This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA A+ Certification Lab CompTIA A+ 220-1101, 220-1102
1. Introduction to CompTIA A+ Certification Lab CompTIA A+ 220-1101, 220-1102
1. CompTIA A+ Course Introduction (1:06)
2. What is the CompTIA A+ (1:24)
3. How Can We Get CompTIA A+ (1:31)
2. About Computer in Comptia A+
1. History of Computer (1:40)
2. What is a Computer (1:25)
3. Benefits of Using Computer (0:37)
4. Types of Computer (1:07)
3. Components of Computer for Comptia A+
1. Input Processing - Output Cycle (6:27)
2. Computer Inputs (0:57)
3. What is Processing (1:18)
4. Cyber Attacks to CPU (1:04)
5. What is Storing (0:53)
6. Output (1:25)
7. Computer Components (2:54)
8. Input Devices (2:28)
4. Storage Devices in Comptia IT Fundamentals
1. Primary and Secondary Memory (4:22)
2. RAM (1:18)
3. SRAM and DRAM (1:28)
4. ROM (1:12)
5. PROM, EPROM, EEPROM (1:04)
6. What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices (2:19)
7. Network attached storage (1:40)
8. Cloud Storage (1:16)
5. Processing Devices in Comptia A+
1. CPU (3:00)
2. GPU (2:46)
3. Motherboard (1:15)
4. Output Devices (0:38)
6. IoT & Mobile
1. What is IoT (3:25)
2. Where does IoT Exist in Our Lives (1:47)
3. How does IoT work (0:47)
4. Connection Standarts (9:06)
5. IoT Security (7:04)
6. Mobile Security Threats (8:02)
7. Output Devices in Comptia A+ 220-1001
1. What is Monitor (3:40)
2. What is Printer (1:59)
3. What are Headphones (3:15)
4. What is Computer Speaker (1:48)
5. What is Projector (1:13)
6. What is GPS (2:28)
8. Cables
1. Ethernet (2:01)
2. Fiber (2:25)
3. VGA (2:03)
4. HDMI (1:32)
5. DisplayPort (1:50)
6. DVI (1:32)
7. SATA Cables (1:21)
8. USB (2:21)
9. Network Fundamentals in Comptia A+
2. Content of the Network Fundamentals (1:07)
3. Basic Terms of Networking (5:36)
4. Reference Models (0:24)
5. TCPIP (Networking) Basics (13:43)
6. OSI Reference Model vs. TCPIP Reference Model (2:33)
7. Network Layers in Real World (7:59)
8. Layer 2 - Data Link Layer (3:50)
9. Layer 2 Ethernet - Principles, Frames & Headers (4:06)
10. Layer 2 ARP - Address Resolution Protocol (6:10)
11. Layer 2 Analysing ARP Packets (3:14)
12. Layer 2 VLANs (Virtual Local Area Networks) (4:03)
13. Layer 2 WLANs (Wireless Local Area Networks) (7:01)
14. Layer 3 - Network Layer (1:37)
15. Layer 3 IP (Internet Protocol) (2:49)
16. Layer 3 IPv4 Addressing System (1:56)
17. Layer 3 IPv4 Packet Header (2:56)
18. Layer 3 Subnetting - Classful Networks (2:35)
19. Layer 3 Subnetting Masks (2:59)
20. Layer 3 Understanding IPv4 Subnets (3:09)
21. Layer 3 IPv4 Address Shortage (1:41)
22. Layer 3 Private Networks (3:59)
23. Layer 3 Private Networks - Demonstration (3:01)
24. Layer 3 NAT (Network Address Translation) (4:30)
25. Layer 3 IPv6, Packet Header & Addressing (8:30)
26. Layer 3 DHCP - How the Mechanism Works (9:23)
27. Layer 3 ICMP (Internet Control Message Protocol) (2:02)
28. Layer 3 Traceroute (9:51)
29. Layer 4 - Transport Layer (2:40)
30. Layer 4 TCP (Transmission Control Protocol) (6:59)
31. Layer 4 TCP Header (2:27)
32. Layer 4 UDP (User Datagram Protocol) (3:56)
33. Layer 5-7 - Application Layer (0:55)
34. Layer 7 DNS (Domain Name System) (5:56)
35. Layer 7 HTTP (Hyper Text Transfer Protocol) (3:09)
36. Layer 7 HTTPS (1:56)
37. GNS3 - Graphical Network Simulator (3:30)
38. GNS3 Setting Up the First Project (7:57)
39. GNS3 Tool Components (2:56)
40. GNS3 Building the Network (15:45)
41. GNS3 Attaching VMware VMs (Including Kali) to the Network (6:31)
42. GNS3 Configuring Switch & Router (Cisco) and creating VLANs (5:13)
43. Active Network Devices Router, Switch, Hub (4:44)
44. Wireless Access Point(WAP) (1:06)
45. Summary of Network Fundamentals (1:23)
10. Operating Systems in CompTIA A+220-1102
1. Functions Of Operating Systems (10:25)
2. Kinds of Operating System (1:47)
3. 32-Bit vs. 64-Bit File Systems (3:24)
4. FAT32 (1:33)
5. FAT64 (2:21)
6. Windows (2:17)
7. Apple Macintosh OS (1:52)
8. Linux Systems (5:12)
9. Android (1:25)
10. iOS (1:23)
11. Chrome OS (1:13)
11. Linux Fundamentals
1. What is Linux (1:34)
2. Distributions (1:22)
3. Pieces of Linux (2:57)
4. Shell (2:05)
5. Linux Signs $, #, %, ~ (0:59)
12. Basic Linux Commands - 1
1. Command Parameters (2:19)
2. List Files - ls Command (4:34)
3. Print Working Directory - pwd Command (0:55)
4. Show Manuel - man Command (2:11)
5. Change Directory - cd Command (2:18)
6. Concatenate Files - cat Command (2:17)
7. Display Output - echo Command (1:34)
13. Basic Linux Commands - 2
1. View the File with more Command (2:22)
2. View the File with less Command (1:23)
3. Print First Lines with head Command (1:15)
4. Print Last Lines with tail Command (1:39)
5. Global Regular Expression Print - grep Command (3:35)
6. Unix Name - uname Command (0:47)
7. Output Redirection (2:37)
8. Output Redirection Pipe “” (2:17)
9. Make Directory - mkdir Command (1:22)
10. Create File & Modify Date - touch Command (1:20)
11. Remove Files or Directories - rm Command (2:07)
12. Copy and Move Files or Directories - cp & mv Command (1:58)
13. Find Files and Directories - find Command (2:24)
14. Cut Parts of Lines - cut Command (2:51)
15. Change Ownership of a Given File - chown Command (1:32)
14. Wi-fi Network Fundamentals
1. Basic Terminologies and Concepts (4:50)
2. Wireless Operating Modes (6:11)
3. Wireless Packet Types (5:22)
4. Wireshark Analysing Packet Types (6:33)
5. Wireless Encryption Protocols WEP vs. WPA (3:58)
6. WPA 4-Way Handshake (5:45)
7. Wireshark WEP and WPA (1:10)
15. Windows Fundamentals in CompTIA A+ Certification
1. Introduction to Users and Groups (2:48)
2. Managing Users and Groups (1:22)
3. NTFS Permissions (1:54)
4. File Explorer (1:25)
5. MSCONFIG (2:06)
6. Services (Services.msc) (1:30)
7. Performance Monitor (1:56)
8. Task Manager (2:58)
9. Disk Management (1:50)
10. MSTSC (1:23)
16. Hardware and Network Troubleshooting in Comptia A+ 220-1101
1. Troubleshooting Methodology (3:24)
2. System Lockups (2:52)
3. Troubleshooting Internet Connections (3:33)
4. Check the Wi-Fi Settings (1:12)
5. Who Else Is Using the Internet (1:32)
6. BIOS Time and Setting Resets (2:54)
7. Attempts to Boot to Incorrect Device (2:25)
17. Software Troubleshooting in Comptia A+ Certification
1. Slow System Performance (1:56)
2. Common Symptoms of Malware Infections (2:43)
3. macOS Boot Errors (1:54)
4. Windows Boot Errors (2:23)
5. Linux Boot Errors (2:09)
18. Libraries and Virtualization
1. What is a Library - 1 (4:48)
2. What is Virtualization (1:06)
3. Types of Virtualization (1:36)
4. Functions of Virtualization (1:06)
5. Security of the Virtualization (3:01)
6. Virtualization Lab Exercise - 1 (8:21)
7. Virtualization Lab Exercise - 2 (12:35)
8. What is a Library - 2 (4:21)
19. Programming Languages
1. Programming Languages (4:54)
2. Types of Programming (9:19)
20. Database Fundamentals
1. What is database (3:19)
2. RDBMS(Relational Database Management System) (2:24)
3. What is SQLQuery (2:47)
4. Install MS SQL Server Express Edition 2019 (4:35)
5. Insert Data to Table (10:06)
6. Update Data in A Table (5:42)
7. Delete Data and AdventureWorks (6:17)
21. Cloud Computing
1. Characteristics of Cloud Computing (9:19)
2. What is Cloud Computing (3:38)
3. Cloud Service Modules - 1 (7:31)
4. Cloud Service Modules - 2 (6:27)
5. What is Cloud Security (3:33)
6. How does cloud security work (3:19)
7. What makes cloud security different (3:24)
8. Why is cloud security important (2:26)
9. Cloud Security Benefits& Disadvantages (7:14)
22. Security in Comptia A+
1. What is Security (2:23)
2. Privacy-Integrity-Availability (3:15)
3. Encryption and Access Control (2:54)
4. A Rule (Authentication, Authorization and Accounting) (3:53)
5. What is a Hacker (6:27)
6. What is Attack What are the Stages (3:19)
7. Terms Asset, Threat, Vulnerability, Risk, Exploit (3:08)
8. What is a Zero-day Attack (4:19)
9. What are BotBotnet and Zombies (1:45)
10. What are DoS and DDoS Attacks (2:57)
11. Malware Types (1:45)
23. Social Engineering
1. Terminologies Part 1 (5:19)
2. Terminologies Part 2 (6:08)
3. Sending Fake Emails - Phishing (1:11)
4. Vishing - Voice Phishing (3:41)
3. NTFS Permissions
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock