O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA A+ Certification 902. The Total Course

Video Description

Everything you need to pass the CompTIA A+ 220-902 Exam, from Mike Meyers, CompTIA expert and bestselling author

About This Video

  • The course covers all the CompTIA A+ 220-902 Objective Domains like Windows Operating Systems, Other Operating Systems & Technologies, Security, Software Troubleshooting, Operational Procedures.

  • Topics include how to set up, upgrade and maintain all versions of Windows, basics of OS X and Linux, configure and secure mobile devices.

  • Protect your PC and your network, work with virtualization technologies, understand safety and environmental issues.

  • In Detail

    This is the second of a two course series for CompTIA A+ and is designed to prepare you to take and pass the CompTIA A+ 220-902 exam. To become fully A+ certified you will need to pass both the 220-901 and 220-902 exams. This course is over 10 hours in length containing over 100 video lectures. The first goal of the course is to make you a good PC Tech and in the process make sure you are ready to pass the CompTIA 902 exam.

    Table of Contents

    1. Chapter 1 : Path of the PC Tech
      1. What is the CompTIA A+ 00:02:01
      2. How to Pass the A+ Exams 00:10:45
      3. What is on the A+ 220-902 Exam 00:08:00
      4. Why Get A+ Certified 00:03:34
    2. Chapter 2 : Operational Procedures
      1. Professionalism 00:03:20
      2. Communication 00:06:59
      3. Three Threats to Your PC 00:07:13
      4. Physical Safety 00:03:15
      5. Equipment Safety 00:07:50
      6. Troubleshooting Theory 00:08:36
    3. Chapter 3 : The Visible Computer
      1. Touring Windows Vista 00:14:11
      2. Touring Windows 7 Part 1 00:10:21
      3. Touring Windows 7 Part 2 00:10:14
      4. Touring Windows 7 Part 3 00:13:26
      5. Touring Windows 8 00:10:14
      6. Touring Windows 10 00:11:12
      7. Touring OS X 00:08:49
      8. Touring Ubuntu Linux 00:10:15
      9. Tech Paths 00:12:46
    4. Chapter 4 : RAM
      1. RAM: Sticks and Speeds 00:10:25
      2. RAM Capacity 00:02:07
      3. Virtual Memory 00:10:06
    5. Chapter 5 : Power Supplies
      1. Choosing a Power Supply 00:06:39
      2. Power Protection 00:07:40
    6. Chapter 6 : Implementing Hard Drives
      1. Understanding Partitioning 00:07:56
      2. Basic Partitioning 00:12:43
      3. Dynamic Disks 00:07:55
      4. File Systems 00:09:01
      5. Storage Spaces 00:09:00
    7. Chapter 7 : Essential Peripherals
      1. Configuring USB 00:05:17
    8. Chapter 8 : Building a PC
      1. Media Sources 00:10:53
      2. Windows Install Options 00:09:28
      3. Windows Upgrade Paths 00:14:22
      4. Installing Windows 00:09:50
      5. Post-Installation Tasks 00:13:05
    9. Chapter 9 : Windows Under the Hood
      1. What is the Registry 00:07:01
      2. The Boot Process 00:09:13
      3. Processes 00:01:55
      4. Dealing with Processes 00:05:02
      5. Services 00:05:08
      6. Windows 8 Task Manager 00:09:13
    10. Chapter 10 : Users, Groups, and Permissions
      1. Introduction to Users and Groups 00:06:44
      2. Creating Users in Windows Vista/7 00:04:25
      3. Managing Users in Windows 8 or 8.1 00:05:01
      4. Sharing Folders and Files 00:15:27
    11. Chapter 11 : Maintaining and Optimizing Operating Systems
      1. The Zen of Computer Maintenance 00:03:49
      2. Patch Management 00:12:48
      3. Autostarting Programs in Windows 00:06:39
      4. Meet the MMC 00:05:23
      5. Installing and Uninstalling Programs - Windows 00:04:55
      6. Windows System Restore 00:07:37
      7. Windows Backup 00:09:26
    12. Chapter 12 : Working with the Command Line Interface
      1. Windows Command Line Basics 00:16:48
      2. Working with folders and files 00:14:57
      3. Fancy Copying 00:05:49
      4. Working With Drives 00:10:29
      5. Advanced Windows Command Line 00:07:37
      6. Linux Command Line Basics 00:09:52
      7. Working with Folders and Files in Linux 00:10:29
      8. Linux File Permissions 00:15:10
      9. Miscellaneous Linux Commands 00:17:23
    13. Chapter 13 : Troubleshooting Operating Systems
      1. The Recovery Console 00:07:02
      2. Windows Recovery Environment 00:08:03
      3. Advanced Startup Options Part 1 00:07:05
      4. Advanced Startup Options Part 2 00:10:18
      5. Boot Problems 00:04:38
      6. Event Viewer and Action Center 00:12:16
      7. Application Troubleshooting 00:12:53
      8. Kernel Panics 00:05:16
    14. Chapter 14 : Virtualization
      1. Virtualization Basics 00:07:23
      2. Your First Virtual Machine 00:09:22
      3. Infrastructure as a Service IaaS 00:09:39
      4. Platform as a Service PaaS 00:09:11
      5. Software as a Service SaaS 00:02:46
      6. Cloud Ownership 00:02:41
    15. Chapter 15 : The Internet
      1. Internet Options 00:06:17
      2. Proxy Servers 00:05:44
      3. Troubleshooting Internet Connections 00:08:33
    16. Chapter 16 : Understanding mobile devices
      1. Touring Android 00:05:57
      2. Touring iOS 00:04:19
      3. Touring Windows Mobile 00:03:17
    17. Chapter 17 : Care and Feeding of Mobile Devices
      1. Cellular Configuration 00:11:54
      2. Wireless Mobile Connections - Part 1 00:11:49
      3. Wireless Mobile Connections - Part 2 00:13:44
      4. Mobile Devices and Email 00:13:30
      5. Synchronization 00:07:38
      6. Securing Android Devices 00:07:02
      7. Securing iOS Devices 00:05:17
    18. Chapter 18 : Printers and Multifunction Devices
      1. Installing Local Printers 00:12:06
      2. Installing Network Printers 00:13:30
      3. Cloud Printing 00:04:59
    19. Chapter 19 : Securing Computers
      1. Physical Security 00:03:25
      2. Passwords and Authentication 00:08:21
      3. Protecting Against Snoops 00:03:59
      4. Malware 00:03:51
      5. Anti-Malware Applications 00:04:19
      6. Anti-Malware Practices 00:07:13
      7. Hardware Firewalls 00:08:48
      8. Software Firewalls 00:10:34
      9. Data Destruction 00:03:30
      10. Incident Response 00:02:58