Description
£811.00
The CompTIA A+ certification is the essential computer technician authorization, and is required by over 100 leading employers. This course gives you the once-over and practice you need to approach the exam with confidence. CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.
Description
What Is The CompTIA A+ (901 & 902)?
The CompTIA A+ certification is the essential computer technician authorization, and is required by over 100 leading employers. This course gives you the once-over and practice you need to approach the exam with confidence. CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.
CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.
Key Areas
- Look over PC hardware, laptops, printers, and mobile devices
- Review the fundamentals of networking and security
- Research into the latest operating systems and operating procedures
- Troubleshoot typical IT issues, and learn the latest best practices
Training Solution Breakdown
- Intuitive and rewarding online training resources
- Official CompTIA Exams
- Comprehensive Freephone or email support
- 24/7 access to training materials
- Study anytime, anywhere in a world for a flexible learning experience
- Full mock examinations to fully prepare you for any final exam
- 12 months unrestricted access
- Access to online or classroom training options
- Progress reviews & comprehensive assessments to ensure efficient understanding of course content
- Career advice and CV support upon completion of the training
CompTIA A+ 2016 Breakdown
Click below to expand the areas and see more information.
220-901 Outline
-
1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
- Firmware upgrades – flash BIOS
- BIOS component information
- BIOS configurations
- Built-in diagnostics
- Monitoring
-
1.2 Explain the importance of motherboard components, their purpose, and properties.
- Sizes
- Expansion slots
- RAM slots
- CPU sockets
- Chipsets
- CMOS battery
- Power connections and types
- Fan connectors
- Front/Top panel connectors
- Bus speeds
-
1.3 Compare and contrast various RAM types and their features.
- Types
- RAM compatibility
-
1.4 Install and configure PC expansion cards.
- Sound cards
- Video cards
- Network cards
- USB cards
- Firewire cards
- Thunderbolt cards
- Storage cards
- Modem cards
- Wireless/cellular cards
- TV tuner cards
- Video capture cards
- Riser cards
-
1.5 Install and configure storage devices and use appropriate media.
- Optical drives
- Magnetic hard disk drives
- Hot swappable drives
- Solid state/flash drives
- RAID types
- Tape drive
- Media capacity
-
1.6 Install various types of CPUs and apply the appropriate cooling methods.
- Socket types
- Characteristics
- Cooling
-
1.7 Compare and contrast various PC connection interfaces, their characteristics and purpose.
- Physical connections
- Wireless connections
- Characteristics
- 1.8 Install a power supply based on given specifications.
-
1.9 Given a scenario, select the appropriate components for a custom PC configuration, to meet customer specifications or needs.
- Graphic / CAD / CAM design workstation
- Audio/Video editing workstation
- Virtualization workstation
- Gaming PC
- Home Theater PC
- Standard thick client
- Thin client
- Home Server PC
-
1.10 Compare and contrast types of display devices and their features.
- Types
- Refresh / frame rates
- Resolution
- Native resolution
- Brightness/lumens
- Analog vs. digital
- Privacy/antiglare filters
- Multiple displays
- Aspect ratios
-
1.11 Identify common PC connector types and associated cables.
- Display connector types
- Display cable types
- Device cables and connectors
- Adapters and convertors
-
1.12 Install and configure common peripheral devices.
- Input devices
- Output devices
- Input & Output devices
-
1.13 Install SOHO multifunction device/printers and configure appropriate settings.
- Use appropriate drivers for a given operating system
- Device sharing
- Public/shared devices
-
1.14 Compare and contrast differences between the various print technologies and the associated imaging process.
- Laser
- Inkjet
- Thermal
- Impact
- Virtual
-
1.15 Given a scenario, perform appropriate printer maintenance.
- Laser
- Thermal
- Impact
- Inkjet
For more information, contact one of our course advisors
-
2.1 Identify the various types of network cables and connectors.
- Fiber
- Twisted Pair
- Coaxial
-
2.2 Compare and contrast the characteristics of connectors and cabling.
- Fiber
- Twisted pair
- Coaxial
-
2.3 Explain the properties and characteristics of TCP/IP.
- IPv4 vs. IPv6
- Public vs. private vs. APIPA/link local
- Static vs. dynamic
- Client-side DNS settings
- Client-side DHCP
- Subnet mask vs. CIDR
- Gateway
-
2.4 Explain common TCP and UDP ports, protocols, and their purpose.
- Ports
- Protocols
- TCP vs. UDP
-
2.5 Compare and contrast various WiFi networking standards and encryption types.
- Standards
- Encryption types
-
2.6 Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings.
