CompTIA A+ Certification Exam: Core 2 Video Course

220-1102: CompTIA A+ Certification Exam: Core 2

Your CompTIA 220-1102 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the 220-1102 certification test. Ace your CompTIA 220-1102 at the first attempt and obtain the CompTIA A+ Certification Exam: Core 2 credential with ease.

# of Students
87
# of Lectures
296
Course Length
11 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for 220-1102 Video Course

Introduction

  Video Name Time
  1. Welcome 13:00
  Video Name Time
  1. Operating System Types (OBJ. 1.8) 7:55
  2. Windows (OBJ. 1.8) 7:41
  3. Linux (OBJ. 1.8) 9:03
  4. Android (OBJ. 1.8) 4:12
  5. Chrome OS (OBJ. 1.8) 5:32
  6. macOS (OBJ. 1.8) 3:04
  7. iOS and iPadOS (OBJ. 1.8) 4:21
  8. Operating Systems (OBJ. 1.8) 18:10
  9. Filesystem Types (OBJ. 1.8) 12:53
  10. Compatibility Concerns (OBJ. 1.8) 7:02
  Video Name Time
  1. Windows Versions (OBJ. 1.1 & 1.7) 1:58
  2. 64-bit vs 32-bit Versions (OBJ. 1.7) 4:29
  3. Windows Home (OBJ. 1.1) 6:19
  4. Windows Pro (OBJ. 1.1) 8:27
  5. Windows Enterprise and Education (OBJ. 1.1) 6:03
  6. Upgrading Windows (OBJ. 1.1) 5:01
  7. In-place Upgrade (OBJ. 1.1) 8:52
  Video Name Time
  1. Windows Installation (OBJ. 1.9) 2:34
  2. Installation Types (OBJ. 1.9) 8:29
  3. Upgrade Considerations (OBJ. 1.9) 6:40
  4. Product Lifecycle (OBJ. 1.9) 6:04
  5. Boot Methods (OBJ. 1.9) 5:34
  6. Partitioning Storage Devices (OBJ. 1.9) 7:28
  7. Recovery and Reset (OBJ. 1.9) 5:20
  8. Using a Recovery Partition (OBJ. 1.9) 10:45
  Video Name Time
  1. Application Configuration (OBJ. 1.7) 2:41
  2. Application Requirements (OBJ. 1.7) 8:43
  3. Distribution Methods (OBJ. 1.7) 9:27
  4. Business Impacts (OBJ. 1.7) 7:03
  5. Operational Impacts (OBJ. 1.7) 3:15
  6. Device Impacts (OBJ. 1.7) 3:29
  7. Network Impacts (OBJ. 1.7) 3:36
  8. Installing Applications (OBJ. 1.7) 19:47
  Video Name Time
  1. Windows Networking (OBJ. 1.6) 3:56
  2. Wired Connections (OBJ. 1.6) 8:10
  3. Wireless Connections (OBJ. 1.6) 6:53
  4. WWAN Connections (OBJ. 1.6) 6:17
  5. VPN Connections (OBJ. 1.6) 4:27
  6. Network Client Configuration (OBJ. 1.6) 6:45
  7. Network Locations (OBJ. 1.6) 8:37
  8. Proxy Settings (OBJ. 1.6) 5:08
  Video Name Time
  1. Windows Control Panel (OBJ. 1.4) 6:19
  2. Account Settings (OBJ. 1.4) 12:36
  3. Programs and Features (OBJ. 1.4) 5:28
  4. Devices and Printers (OBJ. 1.4) 8:42
  5. Internet Options (OBJ. 1.4) 9:02
  6. Network and Sharing Center (OBJ. 1.4) 8:10
  7. Windows Defender Firewall (OBJ. 1.4) 9:18
  8. Mail (OBJ. 1.4) 8:02
  9. Sound (OBJ. 1.4) 9:02
  10. System (OBJ. 1.4) 11:28
  11. Device Manager (OBJ. 1.4) 5:10
  12. Administrative Tools (OBJ. 1.4) 3:26
  13. Indexing Options (OBJ. 1.4) 4:27
  14. File Explorer Options (OBJ. 1.4) 7:12
  15. Power Options (OBJ. 1.4) 7:23
  16. Ease of Access (OBJ. 1.4) 3:05
  Video Name Time
  1. Windows Settings (OBJ. 1.5) 4:41
  2. Accounts (OBJ. 1.5) 5:46
  3. System Settings (OBJ. 1.5) 7:26
  4. Update and Security (OBJ. 1.5) 7:27
  5. Network and Internet (OBJ. 1.5) 4:35
  6. Devices (OBJ. 1.5) 4:29
  7. Privacy (OBJ. 1.5) 5:37
  8. Time and Language (OBJ. 1.5) 6:48
  9. Personalization (OBJ. 1.5) 7:13
  10. Apps (OBJ. 1.5) 6:37
  11. Gaming (OBJ. 1.5) 4:33
  Video Name Time
  1. Windows Tools (OBJ. 1.3) 4:58
  2. Task Manager (OBJ. 1.3) 9:06
  3. Device Manager (OBJ. 1.3) 7:51
  4. Disk Management Console (OBJ. 1.3) 10:28
  5. Disk Maintenance Tools (OBJ. 1.3) 8:51
  6. Task Scheduler (OBJ. 1.3) 9:49
  7. Event Viewer (OBJ. 1.3) 8:33
  8. Performance Monitor (OBJ. 1.3) 10:09
  9. Local Users and Groups (OBJ. 1.3) 6:40
  10. Group Policy Editor (OBJ. 1.3) 9:58
  11. Certificate Manager (OBJ. 1.3) 3:44
  12. System Information (OBJ. 1.3) 5:01
  13. Resource Monitor (OBJ. 1.3) 4:04
  14. System Configuration (OBJ. 1.3) 6:43
  15. Registry Editor (OBJ. 1.3) 9:00
  16. Microsoft Management Console (OBJ. 1.3) 3:50
  Video Name Time
  1. Windows Command Line Tools (OBJ. 1.2) 8:05
  2. Using the GUI (OBJ. 1.2) 10:28
  3. Using the Command Prompt (OBJ. 1.2) 10:28
  4. Navigation Commands (OBJ. 1.2) 12:12
  5. Copying Commands (OBJ. 1.2) 5:46
  6. Disk Management Commands (OBJ. 1.2) 10:51
  7. Shutdown (OBJ. 1.2) 3:35
  8. System File Checker (OBJ. 1.2) 2:41
  9. Windows Version (OBJ. 1.2) 3:07
  10. Network Troubleshooting Commands (OBJ. 1.2) 15:46
  11. Name Resolution Commands (OBJ. 1.2) 4:18
  12. The netstat Command (OBJ. 1.2) 5:33
  13. Group Policy Commands (OBJ. 1.2) 4:33
  Video Name Time
  1. Windows Shares (OBJ. 1.2, 1.6, & 2.5) 3:22
  2. Workgroups and Domains (OBJ. 1.6) 7:48
  3. File Sharing (OBJ. 2.5) 9:06
  4. NTFS Permissions (OBJ. 2.5) 10:48
  5. Mapping Drives (OBJ. 1.6) 4:54
  6. The net Command (OBJ. 1.2) 8:18
  7. User Data on Domains (OBJ. 1.6) 10:34
  8. Printer Sharing (OBJ. 1.6) 3:41
  Video Name Time
  1. macOS (OBJ. 1.10) 6:42
  2. Finder, Dock, and Spotlight (OBJ. 1.10) 16:30
  3. Mission Control (OBJ. 1.10) 4:39
  4. Terminal (OBJ. 1.10) 5:24
  5. Disk Utility (OBJ. 1.10) 6:19
  6. File Vault (OBJ. 1.10) 2:48
  7. Remote Disc (OBJ. 1.10) 1:59
  8. Gestures (OBJ. 1.10) 8:21
  9. Keychain (OBJ. 1.10) 3:43
  10. iCloud and Apple ID (OBJ. 1.10) 5:56
  11. System Preferences (OBJ. 1.10) 18:24
  12. Managing macOS Applications (OBJ. 1.10) 9:33
  13. Best Practices for macOS (OBJ. 1.10) 7:59
  Video Name Time
  1. Linux (OBJ. 1.11) 9:51
  2. Shells and Terminals (OBJ. 1.11) 3:45
  3. Linux Navigation (OBJ. 1.11) 10:37
  4. File Management Commands (OBJ. 1.11) 11:31
  5. Disk Usage Commands (OBJ. 1.11) 5:14
  6. Text Manipulation (OBJ. 1.11) 11:41
  7. Search Commands (OBJ. 1.11) 6:26
  8. User Management (OBJ. 1.11) 9:36
  9. File Permission Commands (OBJ. 1.11) 7:21
  10. Application Management (OBJ. 1.11) 8:26
  11. Resource Management Commands (OBJ. 1.11) 6:26
  12. Networking Commands (OBJ. 1.11) 6:37
  13. Getting Help in Linux (OBJ. 1.11) 3:23
  14. Best Practices for Linux (OBJ. 1.11) 7:13
  Video Name Time
  1. Threats and Vulnerabilities (OBJ. 2.4) 14:14
  2. CIA Triad (OBJ. 2.4) 6:59
  3. Vulnerabilities (OBJ. 2.4) 8:45
  4. Zero-day Attack (OBJ. 2.4) 5:03
  5. DoS and DDoS (OBJ. 2.4) 8:02
  6. Spoofing (OBJ. 2.4) 4:17
  7. On-path Attack (OBJ. 2.4) 3:58
  8. SQL Injection (OBJ. 2.4) 6:06
  9. XSS and XSRF (OBJ. 2.4) 3:03
  10. Password Cracking (OBJ. 2.4) 8:19
  11. Insider Threat (OBJ. 2.4) 3:13
  Video Name Time
  1. Malware (OBJ. 2.3) 2:28
  2. Viruses, Worms, and Trojans (OBJ. 2.3) 11:21
  3. Viruses and Trojans (OBJ. 2.3) 6:16
  4. Ransomware (OBJ. 2.3) 2:30
  5. Spyware (OBJ. 2.3) 2:38
  6. Rootkits (OBJ. 2.3) 3:29
  7. Botnets and Zombies (OBJ. 2.3) 3:30
  8. Symptoms of Infection (OBJ. 2.3) 4:10
  9. Removing Malware (OBJ. 3.3) 5:02
  10. Preventing Malware (OBJ. 2.3) 5:50
  Video Name Time
  1. Social Engineering (OBJ. 2.3 & 2.4) 3:23
  2. Phishing Attacks (OBJ. 2.4) 12:12
  3. Anti-phishing Training (OBJ. 2.3) 5:19
  4. Spam (OBJ. 2.3) 2:56
  5. Impersonation (OBJ. 2.4) 4:03
  6. Pretexting (OBJ. 2.4) 4:14
  7. Social Engineering Attacks (OBJ. 2.4) 4:23
  8. Evil Twin (OBJ. 2.4) 4:43
  9. Software Firewalls (OBJ. 2.3) 4:15
  10. Using Software Firewalls (OBJ. 2.3) 6:30
  11. User Education (OBJ. 2.3) 4:43
  Video Name Time
  1. Security Controls (OBJ. 2.1) 5:47
  2. Perimeter Defense (OBJ. 2.1) 5:56
  3. Surveillance (OBJ. 2.1) 7:05
  4. Physical Access Controls (OBJ. 2.1) 13:25
  5. Security Principles (OBJ. 2.1) 11:18
  6. Multifactor Authentication (OBJ. 2.1) 8:23
  7. Mobile Device Management (OBJ. 2.1) 8:16
  8. Active Directory Security (OBJ. 2.1) 9:07
  Video Name Time
  1. Wireless Security (OBJ. 2.2 & 2.9) 3:10
  2. Wireless Encryption (OBJ. 2.2) 5:21
  3. Cracking Wireless Networks (OBJ. 2.2) 7:39
  4. WPA3 (OBJ. 2.2) 7:18
  5. Wireless Authentication (OBJ. 2.2) 9:57
  6. Wireless Network Security (OBJ. 2.9) 9:31
  7. Configuring SOHO Networks (OBJ. 2.9) 26:28
  8. Securing Wireless Networks (OBJ. 2.9) 13:42
  9. Configuring SOHO Firewalls (OBJ. 2.9) 8:48
  Video Name Time
  1. Mobile Device Security (OBJ. 2.7) 2:03
  2. Securing Wireless Devices (OBJ. 2.7) 4:59
  3. Mobile Device Unlocking (OBJ. 2.7) 8:59
  4. Mobile Malware (OBJ. 2.7) 6:19
  5. Mobile Device Theft (OBJ. 2.7) 3:10
  6. Mobile App Security (OBJ. 2.7) 5:06
  7. Deployment Options (OBJ. 2.7) 7:09
  8. Hardening Mobile Devices (OBJ. 2.7) 3:49
  9. Implementing Mobile Device Security (OBJ. 2.7) 15:39
  10. IoT Vulnerabilities (OBJ. 2.7) 7:10
  Video Name Time
  1. Windows Security (OBJ. 2.5) 2:36
  2. Login Options (OBJ. 2.5) 9:23
  3. Users and Groups (OBJ. 2.5) 10:10
  4. Encrypting Windows Devices (OBJ. 2.5) 5:52
  5. File Permissions (OBJ. 2.5) 7:50
  6. Microsoft Defender Antivirus (OBJ. 2.5) 7:07
  7. Microsoft Defender Firewall (OBJ. 2.5) 8:28
  Video Name Time
  1. Securing Workstations (OBJ. 2.6 & 2.8) 3:17
  2. Account Management (OBJ. 2.6) 14:08
  3. AutoRun and AutoPlay (OBJ. 2.6) 5:11
  4. Password Best Practices (OBJ. 2.6) 10:32
  5. Encryption Best Practices (OBJ. 2.6) 7:27
  6. End-user Best Practices (OBJ. 2.6) 6:46
  7. Data Destruction (OBJ. 2.8) 5:04
  8. Data Destruction Methods (OBJ. 2.8) 12:32
  Video Name Time
  1. Securing Web Browsers (OBJ. 2.10) 3:17
  2. Web Browser Installation (OBJ. 2.10) 7:26
  3. Extensions and Plug-ins (OBJ. 2.10) 9:35
  4. Password Managers (OBJ. 2.10) 10:29
  5. Encrypted Browsing (OBJ. 2.10) 3:59
  6. Private Browsing (OBJ. 2.10) 6:00
  7. Pop-up and Ad Blockers (OBJ. 2.10) 7:01
  8. Cache and History Clearing (OBJ. 2.10) 5:26
  9. Profile Synchronization (OBJ. 2.10) 4:35
  Video Name Time
  1. Supporting Network Operations (OBJ. 4.1 & 4.2) 2:57
  2. Ticketing System (OBJ. 4.1) 18:56
  3. Using a Ticketing System (OBJ. 4.1) 5:20
  4. Knowledge Base Articles (OBJ. 4.1) 7:20
  5. Asset Management (OBJ. 4.1) 13:02
  6. Change Management (OBJ. 4.2) 10:57
  7. Conducting Change Management (OBJ. 4.2) 13:48
  8. Documentation Types (OBJ. 4.1) 13:09
  Video Name Time
  1. Backup, Recovery, and Safety 3:06
  2. Backup and Recovery (OBJ. 4.3) 11:07
  3. Backup Schemes (OBJ. 4.3) 13:50
  4. Redundant Power (OBJ. 4.5) 6:04
  5. Electrical Safety (OBJ. 4.4) 4:57
  6. Component Handling and Storage (OBJ. 4.4) 5:46
  7. HVAC Systems (OBJ. 4.5) 5:43
  8. Proper Handling and Disposal (OBJ. 4.4 & 4.5) 9:00
  9. Personal Safety (OBJ. 4.4 & 4.5) 11:01
  Video Name Time
  1. Policy and Privacy Concepts (OBJ. 4.6) 2:44
  2. Incident Response (OBJ. 4.6) 4:16
  3. Chain of Custody (OBJ. 4.6) 7:04
  4. Order of Volatility (OBJ. 4.6) 6:28
  5. Data Collection Procedures (OBJ. 4.6) 3:11
  6. Conduct Disk Imaging (OBJ. 4.6) 9:06
  7. Licensing, EULA, and DRM (OBJ. 4.6) 11:35
  8. Data Classification (OBJ. 4.6) 2:47
  9. Data Retention (OBJ. 4.6) 6:53
  10. PII, PHI, and PCI-DSS (OBJ. 4.6) 5:56
  11. Security Policies (OBJ. 4.6) 10:14
  Video Name Time
  1. Scripting (OBJ. 4.8) 4:40
  2. Script File Types (OBJ. 4.8) 10:00
  3. Variables (OBJ. 4.8) 7:40
  4. Loops (OBJ. 4.8) 5:19
  5. Logic Control (OBJ. 4.8) 4:34
  6. Bash Script Example (OBJ. 4.8) 4:08
  7. Automation Scripting (OBJ. 4.8) 8:14
  8. Scripting Considerations (OBJ. 4.8) 6:34
  Video Name Time
  1. Remote Access Support (OBJ. 4.9) 3:09
  2. Remote Access Protocols (OBJ. 4.9) 11:54
  3. Connecting to a VPN (OBJ. 4.9) 1:36
  4. Remote Monitoring and Management (RMM) (OBJ. 4.9) 6:57
  5. Microsoft Remote Assistance (MSRA) (OBJ. 4.9) 11:03
  6. Other Remote Access Tools (OBJ. 4.9) 5:08
  7. Desktop Management Software (OBJ. 4.9) 3:11
  Video Name Time
  1. Troubleshooting Windows (OBJ. 3.1) 1:53
  2. Boot Issues (OBJ. 3.1) 12:51
  3. Boot Recovery Tools (OBJ. 3.1) 5:41
  4. Update or Driver Rollback (OBJ. 3.1) 5:26
  5. System Restore (OBJ. 3.1) 6:52
  6. System Reinstall or Reimage (OBJ. 3.1) 13:06
  7. Performance Issues (OBJ. 3.1) 16:59
  8. System Fault Issues (OBJ. 3.1) 3:52
  9. System Instability Issues (OBJ. 3.1) 6:22
  10. Application and Service Issues (OBJ. 3.1) 10:47
  Video Name Time
  1. Troubleshooting Workstation Security (OBJ. 3.2 & 3.3) 2:59
  2. Malware Removal Process (OBJ. 3.3) 13:39
  3. Infected Browser Symptoms (OBJ. 3.2) 10:08
  4. Alerts and Notifications (OBJ. 3.2) 3:45
  5. OS Update Failures (OBJ. 3.2) 3:34
  6. File System Issues (OBJ. 3.2) 3:19
  Video Name Time
  1. Troubleshooting Mobile Issues (OBJ. 3.4) 1:25
  2. Reseting or Rebooting (OBJ. 3.4) 6:10
  3. Mobile OS Update Failure (OBJ. 3.4) 5:31
  4. Mobile Performance Issues (OBJ. 3.4) 7:04
  5. Mobile App Issues (OBJ. 3.4) 6:35
  6. Mobile Connectivity Issues (OBJ. 3.4) 9:49
  7. Mobile Battery Issues (OBJ. 3.4) 7:39
  8. Screen Autorotation Issues (OBJ. 3.4) 3:43
  Video Name Time
  1. Troubleshooting Mobile Security (OBJ. 3.5) 1:31
  2. Rooting and Jailbreaking (OBJ. 3.5) 6:38
  3. Sideloading Apps (OBJ. 3.5) 6:30
  4. Mobile Malware Symptoms (OBJ. 3.5) 4:08
  5. Unexpected Application Behavior (OBJ. 3.5) 2:43
  6. Leaked Mobile Data (OBJ. 3.5) 2:54
  Video Name Time
  1. Professionalism (OBJ. 4.7) 5:17
  2. Professional Appearance (OBJ. 4.7) 6:33
  3. Respect Others' Time (OBJ. 4.7) 8:56
  4. Proper Communication (OBJ. 4.7) 15:11
  5. Dealing with Private Data (OBJ. 4.7) 6:02
  6. Difficult Situations (OBJ. 4.7) 6:33
  Video Name Time
  1. Conclusion 8:41

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step

Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address