manager
  • 2. Validate Resource Usage with Performance Monitor
  • 3. Spot Check Resources with Resource Monitor
  • 4. Identify Incidents in Event Viewer

  • 6. Administer Windows with Management Consoles
  • 1. Administer Storage with Disk Management
  • 2. Automate with Task Scheduler
  • 3. Administration with Device Manager
  • 4. Manage Certificates with Certificate Manager
  • 5. Manage Local Users and Groups

  • 7. Control Panel Internet, Printers, System, and Mail
  • 1. Internet Settings
  • 2. Devices and Printers, Programs and Features
  • 3. Configure System Settings
  • 4. Control Panel Views and Mail

  • 8. Control Panel - Firewall, Administrative Tools, Explorer, Power Options, and More!
  • 1. Understanding Firewall Concepts
  • 2. Configuring Windows Defender Firewall
  • 3. Configure Sound Settings
  • 4. Manage Indexing Options
  • 5. Provide Assistance with Ease of Access
  • 6. Access Administrative Tools and Set File Explorer Options
  • 7. Choose Power Options

  • 9. Manage Windows Settings
  • 1. Set Gaming and Personalization Preferences
  • 2. Configure Date, Time, and Language
  • 3. Configure Update and Security Settings
  • 4. Configure Apps
  • 5. Set Privacy Preferences
  • 6. Use a Microsoft Account

  • 10. Configure Windows Networking Features
  • 1. Benefit from Domain vs Workgroup Resources
  • 2. Configure Local OS Firewall Settings
  • 3. Client Network Configuration
  • 4. Differentiate Public and Private IP Addresses
  • 5. Establish Network Connections

  • 11. Application Installation and Configuration
  • 1. 32-Bit vs 64-Bit Applications
  • 2. Evaluate Application System Requirements
  • 3. Examples of System Requirements
  • 4. Software Distribution Methods
  • 5. Create and Use Media
  • 6. Consider Application Impact

  • 12. Common OS Types
  • 1. Workstation Operating System Overview
  • 2. Navigate the Mac OS
  • 3. Navigate Linux and Chromebook
  • 4. Navigate the Android OS
  • 5. Navigate iOS and iPadOS
  • 6. Identify ext3, ext4, APFS and Compatibility
  • 7. End-of-Life and Update Considerations

  • 13. Perform an OS Installation and Upgrade
  • 1. Local OS Installation Methods
  • 2. Network OS Installation Methods
  • 3. Install Using Windows Deployment Services
  • 4. Perform a Clean Installation
  • 5. Perform and Upgrade
  • 6. Implement a Repair Installation
  • 7. Access Recovery Partitions and Images
  • 8. Implement MBR and GPT Disks

  • 14. Features and Tools of the macOS
  • 1. Get Acquainted with the macOS
  • 2. Manage macOS Apps
  • 3. Authenticate with Apple ID
  • 4. Backup with Time Machine Backup
  • 5. Protect Your Mac with Antivirus and Updates
  • 6. Adjust System Preferences
  • 7. Configure Features
  • 8. Implement Disk Management

  • 15. Summarize Security Measures and Their Purposes
  • 1. Intro to Security Measures and Their Purposes
  • 2. Security Overview
  • 3. Multi-Factor Authentication (MFA)
  • 4. Physical SecurityControls
  • 5. Logical SecurityControls
  • 6. Administrative SecurityControls
  • 7. Active Directory SSO

  • 16. Compare and Contrast Wireless Security and Authentication Methods
  • 1. Intro to Wireless Security and Authentication Methods
  • 2. Wireless Security and Authentication Methods Overview
  • 3. WPA2 Personal
  • 4. WPA3 Personal
  • 5. Enterprise Authentication
  • 6. Open Authentication and OWE

  • 17. Detect, Remove, and Prevent Malware
  • 1. Intro to Detect, Remove, and Prevent Malware
  • 2. Malware Overview
  • 3. Detecting Malware
  • 4. Removing Malware
  • 5. Malware Prevention
  • 6. End User Education

  • 18. Explain Common Social-engineering Attacks, Threats, and Vulnerabilities
  • 1. Intro to Social Engineering Attacks, Threats, and Vulnerabilities
  • 2. Attacks, Threats, & Vulnerabilities Overview
  • 3. Phishing Attacks
  • 4. Wi-Fi Evil Twin
  • 5. Dealing with Social-Engineering Attacks
  • 6. Tools of the Attacker

  • 19. Configure Windows for Security
  • 1. Intro to Configure Windows for Security
  • 2. Overview of Windows Security
  • 3. MS Defender Antivirus
  • 4. Windows Defender Firewall
  • 5. Users and Groups
  • 6. Login Options
  • 7. NTFS Security and Sharing
  • 8. BitLocker and EFS

  • 20. Explain Methods for Securing Mobile Devices
  • 1. Intro to Securing Mobile Devices
  • 2. Securing Mobile Devices Overview
  • 3. Login and Locking
  • 4. Locator Apps & Remote Wipe
  • 5. Backups and Encryption
  • 6. BYOD and More
  • 7. MDM Solutions
  • 8. Internet of Things

  • 21. Use Data Destruction and Disposal Methods
  • 1. Intro to Data Destruction and Disposal Methods
  • 2. Data Destruction and Disposal Methods Overview
  • 3. Data Disposal on Hard Disks
  • 4. Shredding
  • 5. Degaussing
  • 6. Incinerating
  • 7. Outsourcing Data Destruction and Disposal

  • 22. Configure Security for a SOHO Network
  • 1. Intro to Configure Security for a SOHO Network
  • 2. Small Network Implementation and Security Overview
  • 3. Initial Router Configuration and Firmware Update
  • 4. Wireless Settings and Security
  • 5. Firewall Settings

  • 23. Configure Browser Security
  • 1. Intro to Browser Security
  • 2. Browser & Security Overview
  • 3. Installing a New Browser
  • 4. Digital Certificates
  • 5. Extensions and Plugins
  • 6. Password Managers
  • 7. Common Browser Settings

  • 24. Troubleshoot Common Windows OS Problems
  • 1. Analyze a Blue Screen of Death (BSOD)
  • 2. Troubleshoot Sluggish Performance
  • 3. Troubleshoot Boot Problems
  • 4. Frequent Shutdowns
  • 5. Resolve Application Crashes
  • 6. Resolve Additional Windows Problems
  • 7. Implement Common Troubleshooting Steps

  • 25. Common PC Security Issues and Malware Removal Procedures
  • 1. Security Issues Network Access and Alerts
  • 2. Security Issues Altered Files, Unwanted Notifications, and Update Failure
  • 3. Implement Malware Removal Containment
  • 4. Manage System Restore and Remediation
  • 5. Prevent Future Malware Infection

  • 26. Troubleshoot Common Mobile OS Application and Security Issues
  • 1. Resolve Mobile OS Application Problems
  • 2. Resolve Update Problems
  • 3. Mitigate Battery Life Issues
  • 4. Optimize Performance and Troubleshoot Reboots
  • 5. Troubleshoot Autorotation and Connectivity
  • 6. Mobile Apps and Security

  • 27. Understand Communication and Documentation Best Practices
  • 1. Introducing Effective Communication
  • 2. Network Documentation
  • 3. Wikis and Knowledgebases
  • 4. Regulatory Issues and Documents
  • 5. I.T. Policies
  • 6. Incident Response Documents
  • 7. Effective Communication Techniques
  • 8. Professional Behaviors

  • 28. Explain Change Management, Backup, and Recovery
  • 1. Introducing Change Management and Backups
  • 2. Before the Change
  • 3. During and After the Change
  • 4. Types of Backups
  • 5. Backup Methods
  • 6. Backup Media
  • 7. Restoration Objectives

  • 29. Understand Common Safety and Environmental Procedures
  • 1. Introducing Common Safety Procedures
  • 2. Computer Component Hazards
  • 3. Electrostatic Discharge Safety
  • 4. Electromagnetic Interference
  • 5. Workplace Safety Procedures
  • 6. Common I.T. Toolkits
  • 7. Equipment Disposal
  • 8. Power Management

  • 30. Understand Scripting Basics
  • 1. Introducing Scripting Basics
  • 2. Installing Python and VS Code
  • 3. Hello, World
  • 4. Variables
  • 5. Basic Data Types
  • 6. Complex Data Types
  • 7. Loops
  • 8. Conditionals
  • 9. Modules

  • 31. Understand Remote Access Technologies and Tools
  • 1. Introducing Remote Access Technologies
  • 2. Remote Desktop Protocol
  • 3. VNC
  • 4. Telnet
  • 5. Secure Shell (SSH)
  • 6. Remote Access Tools
  • 7. Summarizing Remote Access
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6696
    حجم: 29181 مگابایت
    مدت زمان: 1688 دقیقه
    تاریخ انتشار: ۸ اسفند ۱۴۰۱
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید