CompTIA A+ certified professionals are proven problem solvers. They support today’s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world.
CompTIA A+ is the only industry recognized credential with performance testing to prove pros can think on their feet to perform critical IT support tasks. It is trusted by employers around the world to identify the go-to person in end point management & technical support roles. CompTIA A+ appears in more tech support job listings than any other IT credential.
By the end of this course, students will be able to:
Module- Title- Hours
1- Introduction to Operating Systems and User Interfaces- 2
2- Installing & Configuring Windows OS (10/11)- 4
3- Command-line Tools and System Utilities- 3
4- macOS, Linux, and ChromeOS Fundamentals- 3
5- Security Concepts: Threats, Zero Trust, IAM, Malware Prevention- 4
6- Software Troubleshooting Techniques and Tools- 4
7- Security Best Practices & Data Protection- 3
8- Backup, Recovery, Disaster Planning- 3
9- Operational Procedures, Documentation, and Compliance- 4
Total- 30
CompTIA A+ 220-1202 covers operating systems, security, software and operational procedures.
A+ emphasizes the technologies and skills IT pros need to support a hybrid workforce.
Reflects the changing nature of the job role, where many tasks are sent to specialized providers as certified personnel need to assess whether it’s best to fix something on site, or to save time and money by sending proprietary technologies directly to vendors.
The new CompTIA A+ Core Series includes expanded content on these growing parts of the IT support role:
| Course Introduction | |
|---|---|
| Configure Windows Networking | |
| Troubleshoot Windows Networking | Assisted Lab: Configure Windows Networking |
| Configure Windows Security Settings | |
| Manage Windows Shares | Assisted Lab: Configure Folder Sharing in a Workgroup |
| Assisted Lab: Support Active Directory Networking | |
| Identify Features of Linux | Assisted Lab: Manage Linux Using Command-line Tools |
| Assisted Lab: Manage Files Using Linux Command-line Tools | |
| Identify Features of macOS | |
| Explain Attacks, Threats, and Vulnerabilities | |
| Compare Wireless Security Protocols | |
| Configure SOHO Router Security | Assisted Lab: Configure SOHO Router Security |
| Summarize Security Measures | |
| Configure Workstation Security | Assisted Lab: Configure Workstation Security |
| Configure Browser Security | |
| Troubleshoot Workstation Security Issues | Assisted Lab: Troubleshoot Security Issues Scenario #1 |
| Configure Mobile OS Security | |
| Troubleshoot Mobile OS and Applications Software | |
| Troubleshoot Mobile OS and Applications Security | |
| Use Remote Access Technologies | Assisted Lab: Use Remote Access Technologies |
| Implement Backup and Recovery | Assisted Lab: Implement Backup and Recovery |
| Explain Data Handling Best Practices | |
| Identify Basics of Scripting | Assisted Lab: Implement a PowerShell Script |
| Assisted Lab: Implement a Bash Script | |
| Implement Best Practice Documentation | Assisted Lab: Manage a Support Ticket |
| Use Proper Communication Techniques | |
| Use Common Safety and Environmental Procedures | |
| Course Review and Exam Preview/Practice |
Languages Available: English (others to be released)
Domains Covered in 220-1202
You can give us a CALL at Toll Free: (866)-GO-GIT-GO OR email at info@global-itech.com
All the instructors at Global IT are practitioners from the Industry with minimum 5-10 years of relevant IT experience. They are subject matter experts and are passionate for providing an awesome learning experience to the participants.
Real testimonials from our Students!
My name is Cedric Porties, and I am currently employed as a systems administrator for Electronic data Systems. I was made aware of Global Information Technology from a local computer magazine. After much speculation due to a situation from another private school I previously attended, I decided to go in and speak with a representative. [...] Read more
Cedric Porties
I would like to take this opportunity to thank the entire team for providing the training and resources needed to get my career in Information Technology (IT) off to a great start. Having experienced a variety of jobs previously – including a stint as a Mortgage Officer for a large local Bank, and my prior [...] Read more
Garrett Mason
While serving in the military I often found myself interested in pursuing a career within IT. Shortly after exiting the military, I started my journey and landed a position as an apprentice with a global consulting firm. I was quickly able to recognize that I was going to need more knowledge than just a web [...] Read more
Brian Cancel
In December 2008, I found myself parting ways with my employer of the last 22 years. I had become rather specialized in the Lotus Notes field and found that computer skill no longer in high demand and the entire IT job market rather depressed. Several months later, I became aware of Global Information Technology and [...] Read more
William Kolis
Having stagnated as an IT professional, as well as finding the demands in the market are for later technologies, it became evident that I had to re-tool to remain, indeed become, marketable. I needed a training venue that offered a breadth of curriculums, that was affordable, that was convenient and that was geared to the [...] Read more
Ray Hodge