وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA A+ (220-1102) Online Training

سرفصل های دوره

This entry-level CompTIA A+ (220-1102) training prepares learners to work with, manage, and troubleshoot problems with common software and operating systems.

The A+ certification from CompTIA is one of the most well-known entry-level IT certifications in the world. The CompTIA A+ covers computer hardware, Windows and Unix-based operating systems, and networking fundamentals. Like other CompTIA certifications, the CompTIA A+ is vendor-agnostic, which means its lessons apply equally to any operating system or manufacturer.


1. Basic Features of Microsoft Windows Editions
  • 1. Basic Features of Microsoft Windows Editions
  • 2. Windows 10 Editions Overview
  • 3. Windows 10 Editions and Limits
  • 4. Upgrade Paths and Higher-Level Features

  • 2. Additional Windows Tools
  • 1. Configure Policy with Group Policy Editor
  • 2. Gather Data with System Information
  • 3. Manage Windows with System Configuration
  • 4. Optimize Storage with Disk Cleanup and Disk Defragment
  • 5. Edit the Registry

  • 3. Introducing the Command-Line, File and Disk Commands
  • 1. Introduction to the Command Line
  • 2. Navigation Commands
  • 3. Copy, Xcopy, and Robocopy
  • 4. Manage Disks with Diskpart and Format

  • 4. Networking, Policy, and Management Tools
  • 1. Learn IP Info with IPCONFIG
  • 2. Confirm Reachability with PING
  • 3. Identify Network Hops with Tracert and PathPing
  • 4. Identify Open Ports with Netstat
  • 5. Network Management with Additional Commands
  • 6. Implement Group Policy Commands
  • 7. Final Command-Line Commands

  • 5. Monitor Windows Performance and Events
  • 1. Task Manager
  • 2. Validate Resource Usage with Performance Monitor
  • 3. Spot Check Resources with Resource Monitor
  • 4. Identify Incidents in Event Viewer

  • 6. Administer Windows with Management Consoles
  • 1. Administer Storage with Disk Management
  • 2. Automate with Task Scheduler
  • 3. Administration with Device Manager
  • 4. Manage Certificates with Certificate Manager
  • 5. Manage Local Users and Groups

  • 7. Control Panel Internet, Printers, System, and Mail
  • 1. Internet Settings
  • 2. Devices and Printers, Programs and Features
  • 3. Configure System Settings
  • 4. Control Panel Views and Mail

  • 8. Control Panel - Firewall, Administrative Tools, Explorer, Power Options, and More!
  • 1. Understanding Firewall Concepts
  • 2. Configuring Windows Defender Firewall
  • 3. Configure Sound Settings
  • 4. Manage Indexing Options
  • 5. Provide Assistance with Ease of Access
  • 6. Access Administrative Tools and Set File Explorer Options
  • 7. Choose Power Options

  • 9. Manage Windows Settings
  • 1. Set Gaming and Personalization Preferences
  • 2. Configure Date, Time, and Language
  • 3. Configure Update and Security Settings
  • 4. Configure Apps
  • 5. Set Privacy Preferences
  • 6. Use a Microsoft Account

  • 10. Configure Windows Networking Features
  • 1. Benefit from Domain vs Workgroup Resources
  • 2. Configure Local OS Firewall Settings
  • 3. Client Network Configuration
  • 4. Differentiate Public and Private IP Addresses
  • 5. Establish Network Connections

  • 11. Application Installation and Configuration
  • 1. 32-Bit vs 64-Bit Applications
  • 2. Evaluate Application System Requirements
  • 3. Examples of System Requirements
  • 4. Software Distribution Methods
  • 5. Create and Use Media
  • 6. Consider Application Impact

  • 12. Common OS Types
  • 1. Workstation Operating System Overview
  • 2. Navigate the Mac OS
  • 3. Navigate Linux and Chromebook
  • 4. Navigate the Android OS
  • 5. Navigate iOS and iPadOS
  • 6. Identify ext3, ext4, APFS and Compatibility
  • 7. End-of-Life and Update Considerations

  • 13. Perform an OS Installation and Upgrade
  • 1. Local OS Installation Methods
  • 2. Network OS Installation Methods
  • 3. Install Using Windows Deployment Services
  • 4. Perform a Clean Installation
  • 5. Perform and Upgrade
  • 6. Implement a Repair Installation
  • 7. Access Recovery Partitions and Images
  • 8. Implement MBR and GPT Disks

  • 14. Features and Tools of the macOS
  • 1. Get Acquainted with the macOS
  • 2. Manage macOS Apps
  • 3. Authenticate with Apple ID
  • 4. Backup with Time Machine Backup
  • 5. Protect Your Mac with Antivirus and Updates
  • 6. Adjust System Preferences
  • 7. Configure Features
  • 8. Implement Disk Management

  • 15. Summarize Security Measures and Their Purposes
  • 1. Intro to Security Measures and Their Purposes
  • 2. Security Overview
  • 3. Multi-Factor Authentication (MFA)
  • 4. Physical SecurityControls
  • 5. Logical SecurityControls
  • 6. Administrative SecurityControls
  • 7. Active Directory SSO

  • 16. Compare and Contrast Wireless Security and Authentication Methods
  • 1. Intro to Wireless Security and Authentication Methods
  • 2. Wireless Security and Authentication Methods Overview
  • 3. WPA2 Personal
  • 4. WPA3 Personal
  • 5. Enterprise Authentication
  • 6. Open Authentication and OWE

  • 17. Detect, Remove, and Prevent Malware
  • 1. Intro to Detect, Remove, and Prevent Malware
  • 2. Malware Overview
  • 3. Detecting Malware
  • 4. Removing Malware
  • 5. Malware Prevention
  • 6. End User Education

  • 18. Explain Common Social-engineering Attacks, Threats, and Vulnerabilities
  • 1. Intro to Social Engineering Attacks, Threats, and Vulnerabilities
  • 2. Attacks, Threats, & Vulnerabilities Overview
  • 3. Phishing Attacks
  • 4. Wi-Fi Evil Twin
  • 5. Dealing with Social-Engineering Attacks
  • 6. Tools of the Attacker

  • 19. Configure Windows for Security
  • 1. Intro to Configure Windows for Security
  • 2. Overview of Windows Security
  • 3. MS Defender Antivirus
  • 4. Windows Defender Firewall
  • 5. Users and Groups
  • 6. Login Options
  • 7. NTFS Security and Sharing
  • 8. BitLocker and EFS

  • 20. Explain Methods for Securing Mobile Devices
  • 1. Intro to Securing Mobile Devices
  • 2. Securing Mobile Devices Overview
  • 3. Login and Locking
  • 4. Locator Apps & Remote Wipe
  • 5. Backups and Encryption
  • 6. BYOD and More
  • 7. MDM Solutions
  • 8. Internet of Things

  • 21. Use Data Destruction and Disposal Methods
  • 1. Intro to Data Destruction and Disposal Methods
  • 2. Data Destruction and Disposal Methods Overview
  • 3. Data Disposal on Hard Disks
  • 4. Shredding
  • 5. Degaussing
  • 6. Incinerating
  • 7. Outsourcing Data Destruction and Disposal

  • 22. Configure Security for a SOHO Network
  • 1. Intro to Configure Security for a SOHO Network
  • 2. Small Network Implementation and Security Overview
  • 3. Initial Router Configuration and Firmware Update
  • 4. Wireless Settings and Security
  • 5. Firewall Settings

  • 23. Configure Browser Security
  • 1. Intro to Browser Security
  • 2. Browser & Security Overview
  • 3. Installing a New Browser
  • 4. Digital Certificates
  • 5. Extensions and Plugins
  • 6. Password Managers
  • 7. Common Browser Settings

  • 24. Troubleshoot Common Windows OS Problems
  • 1. Analyze a Blue Screen of Death (BSOD)
  • 2. Troubleshoot Sluggish Performance
  • 3. Troubleshoot Boot Problems
  • 4. Frequent Shutdowns
  • 5. Resolve Application Crashes
  • 6. Resolve Additional Windows Problems
  • 7. Implement Common Troubleshooting Steps

  • 25. Common PC Security Issues and Malware Removal Procedures
  • 1. Security Issues Network Access and Alerts
  • 2. Security Issues Altered Files, Unwanted Notifications, and Update Failure
  • 3. Implement Malware Removal Containment
  • 4. Manage System Restore and Remediation
  • 5. Prevent Future Malware Infection

  • 26. Troubleshoot Common Mobile OS Application and Security Issues
  • 1. Resolve Mobile OS Application Problems
  • 2. Resolve Update Problems
  • 3. Mitigate Battery Life Issues
  • 4. Optimize Performance and Troubleshoot Reboots
  • 5. Troubleshoot Autorotation and Connectivity
  • 6. Mobile Apps and Security

  • 27. Understand Communication and Documentation Best Practices
  • 1. Introducing Effective Communication
  • 2. Network Documentation
  • 3. Wikis and Knowledgebases
  • 4. Regulatory Issues and Documents
  • 5. I.T. Policies
  • 6. Incident Response Documents
  • 7. Effective Communication Techniques
  • 8. Professional Behaviors

  • 28. Explain Change Management, Backup, and Recovery
  • 1. Introducing Change Management and Backups
  • 2. Before the Change
  • 3. During and After the Change
  • 4. Types of Backups
  • 5. Backup Methods
  • 6. Backup Media
  • 7. Restoration Objectives

  • 29. Understand Common Safety and Environmental Procedures
  • 1. Introducing Common Safety Procedures
  • 2. Computer Component Hazards
  • 3. Electrostatic Discharge Safety
  • 4. Electromagnetic Interference
  • 5. Workplace Safety Procedures
  • 6. Common I.T. Toolkits
  • 7. Equipment Disposal
  • 8. Power Management

  • 30. Understand Scripting Basics
  • 1. Introducing Scripting Basics
  • 2. Installing Python and VS Code
  • 3. Hello, World
  • 4. Variables
  • 5. Basic Data Types
  • 6. Complex Data Types
  • 7. Loops
  • 8. Conditionals
  • 9. Modules

  • 31. Understand Remote Access Technologies and Tools
  • 1. Introducing Remote Access Technologies
  • 2. Remote Desktop Protocol
  • 3. VNC
  • 4. Telnet
  • 5. Secure Shell (SSH)
  • 6. Remote Access Tools
  • 7. Summarizing Remote Access
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6696
    حجم: 29181 مگابایت
    مدت زمان: 1688 دقیقه
    تاریخ انتشار: 8 اسفند 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید