-
1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
-
1.2 Given a scenario, install Windows PC operating systems using appropriate methods.
-
Boot methods
-
Type of installations
-
Partitioning
-
File system types/formatting
-
Load alternate third party drivers when necessary
-
Workgroup vs. Domain setup
-
Time/date/region/language settings
-
Driver installation, software and windows updates
-
Factory recovery partition
-
Properly formatted boot drive with the correct partitions/format
-
1.3 Given a scenario, apply appropriate Microsoft command line tools.
-
TASKKILL
-
BOOTREC
-
SHUTDOWN
-
TASKLIST
-
MD
-
RD
-
CD
-
DEL
-
FORMAT
-
COPY
-
XCOPY
-
ROBOCOPY
-
DISKPART
-
SFC
-
CHKDSK
-
GPUPDATE
-
GPRESULT
-
DIR
-
EXIT
-
HELP
-
EXPAND
-
[command name]/?
-
Commands available with standard privileges vs. administrative privileges.
-
1.4 Given a scenario, use appropriate Microsoft operating system features and tools
-
Administrative
-
MSCONFIG
-
Task Manager
-
Disk management
-
Other
-
System utilities
-
1.5 Given a scenario, use Windows Control Panel utilities.
-
Internet options
-
Display/Display Settings
-
User accounts
-
Folder options
-
System
-
Windows firewall
-
Power options
-
Programs and features
-
HomeGroup
-
Devices and Printers
-
Sound
-
Troubleshooting
-
Network and Sharing Center
-
Device Manager
-
1.6 Given a scenario, install and configure Windows networking on a client/desktop.
-
HomeGroup vs. WorkGroup
-
Domain setup
-
Network shares/administrative shares/mapping drives
-
Printer sharing vs. network printer mapping
-
Establish networking connections
-
Proxy settings
-
Remote Desktop Connection
-
Remote Assistance
-
Home vs. Work vs. Public network settings
-
Firewall settings
-
Configuring an alternative IP address in Windows
-
Network card properties
-
1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools.
For more information, contact one of our course advisors
-
2.1 Identify common features and functionality of the Mac OS and Linux operating systems.
-
Best practices
-
Tools
-
Features
-
Basic Linux commands
-
2.2 Given a scenario, setup and use client-side virtualization.
-
Purpose of virtual machines
-
Resource requirements
-
Emulator requirements
-
Security requirements
-
Network requirements
-
Hypervisor
-
2.3 Identify basic cloud concepts.
-
SaaS
-
IaaS
-
Paas
-
Public vs. Private vs. Hybrid vs. Community
-
Rapid Elasticity
-
On-demand
-
Resource pooling
-
Measured service
-
2.4 Summarize the properties and purpose of services provided by networked hosts.
-
Server roles
-
Internet appliance
-
Legacy / embedded systems
-
2.5 Identify basic features of mobile operating systems.
-
Android vs. iOS vs. Windows
-
2.6 Install and configure basic mobile device network connectivity and email.
-
Wireless / cellular data network (enable/disable)
-
Bluetooth
-
Corporate and ISP email configuration
-
Integrated commercial provider email configuration
-
PRI updates/PRL updates/Baseband updates
-
Radio firmware
-
IMEI vs. IMSI
-
VPN
-
2.7 Summarize methods and data related to mobile device synchronization.
-
Types of data to synchronize
-
Synchronization methods
-
Mutual authentication for multiple services (SSO)
-
Software requirements to install the application on the PC
-
Connection types to enable synchronization
For more information, contact one of our course advisors
-
3.1 Identify common security threats and vulnerabilities.
-
Malware
-
Phishing
-
Spear phishing
-
Spoofing
-
Social engineering
-
Shoulder surfing
-
Zero day attack
-
Zombie/botnet
-
Brute forcing
-
Dictionary attacks
-
Non-compliant systems
-
Violations of security best practices
-
Tailgating
-
Man-in-the-middle
-
3.2 Compare and contrast common prevention methods.
-
Physical security
-
Digital security
-
User education/AUP
-
Principle of least privilege
-
3.3 Compare and contrast differences of basic Windows OS security settings.
-
User and groups
-
NTFS vs. Share permissions
-
Shared files and folders
-
System files and folders
-
User authentication
-
Run as administrator vs. standard user
-
Bitlocker
-
Bitlocker-To-Go
-
EFS
-
3.4 Given a scenario, deploy and enforce security best practices to secure a workstation.
-
Password best practices
-
Account management
-
Disable autorun
-
Data encryption
-
Patch/update management
-
3.5 Compare and contrast various methods for securing mobile devices.
-
Screen locks
-
Remote wipes
-
Locator applications
-
Remote backup applications
-
Failed login attempts restrictions
-
Antivirus/Antimalware
-
Patching/OS updates
-
Biometric authentication
-
Full device encryption
-
Multifactor authentication
-
Authenticator applications
-
Trusted sources vs. untrusted sources
-
Firewalls
-
Policies and procedures
-
3.6 Given a scenario, use appropriate data destruction and disposal methods.
-
Physical destruction
-
Recycling or repurposing best practices
For more information, contact one of our course advisors
-
4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
-
4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
-
4.3 Given a scenario, troubleshoot common video, projector and display issues.
-
4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
-
Common symptoms
-
Hardware tools
-
Command line tools
-
4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
-
Common symptoms
-
Disassembling processes for proper re-assembly
-
4.6 Given a scenario, troubleshoot printers with appropriate tools.
For more information, contact one of our course advisors
-
5.1 Given a scenario, use appropriate safety procedures.
-
Equipment grounding
-
Toxic waste handling
-
Personal safety
-
Compliance with local government regulations
-
5.2 Given a scenario with potential environmental impacts, apply the appropriate controls.
-
MSDS documentation for handling and disposal
-
Temperature, humidity level awareness and proper ventilation
-
Power surges, brownouts, blackouts
-
Protection from airborne particles
-
Dust and debris
-
Compliance to local government regulations
-
5.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts.
-
Incident Response
-
Licensing / DRM / EULA
-
Personally Identifiable Information
-
Follow corporate end-user policies and security best practices
-
5.4 Demonstrate proper communication techniques and professionalism.
-
Use proper language – avoid jargon, acronyms, slang when applicable
-
Maintain a positive attitude / Project confidence
-
Actively listen (taking notes) and avoid interrupting the customer
-
Be culturally sensitive
-
Be on time (if late contact the customer)
-
Avoid distractions
-
Dealing with difficult customer or situation
-
Set and meet expectations/timeline and communicate status with the customer
-
Deal appropriately with customers confidential and private materials
-
5.5 Given a scenario, explain the troubleshooting theory.
-
Always consider corporate policies, procedures and impacts before implementing changes.
-
1. Identify the problem
-
2. Establish a theory of probable cause (question the obvious)
-
3. Test the theory to determine cause
-
4. Establish a plan of action to resolve the problem and implement the solution
-
5. Verify full system functionality and if applicable implement preventive measures
-
6. Document findings, actions and outcomes
For more information, contact one of our course advisors
-
CompTIA A+ 220-901
-
CompTIA A+ 220-902
For more information, contact one of our course advisors
Achieving a CompTIA A+ qualification will unlock a number of doors for you
within the IT industry, with salaries for those that hold an A+
certification ranging from £16,000 to £56,673.
The roles that you will be qualified for are as follows:
-
Support Technician
-
Support Engineer
-
Support Analyst
-
Service Desk Analyst
-
IT Manager
For more information, contact one of our course advisors