CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1
HISTORY FOREVER
If you want to become an A+ Technician, this book is for you!
BOOK 1: CompTIA A+ CERTIFICATION STUDY GUIDE FOR 220-1102 EXAM - BEGINNERS GUIDE TO OPERATING SYSTEMS & SOFTWARE TROUBLESHOOTING
BOOK 2: CompTIA A+ CERTIFICATION STUDY GUIDE FOR 220-1102 EXAM - BEGINNERS GUIDE TO SECURITY AWARENESS & OPERATIONAL PROCEDURES
This book will help you prepare for the latest CompTIA A+ Certification, exam code: 220-1102.
BUY THIS BOOK NOW AND GET STARTED TODAY!
In book 1 you will discover:
In book 2 you will discover:
BUY THIS BOOK NOW AND GET STARTED TODAY!
Duration - 13h 26m.
Author - HISTORY FOREVER.
Narrator - Khai Lannor.
Published Date - Sunday, 22 January 2023.
Copyright - © 2022 Richie Miller ©.
Location:
United States
Description:
If you want to become an A+ Technician, this book is for you! BOOK 1: CompTIA A+ CERTIFICATION STUDY GUIDE FOR 220-1102 EXAM - BEGINNERS GUIDE TO OPERATING SYSTEMS & SOFTWARE TROUBLESHOOTING BOOK 2: CompTIA A+ CERTIFICATION STUDY GUIDE FOR 220-1102 EXAM - BEGINNERS GUIDE TO SECURITY AWARENESS & OPERATIONAL PROCEDURES This book will help you prepare for the latest CompTIA A+ Certification, exam code: 220-1102. BUY THIS BOOK NOW AND GET STARTED TODAY! In book 1 you will discover: In book 2 you will discover: BUY THIS BOOK NOW AND GET STARTED TODAY! Duration - 13h 26m. Author - HISTORY FOREVER. Narrator - Khai Lannor. Published Date - Sunday, 22 January 2023. Copyright - © 2022 Richie Miller ©.
Language:
English
Opening Credits
Duration:00:00:19
Opening credits
Duration:00:00:16
Introduction
Duration:00:06:46
Chapter 1 introduction to a+ certification exams
Duration:00:07:36
Chapter 2 operating system fundamentals
Duration:00:17:29
Chapter 3 vendor specific limitations
Duration:00:07:20
Chapter 4 microsoft windows editions and versions
Duration:00:26:43
Chapter 5 windows editions
Duration:00:07:53
Chapter 6 os installation considerations and upgrade methods
Duration:00:09:23
Chapter 7 upgrade considerations
Duration:00:07:30
Chapter 8 boot methods & partitioning
Duration:00:12:45
Chapter 9 file system formatting & post installation tasks
Duration:00:16:43
Chapter 10 how to use microsoft command line
Duration:00:06:59
Chapter 11 navigation & networking commands
Duration:00:04:52
Chapter 12 disk and file management commands
Duration:00:05:33
Chapter 13 power shell commands
Duration:00:03:50
Chapter 14 how to use microsoft admin config tools
Duration:00:16:14
Chapter 15 troubleshooting & maintenance tools
Duration:00:21:24
Chapter 16 how to use windows control panel and settings utilities
Duration:00:07:50
Chapter 17 interface personalization
Duration:00:10:01
Chapter 18 system personalization
Duration:00:09:45
Chapter 19 networking features
Duration:00:05:52
Chapter 20 security features
Duration:00:10:38
Chapter 21 hardware settings applets
Duration:00:08:42
Chapter 22 application installation and configuration
Duration:00:08:02
Chapter 23 distribution methods
Duration:00:05:25
Chapter 24 permissions and security
Duration:00:07:14
Chapter 25 workgroup vs domain networking
Duration:00:02:53
Chapter 26 firewall and discovery settings
Duration:00:06:26
Chapter 27 ip address & nic settings
Duration:00:14:16
Chapter 28 how to map shares and printers
Duration:00:06:12
Chapter 29 how to establish remote connections
Duration:00:14:42
Chapter 30 mac os gui features & tools
Duration:00:36:00
Chapter 31 linux features and tools
Duration:00:19:50
Chapter 32 how to solve microsoft windows os issues
Duration:00:10:13
Chapter 33 how to create a windows bare metal image
Duration:00:06:22
Chapter 34 how to solve network connectivity issues
Duration:00:06:35
Chapter 35 how to solve shared folder access permissions issues
Duration:00:06:40
Chapter 36 how to solve performance issues
Duration:00:07:49
Chapter 37 how to solve os and application crashes
Duration:00:07:18
Chapter 38 how to solve mobile device software issues
Duration:00:23:46
Chapter 39 how to mitigate malware
Duration:00:09:57
Chapter 40 how to optimise web browser security
Duration:00:03:51
Chapter 41 how to remove malware
Duration:00:04:04
Closing credits
Duration:00:00:23
Chapter 2 physical security fundamentals
Duration:00:03:28
Chapter 3 surveillance and alarms
Duration:00:05:45
Chapter 4 ingress and egress security
Duration:00:09:34
Chapter 5 physical security for staff
Duration:00:05:03
Chapter 6 authentication
Duration:00:07:21
Chapter 7 authorization
Duration:00:03:07
Chapter 8 domain security
Duration:00:09:23
Chapter 9 communications security
Duration:00:05:47
Chapter 10 wireless protocols and authentication
Duration:00:10:13
Chapter 11 wireless authentication
Duration:00:05:38
Chapter 12 malware prevention & types of malware
Duration:00:09:08
Chapter 13 malware symptoms & antimalware tools
Duration:00:10:06
Chapter 14 antimalware techniques
Duration:00:09:41
Chapter 15 social engineering attacks
Duration:00:14:00
Chapter 16 security threats
Duration:00:08:47
Chapter 17 security vulnerabilities
Duration:00:05:36
Chapter 18 security settings in windows
Duration:00:12:18
Chapter 19 permissions
Duration:00:12:25
Chapter 20 efs & bit locker encryption
Duration:00:14:06
Chapter 21 antivirus and firewall
Duration:00:08:49
Chapter 22 workstation security & platform hardening
Duration:00:08:58
Chapter 23 account management
Duration:00:06:35
Chapter 24 password management
Duration:00:07:24
Chapter 25 mobile device security
Duration:00:05:47
Chapter 26 logical security
Duration:00:16:05
Chapter 27 data destruction and disposal methods
Duration:00:08:23
Chapter 28 physical destruction
Duration:00:03:41
Chapter 29 router and firewall security
Duration:00:11:15
Chapter 30 wi fi security
Duration:00:04:47
Chapter 31 browser security
Duration:00:04:34
Chapter 32 secure connections settings
Duration:00:09:11
Chapter 33 documentation & environmental factors
Duration:00:24:15
Chapter 34 professionalism how to talk to end users
Duration:00:14:41
Chapter 35 licensing, privacy, and safety
Duration:00:05:09
Chapter 36 data privacy
Duration:00:07:41
Chapter 37 safety measures
Duration:00:07:05
Chapter 38 change management & disaster recovery
Duration:00:13:00
Chapter 39 redundancy and system recovery
Duration:00:04:41
Chapter 40 scripting & automation
Duration:00:12:06
Chapter 41 remote access methods
Duration:00:05:05
About richie miller
Duration:00:00:59
Conclusion
Duration:00:00:27
Ending Credits
Duration:00:00:28