CompTIA A+ Certification Study Guide for 220-1102 Exam
Richie Miller
If you want to become an A+ Technician, this book is for you!
BUY THIS BOOK NOW AND GET STARTED TODAY!
In this book you will discover:
Physical Security Fundamentals
Surveillance and Alarms
Ingress and Egress Security
Physical Security for Staff
Authentication
Authorization
Domain Security
Communications Security
Wireless Protocols and Authentication
Wireless Authentication
Malware Prevention & Types of Malware
Malware Symptoms & Antimalware Tools
EFS & BitLocker Encryption
Antivirus and Firewall
Workstation Security & Platform Hardening
Account Management
Password Management
Mobile Device Security
Logical Security
Data Destruction and Disposal Methods
Physical Destruction
Router and Firewall Security
Wi-fi Security
Browser Security
Secure Connections Settings
Documentation & Environmental Factors
Professionalism - How to Talk to End-users
Licensing, Privacy, and Safety
Data Privacy
Safety Measures
Change Management & Disaster Recovery
Redundancy and System Recovery
Scripting & Automation
Remote Access Methods
BUY THIS BOOK NOW AND GET STARTED TODAY!
Duration - 6h 6m.
Author - Richie Miller.
Narrator - Khai Lannor.
Published Date - Sunday, 22 January 2023.
Copyright - © 2022 Richie Miller ©.
Location:
United States
Description:
If you want to become an A+ Technician, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: Physical Security Fundamentals Surveillance and Alarms Ingress and Egress Security Physical Security for Staff Authentication Authorization Domain Security Communications Security Wireless Protocols and Authentication Wireless Authentication Malware Prevention & Types of Malware Malware Symptoms & Antimalware Tools EFS & BitLocker Encryption Antivirus and Firewall Workstation Security & Platform Hardening Account Management Password Management Mobile Device Security Logical Security Data Destruction and Disposal Methods Physical Destruction Router and Firewall Security Wi-fi Security Browser Security Secure Connections Settings Documentation & Environmental Factors Professionalism - How to Talk to End-users Licensing, Privacy, and Safety Data Privacy Safety Measures Change Management & Disaster Recovery Redundancy and System Recovery Scripting & Automation Remote Access Methods BUY THIS BOOK NOW AND GET STARTED TODAY! Duration - 6h 6m. Author - Richie Miller. Narrator - Khai Lannor. Published Date - Sunday, 22 January 2023. Copyright - © 2022 Richie Miller ©.
Language:
English
Opening Credits
Duration:00:00:16
Introduction
Duration:00:06:07
Chapter 1 introduction to a+ certification exams
Duration:00:07:19
Chapter 2 physical security fundamentals
Duration:00:03:28
Chapter 3 surveillance and alarms
Duration:00:05:45
Chapter 4 ingress and egress security
Duration:00:09:34
Chapter 5 physical security for staff
Duration:00:05:03
Chapter 6 authentication
Duration:00:07:21
Chapter 7 authorization
Duration:00:03:07
Chapter 8 domain security
Duration:00:09:23
Chapter 9 communications security
Duration:00:05:47
Chapter 10 wireless protocols and authentication
Duration:00:10:13
Chapter 11 wireless authentication
Duration:00:05:38
Chapter 12 malware prevention & types of malware
Duration:00:09:08
Chapter 13 malware symptoms & antimalware tools
Duration:00:10:06
Chapter 14 antimalware techniques
Duration:00:09:41
Chapter 15 social engineering attacks
Duration:00:14:00
Chapter 16 security threats
Duration:00:08:47
Chapter 17 security vulnerabilities
Duration:00:05:36
Chapter 18 security settings in windows
Duration:00:12:18
Chapter 19 permissions
Duration:00:12:25
Chapter 20 efs & bit locker encryption
Duration:00:14:06
Chapter 21 antivirus and firewall
Duration:00:08:49
Chapter 22 workstation security & platform hardening
Duration:00:08:58
Chapter 23 account management
Duration:00:06:35
Chapter 24 password management
Duration:00:07:24
Chapter 25 mobile device security
Duration:00:05:47
Chapter 26 logical security
Duration:00:16:05
Chapter 27 data destruction and disposal methods
Duration:00:08:23
Chapter 28 physical destruction
Duration:00:03:41
Chapter 29 router and firewall security
Duration:00:11:15
Chapter 30 wi fi security
Duration:00:04:47
Chapter 31 browser security
Duration:00:04:34
Chapter 32 secure connections settings
Duration:00:09:11
Chapter 33 documentation & environmental factors
Duration:00:24:15
Chapter 34 professionalism how to talk to end users
Duration:00:14:41
Chapter 35 licensing, privacy, and safety
Duration:00:05:09
Chapter 36 data privacy
Duration:00:07:41
Chapter 37 safety measures
Duration:00:07:05
Chapter 38 change management & disaster recovery
Duration:00:13:00
Chapter 39 redundancy and system recovery
Duration:00:04:41
Chapter 40 scripting & automation
Duration:00:12:06
Chapter 41 remote access methods
Duration:00:05:05
About richie miller
Duration:00:00:59
Conclusion
Duration:00:00:27
Ending Credits
Duration:00:00:23