- Channels
- Port forwarding, port triggering
- DHCP (on/off)
- DMZ
- NAT / DNAT
- Basic QoS
- Firmware
- UPnP
-
2.7 Compare and contrast Internet connection types, network types, and their features.
- Internet Connection Types
- Network Types
-
2.8 Compare and contrast network architecture devices, their functions, and features.
- Hub
- Switch
- Router
- Access point
- Bridge
- Modem
- Firewall
- Patch panel
- Repeaters/extenders
- Ethernet over Power
- Power over Ethernet injector
-
2.9 Given a scenario, use appropriate networking tools.
- Crimper
- Cable stripper
- Multimeter
- Tone generator & probe
- Cable tester
- Loopback plug
- Punchdown tool
- WiFi analyzer
For more information, contact one of our course advisors
-
3.1 Install and configure laptop hardware and components.
- Expansion options
- Hardware/device replacement
-
3.2 Explain the function of components within the display of a laptop.
- Types
- Wi-Fi antenna connector/placement
- Webcam
- Microphone
- Inverter
- Digitizer
-
3.3 Given a scenario, use appropriate laptop features.
- Special function keys
- Docking station
- Physical laptop lock and cable lock
- Rotating / removable screens
-
3.4 Explain the characteristics of various types of other mobile devices.
- Tablets
- Smart phones
- Wearable technology devices
- Phablets
- e-Readers
- Smart camera
- GPS
-
3.5 Compare and contrast accessories & ports of other mobile devices.
- Connection types
- Accessories
For more information, contact one of our course advisors
-
4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
- Common symptoms
- Tools
-
4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
- Common symptoms
- Tools
-
4.3 Given a scenario, troubleshoot common video, projector and display issues.
- Common symptoms
-
4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
- Common symptoms
- Hardware tools
- Command line tools
-
4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
- Common symptoms
- Disassembling processes for proper re-assembly
-
4.6 Given a scenario, troubleshoot printers with appropriate tools.
- Common symptoms
- Tools
For more information, contact one of our course advisors
220-902 Outline
-
1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
- Features
- Upgrade paths
-
1.2 Given a scenario, install Windows PC operating systems using appropriate methods.
- Boot methods
- Type of installations
- Partitioning
- File system types/formatting
- Load alternate third party drivers when necessary
- Workgroup vs. Domain setup
- Time/date/region/language settings
- Driver installation, software and windows updates
- Factory recovery partition
- Properly formatted boot drive with the correct partitions/format
-
1.3 Given a scenario, apply appropriate Microsoft command line tools.
- TASKKILL
- BOOTREC
- SHUTDOWN
- TASKLIST
- MD
- RD
- CD
- DEL
- FORMAT
- COPY
- XCOPY
- ROBOCOPY
- DISKPART
- SFC
- CHKDSK
- GPUPDATE
- GPRESULT
- DIR
- EXIT
- HELP
- EXPAND
- [command name]/?
- Commands available with standard privileges vs. administrative privileges.
-
1.4 Given a scenario, use appropriate Microsoft operating system features and tools
- Administrative
- MSCONFIG
- Task Manager
- Disk management
- Other
- System utilities
-
1.5 Given a scenario, use Windows Control Panel utilities.
- Internet options
- Display/Display Settings
- User accounts
- Folder options
- System
- Windows firewall
- Power options
- Programs and features
- HomeGroup
- Devices and Printers
- Sound
- Troubleshooting
- Network and Sharing Center
- Device Manager
-
1.6 Given a scenario, install and configure Windows networking on a client/desktop.
- HomeGroup vs. WorkGroup
- Domain setup
- Network shares/administrative shares/mapping drives
- Printer sharing vs. network printer mapping
- Establish networking connections
- Proxy settings
- Remote Desktop Connection
- Remote Assistance
- Home vs. Work vs. Public network settings
- Firewall settings
- Configuring an alternative IP address in Windows
- Network card properties
-
1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools.
- Best practices
- Tools
For more information, contact one of our course advisors
-
2.1 Identify common features and functionality of the Mac OS and Linux operating systems.
- Best practices
- Tools
- Features
- Basic Linux commands
-
2.2 Given a scenario, setup and use client-side virtualization.
- Purpose of virtual machines
- Resource requirements
- Emulator requirements
- Security requirements
- Network requirements
- Hypervisor
-
2.3 Identify basic cloud concepts.
- SaaS
- IaaS
- Paas
- Public vs. Private vs. Hybrid vs. Community
- Rapid Elasticity
- On-demand
- Resource pooling
- Measured service
-
2.4 Summarize the properties and purpose of services provided by networked hosts.
- Server roles
- Internet appliance
- Legacy / embedded systems
-
2.5 Identify basic features of mobile operating systems.
- Android vs. iOS vs. Windows
-
2.6 Install and configure basic mobile device network connectivity and email.
- Wireless / cellular data network (enable/disable)
- Bluetooth
- Corporate and ISP email configuration
- Integrated commercial provider email configuration
- PRI updates/PRL updates/Baseband updates
- Radio firmware
- IMEI vs. IMSI
- VPN
-
2.7 Summarize methods and data related to mobile device synchronization.
- Types of data to synchronize
- Synchronization methods
- Mutual authentication for multiple services (SSO)
- Software requirements to install the application on the PC
- Connection types to enable synchronization
For more information, contact one of our course advisors
-
3.1 Identify common security threats and vulnerabilities.
- Malware
- Phishing
- Spear phishing
- Spoofing
- Social engineering
- Shoulder surfing
- Zero day attack
- Zombie/botnet
- Brute forcing
- Dictionary attacks
- Non-compliant systems
- Violations of security best practices
- Tailgating
- Man-in-the-middle
-
3.2 Compare and contrast common prevention methods.
- Physical security
- Digital security
- User education/AUP
- Principle of least privilege
-
3.3 Compare and contrast differences of basic Windows OS security settings.
- User and groups
- NTFS vs. Share permissions
- Shared files and folders
- System files and folders
- User authentication
- Run as administrator vs. standard user
- Bitlocker
- Bitlocker-To-Go
- EFS
-
3.4 Given a scenario, deploy and enforce security best practices to secure a workstation.
- Password best practices
- Account management
- Disable autorun
- Data encryption
- Patch/update management
-
3.5 Compare and contrast various methods for securing mobile devices.
- Screen locks
- Remote wipes
- Locator applications
- Remote backup applications
- Failed login attempts restrictions
- Antivirus/Antimalware
- Patching/OS updates
- Biometric authentication
- Full device encryption
- Multifactor authentication
- Authenticator applications
- Trusted sources vs. untrusted sources
- Firewalls
- Policies and procedures
-
3.6 Given a scenario, use appropriate data destruction and disposal methods.
- Physical destruction
- Recycling or repurposing best practices
For more information, contact one of our course advisors
-
4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
- Common symptoms
- Tools
-
4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
- Common symptoms
- Tools
-
4.3 Given a scenario, troubleshoot common video, projector and display issues.
- Common symptoms
-
4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
- Common symptoms
- Hardware tools
- Command line tools
-
4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
- Common symptoms
- Disassembling processes for proper re-assembly
-
4.6 Given a scenario, troubleshoot printers with appropriate tools.
- Common symptoms
- Tools
For more information, contact one of our course advisors
-
5.1 Given a scenario, use appropriate safety procedures.
- Equipment grounding
- Toxic waste handling
- Personal safety
- Compliance with local government regulations
-
5.2 Given a scenario with potential environmental impacts, apply the appropriate controls.
- MSDS documentation for handling and disposal
- Temperature, humidity level awareness and proper ventilation
- Power surges, brownouts, blackouts
- Protection from airborne particles
- Dust and debris
- Compliance to local government regulations
-
5.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts.
- Incident Response
- Licensing / DRM / EULA
- Personally Identifiable Information
- Follow corporate end-user policies and security best practices
-
5.4 Demonstrate proper communication techniques and professionalism.
- Use proper language – avoid jargon, acronyms, slang when applicable
- Maintain a positive attitude / Project confidence
- Actively listen (taking notes) and avoid interrupting the customer
- Be culturally sensitive
- Be on time (if late contact the customer)
- Avoid distractions
- Dealing with difficult customer or situation
- Set and meet expectations/timeline and communicate status with the customer
- Deal appropriately with customers confidential and private materials
-
5.5 Given a scenario, explain the troubleshooting theory.
- Always consider corporate policies, procedures and impacts before implementing changes.
- 1. Identify the problem
- 2. Establish a theory of probable cause (question the obvious)
- 3. Test the theory to determine cause
- 4. Establish a plan of action to resolve the problem and implement the solution
- 5. Verify full system functionality and if applicable implement preventive measures
- 6. Document findings, actions and outcomes
For more information, contact one of our course advisors
For more information, contact one of our course advisors
- CompTIA A+ 220-901
- CompTIA A+ 220-902
For more information, contact one of our course advisors
Achieving a CompTIA A+ qualification will unlock a number of doors for you
within the IT industry, with salaries for those that hold an A+
certification ranging from £16,000 to £56,673.
The roles that you will be qualified for are as follows:
- Support Technician
- Support Engineer
- Support Analyst
- Service Desk Analyst
- IT Manager
For more information, contact one of our course advisors