Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA A+ 220-902
Introduction
Introduction (0:31)
Module 1
Features and Requirements Of Microsoft Operating Systems Part1 (0:37)
Features and Requirements Of Microsoft Operating Systems Part2 (0:47)
Identifying Features (1:23)
Windows Features (6:12)
System Restore and Event Viewer (2:53)
File Structure and Paths (4:21)
Other Features (7:04)
Upgrade Path (5:57)
Upgrade Tools (1:09)
System Tools Demonstration Part1 (2:57)
System Tools Demonstration Part2 (4:59)
System Tools Demonstration Part3 (3:20)
System Tools Demonstration Part4 (5:33)
Module 2
Installing Windows PC Operating Systems Part1 (0:22)
Installing Windows PC Operating Systems Part2 (1:28)
Boot Methods (1:45)
Types of Installations Part1 (4:12)
Types of Installations Part2 (4:52)
Partitioning (2:53)
File System Types and Formatting (2:45)
Installation Parameters (1:27)
Module 3
Microsoft Command Line Tools Part1 (0:25)
Microsoft Command Line Tools Part2 (0:33)
Commands To Know (5:13)
Available Command Privileges (1:03)
Command Prompt Navigation Commands Demonstration (3:13)
Module 4
Operating System Features and Tools Part1 (0:23)
Operating System Features and Tools Part2 (0:35)
Windows Administrative Tools (6:00)
MSCONFIG (3:12)
Task Manager (2:19)
Disk Management (2:09)
Clean Installation Tools (1:15)
System Utilities (2:25)
Computer Management Demonstration (5:02)
Device Manager Demonstration (1:30)
User Accounts Demonstration (2:31)
Performance Monitor Demonstration (5:06)
Windows Services Demonstration (3:07)
Print Management (8:02)
System Configuration Demonstration (3:16)
Task Manager Console Demonstration (2:07)
Registry Editor Demonstration (4:18)
Microsoft Management Console Demonstration (1:46)
Defragmenting Optical Drives (2:02)
Module 5
Control Panel Utilities Part1 (0:28)
Control Panel Utilities Part2 (0:22)
Internet Options (5:45)
Display Settings (2:02)
User Accounts and Folder Options (2:07)
System Properties (3:17)
Security Center/Action Center (1:57)
Power Options (1:37)
Programs and Features/Homegroups (1:29)
Devices and Printers/Sounds (1:22)
Troubleshooting/Network and Sharing Center (2:13)
Control Panel/Internet Options Demonstration (6:58)
Display Demonstration (1:26)
Power Options Demonstration (3:22)
Programs and Features Demonstration (2:36)
Homegroup Demonstration (1:30)
Sound Demonstration (2:24)
Troubleshooting/Network and Sharing Demonstration (3:51)
Module 6
Client and Desktop Windows Networking Part1 (0:22)
Client and Desktop Windows Networking Part2 (1:17)
Homegroup vs Workgroup (1:50)
Domain Setup (2:06)
Network and Administrative Shares (3:50)
Establishing Network Connections (2:33)
Remote Desktop Connections (1:59)
Network Sharing Settings (1:22)
Firewall Settings (0:53)
Alternative IP Address Configuration (1:36)
Network Card Properties (1:46)
Joining a Computer to a Domain Demonstration (2:15)
Administrative Shares (1:41)
Mapping Drives Demonstration (1:54)
LAN Setting for Proxy Server Demonstration (1:44)
Connecting to a Remote Desktop Demonstration (1:49)
Alternate IP Addressing Demonstration (4:17)
Module 7
Preventive Maintenance Tools and Procedures Part1 (0:14)
Preventive Maintenance Tools and Procedures Part2 (0:20)
Scheduled Backups (2:43)
Scheduled Disk Maintenance (1:31)
Maintenance Updates (2:32)
Maintenance Tools (2:09)
Managing Windows Update Settings (2:50)
Diskcheck and Defrag Demonstration (2:32)
Module 8
Operating Systems Features and Functionality Part1 (0:18)
Operating Systems Features and Functionality Part2 (0:51)
Best Practices (5:59)
Disk Maintenance Utilities (2:43)
Shell/Terminal Tool (0:56)
Screen Sharing Tool (2:19)
Force Quit and skill Tool (1:03)
Operating System Features (2:42)
Basic Linux Commands (2:54)
Module 9
Setup and Usage Of Client Side Virtualization Part1 (0:20)
Setup and Usage Of Client Side Virtualization Part2 (0:52)
Virtual Machines Requirements (5:07)
Client Side Virtualization Demonstration (5:15)
Module 10
Basic Cloud Concepts Part1 (0:19)
Basic Cloud Concepts Part2 (0:37)
Cloud Based Services (1:22)
Cloud Models (2:02)
Cloud Benefits and Resource Pooling (1:49)
Measured Service (0:40)
Module 11
Network Host Services Part1 (0:29)
Network Host Services Part2 (0:44)
Server Roles (7:07)
Internet Appliances (5:31)
Legacy Embedded Systems (1:15)
Module 12
Mobile Operating Systems Part1 (0:30)
Mobile Operating Systems Part2 (1:02)
Android vs. IOS (0:52)
Application Sources (0:56)
Screen Orientation and Calibration (2:09)
Common Mobile Features (3:49)
Downloading Mobile Applications (4:01)
Module 13
Mobile Device Network Connectivity and Email Configuration Part1 (0:20)
Mobile Device Network Connectivity and Email Configuration Part2 (1:09)
Enabling and Disabling Wireless/Cellular Networks (5:23)
Corporate and ISP Email Configuration and Security (3:44)
PRI/PRL/Baseband Updates (3:56)
Radio Firmware Updates (2:32)
IMEI vs. IMSI (0:45)
VPN Connection Configuration (1:30)
Module 14
Mobile Device Synchronization Part1 (0:18)
Mobile Device Synchronization Part2 (0:44)
Synchronization Data Types and Methods (3:14)
Mutual Authentication (1:38)
Synch Installation Requirements (0:49)
Synchronization Connection Types (0:49)
Module 15
Common Security Threats and Vulnerabilities Part1 (0:18)
Common Security Threats and Vulnerabilities Part2 (0:43)
Malware Viruses Part1 (4:41)
Malware Viruses Part2 (4:27)
Social Engineering and Spoofing Attacks (5:12)
Zero Day and Zombie/Botnet Attacks (2:43)
Password Attacks and Other Considerations (2:40)
Hot to Change a MAC Address (2:33)
Module 16
Common Prevention Methods Part1 (0:22)
Common Prevention Methods Part2 (0:42)
Physical Security (3:15)
Biometrics (2:05)
Physical Identification (2:58)
Digital Security Tools and Password Guidelines (5:24)
Firewalls (3:07)
User Education/AUP (1:09)
Least Privilege Principals (1:27)
Managing Multiple Displays (1:50)
Module 17
Basic Windows OS Security Settings Part1 (0:22)
Basic Windows OS Security Settings Part2 (0:50)
Users and Groups (1:36)
Setting File Permissions (5:17)
NTFS Directory and File Permissions (1:07)
Sharing Files/Folders and Profile Options (1:43)
Administrative Shares (2:50)
System Files and Folders and Authentication Concepts (2:17)
Encrypting Data at Rest (1:51)
Configuring NTFS Permissions and File Encryption Part1 (3:17)
Configuring NTFS Permissions and File Encryption Part2 (3:55)
Module 18
Enforcing Security Best Practices Part1 (0:17)
Enforcing Security Best Practices Part2 (0:26)
Password Best Practices (2:46)
Account Management (1:21)
Disable AutoRun and Data Encryption (2:36)
Patch/Update Management (2:54)
Module 19
Methods for Securing Mobile Devices Part1 (0:23)
Methods for Securing Mobile Devices Part2 (0:16)
Screen Locks and Remote Wipes (1:41)
Device Locator and Remote Backup (1:18)
Login Restrictions and Maintaining Updates (1:19)
Device Authentication and Trusted Sources (3:42)
Firewalls and Policies and Procedures (1:38)
Downloading a Smartphone Firewall Application (1:10)
Module 20
Data Destruction and Disposal Methods Part1 (0:28)
Data Destruction and Disposal Methods Part2 (0:29)
Physical Destruction (3:55)
Recycling and Repurposing (1:24)
Module 21
Securing SOHO Wireless/Wired Networks Part1 (1:15)
Wireless Precautions Part1 (5:21)
Wireless Precautions Part2 (3:38)
Changing Default Access Credentials (1:15)
Enabling MAC Filtering (1:58)
Wireless Network Security Measures (4:02)
Module 22
Troubleshooting PC Operating Systems Part1 (0:11)
Troubleshooting PC Operating Systems Part2 (0:15)
Common OS Symptoms Part1 (6:20)
Common OS Symptoms Part2 (2:30)
Common Error Messages (3:04)
Compatibility Error (1:25)
Slow System Performance (1:38)
Boots to Safe Mode and Files Failing to Open (3:08)
OS Boot issues (6:47)
Multiple Monitor Orientation (1:44)
Repairing Disks (1:35)
Pre-Installation Environments (0:36)
MSCONFIG and Defrag Tools (2:21)
Registry Editors and Other Tools (2:30)
Uninstall/Reinstall/Repair (1:21)
Windows OS Recovery Settings Demonstration (2:57)
Module 23
Troubleshooting Common PC Security Issues Part1 (0:18)
Troubleshooting Common PC Security Issues Part2 (0:32)
Common Security Issue Symptoms (5:03)
Security Tools (0:59)
Malware Removal Best Practices (1:38)
Module 24
Troubleshooting Common Mobile OS and Application Issues Part1 (0:17)
Troubleshooting Common Mobile OS and Application Issues Part2 (0:33)
Common Mobile Device Symptoms Part1 (6:47)
Common Mobile Device Symptoms Part2 (3:43)
Troubleshooting Tools (0:52)
Module 25
Troubleshooting Mobile OS and Application Security Issues Part1 (0:23)
Troubleshooting Mobile OS and Application Security Issues Part2 (0:21)
Common Security Symptoms (4:41)
Mobile Device Security Tools (4:18)
Module 26
Appropriate Safety Procedures Part1 (0:18)
Appropriate Safety Procedures Part2 (0:27)
Equipment Grounding (4:05)
Toxic Waste Handling (1:52)
Personal Safety (3:29)
Government Regulations Compliance (1:22)
Module 27
Applying Environmental Impact Controls Part1 (0:23)
Applying Environmental Impact Controls Part2 (0:53)
MSDS Documentation (1:58)
Temperature/Humidity Levels and Proper Ventilation (2:12)
Power Issues (2:18)
Protecting the Computer (1:34)
Local Government Regulations Compliance (0:51)
Module 28
Addressing Prohibited Content and Policy Concepts Part1 (0:25)
Addressing Prohibited Content and Policy Concepts Part2 (0:24)
Incident Response (1:31)
Documentation and Chain of Custody (2:31)
Software Licensing (2:36)
Personally Identifiable Information (1:06)
Security Policies Best Practices (2:45)
Module 29
Communication Techniques and Professionalism Part1 (0:21)
Communication Techniques and Professionalism Part2 (1:03)
Using Proper Language and Guidelines (3:43)
Customer Related Situations and Difficulties (2:29)
Set and Meet Client Expectations (1:38)
Customer Confidential and Private Material (0:45)
Module 30
Troubleshooting Theory Part1 (0:25)
Troubleshooting Theory Part2 (0:44)
CompTIA Steps to Troubleshooting (7:16)
Course End (0:13)
Device Authentication and Trusted Sources
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock