CompTia A+ Training Course
CompTIA A+ certification is an internationally recognized, vendor-neutral certification that many employers consider a prerequisite for entry-level IT employment.
The certification enjoys wide recognition throughout the computer industry. To date, more than 800,000 technicians have become certified, making it the most popular of all IT certifications.
CompTIA A+ 220-901
1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
1.2 Explain the importance of motherboard components, their purpose and properties.
1.3 Compare and contrast various RAM types and their features.
1.4 Install and configure PC expansion cards.
1.5 Install and configure storage devices and use appropriate media.
1.6 Install various types of CPUs and apply the appropriate cooling methods.
1.7 Compare and contrast various PC connection interfaces, their characteristics and purpose.
1.8 Install a Power Supply Based on Given Specifications
1.9 Select the Appropriate Components for a Custom PC Configuration to Meet Customer Specifications or Needs
1.10 Compare and Contrast Types of Display Devices and Their Features
1.11 Identify Common PC Connector Types and Associated Cables
1.12 Install and Configure Common Peripheral Devices
1.13 Install SOHO Multifunction Devices/Printers and Configure Appropriate Settings
1.14 Compare and Contrast Differences Between the Various Print Technologies and the Associated Imaging Process
1.15 Given a Scenario, Perform Appropriate Printer Maintenance
2.1 Various Types of Network Cables and Connectors
2.2 Compare & Contrast the Characteristics of Connectors and Cabling
2.3 Explain the Properties and Characteristics of TCP/IP
2.4 Explain Common TCP & UDP Ports, Protocols, & Their Purpose
2.5 Compare & Contrast Various Wi-Fi Networking Standards and Encryption Types
2.6 Install and Configure a SOHO Wireless/Wired Router & Apply Appropriate Settings
2.7 Compare & Contrast Internet Connection Types, Network Types, and Their Features
2.8 Compare & Contrast Network Architecture Devices, Their Functions, & Features
2.9 Given a Scenario, Use Appropriate Networking Tools
3.1 Install & Configure Laptop Hardware & Components
3.2 Explain the Function of Components Within the Display of a Laptop
3.3 Given a Scenario, Use Appropriate Laptop Features
3.4 Characteristics of Various Types of Other Mobile Devices
3.5 Compare and Contrast Accessories and Ports of Other Mobile Devices
Hardware and Network Troubleshooting
4.1 Given a Scenario, Troubleshoot Common Problems Related to Motherboards, RAM, CPU, and Power with Appropriate Tools
4.2 Given a Scenario, Troubleshoot Hard Drives and RAID Arrays with Appropriate Tools
4.3 Given a Scenario, Troubleshoot Common Video, Projector, and Display Issues
4.4 Given a Scenario, Troubleshoot Wired and Wireless Networks with Appropriate Tools
4.5 Given a Scenario, Troubleshoot and Repair Common Mobile Device Issues While Adhering to the Appropriate Procedures
4.6 Given a Scenario, Troubleshoot Printers with Appropriate Tools
CompTIA A+ 220-902
Windows Operating Systems
1.1 Various Features and Requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, and Windows 8.1)
1.2 Install Windows PC Operating Systems Using Appropriate Methods
1.3 Apply Appropriate Microsoft Command-Line Tools
1.4 Given a Scenario, Use Appropriate Microsoft Operating System Features and Tools
1.5 Given a Scenario, Use Windows Control Panel Utilities
1.6 Given a Scenario, Install and Configure Windows Networking on a Client/Desktop
1.7 Perform Common Preventive Maintenance Procedures Using the Appropriate Windows OS Tools
Other Operating Systems and Technologies
2.1 Identify Common Features and Functionality of the Mac OS and Linux Operating Systems
2.2 Given a Scenario, Set Up and Use Client-Side Virtualization
2.3 Identify Basic Cloud Concepts
2.4 Summarize the Properties and Purpose of Services Provided by Networked Hosts
2.5 Identify Basic Features of Mobile Operating Systems
2.6 Install and Configure Basic Mobile Device Network Connectivity and E-mail
2.7 Methods and Data Related to Mobile Device Synchronization
3.1 Identify Common Security Threats and Vulnerabilities
3.2 Compare and Contrast Common Prevention Methods
3.3 Differences of Basic Windows OS Security Settings
3.4 Given a Scenario, Deploy and Enforce Security Best Practices to Secure a Workstation
3.5 Compare and Contrast Various Methods for Securing Mobile Devices
3.6 Given a Scenario, Use Appropriate Data Destruction and Disposal Methods
3.7 Given a Scenario, Secure SOHO Wireless and Wired Networks
4.1 Given a Scenario, Troubleshoot PC Operating System Problems with Appropriate Tools
4.2 Given a Scenario, Troubleshoot Common PC Security Issues with Appropriate Tools and Best Practices
4.3 Given a Scenario, Troubleshoot Common Mobile OS and Application Issues with Appropriate Tools
4.4 Given a Scenario, Troubleshoot Common Mobile OS and Application Security Issues with Appropriate Tools
5.1 Given a Scenario, Use Appropriate Safety Procedures
5.2 Given a Scenario with Potential Environmental Impacts, Apply the Appropriate Controls
5.3 Summarize the Process of Addressing Prohibited Content/Activity and Explain Privacy, Licensing, and
5.4 Demonstrate Proper Communication Techniques and Professionalism
5.5 Given a Scenario, Explain the Troubleshooting Theory