OVERVIEW
CompTIA A+ certification is considered as the entry-level certification for a career in Information Technology. This
certification validates individual’s skills for today’s competitive market. The CompTIA A+ training is a computer hardware course and covers maintenance of computers, laptops, mobiles, printers and operating systems.
CompTIA A Plus certification is an international, vendor-neutral certification recognized by major hardware and software vendors, distributors and resellers. CompTIA A+ certification confirms a technician’s ability to perform tasks on a computer system such as installation, configuration, diagnosing, preventive maintenance and basic networking. The performance-based multiple-choice exams cover computing technology domains such as security, safety and environmental issues and communication and professionalism. Get computer technician training to start a career in IT. Our CompTIA A+ course is an intensive hands-on course.
WHY US?
Expert trainers: imparting real-world experience
Small class size: increased instructor interaction
PRE-REQUISITES
Basic Computer Knowledge
EXAM
Candidates can achieve this certification by passing the following exam(s).
220-1001
220-1002
SKILLS GAINED
➢ Peripherals and Adapters
➢ System Components
➢ Troubleshooting and Mobile Devices
➢ Printer and Network Hardware
➢ Networks
➢ Supporting Windows
➢ Supporting Windows Networks
➢ Linux, OS X, and Mobile OS
This course is likely to add to the employment related skills of the participants. The skills developed are likely to be used in the course of being an employee or working in a business.
AUDIENCE
➢ University students
➢ Helpdesk operators
➢ Candidates entering IT job market
➢ First-level network support staff
➢ Individuals seeking A+ certification
Curriculum
- 2 Sections
- 77 Lessons
- 30 Hours
- CORE 1 (220-1001)40
- 2.11.0 MOBILE DEVICES
- 2.2Install and configure laptop hardware and components
- 2.3Install components within the display of a laptop
- 2.4Use appropriate laptop features
- 2.5Compare and contrast characteristics of various types of other mobile devices
- 2.6Connect and configure accessories and ports of other mobile devices
- 2.7Configure basic mobile device network connectivity and application support
- 2.8Use methods to perform mobile device synchronization
- 2.92.0 NETWORKING
- 2.10Compare and contrast TCP and UDP ports, protocols, and their purposes.
- 2.11Compare and contrast common networking hardware devices
- 2.12Install and configure a basic wired/wireless SOHO network
- 2.13Compare and contrast wireless networking protocols
- 2.14Summarize the properties and purposes of services provided by networked hosts
- 2.15Explain common network configuration concepts
- 2.16Compare and contrast Internet connection types, network types, and their features
- 2.17Use appropriate networking tools
- 2.183.0 HARDWARE
- 2.19Explain basic cable types, features, and their purposes
- 2.20Identify common connector types
- 2.21install RAM types
- 2.22Select, Install and Configure storage devices
- 2.23Install and configure motherboards, CPUs, and add-on cards
- 2.24Explain the purposes and uses of various peripheral types
- 2.25Summarize power supply types and features.
- 2.26Select and configure appropriate components for a custom PC configuration to meet customer specifications or needs.
- 2.27Install and configure common devices
- 2.28Configure SOHO multifunction devices/printers and settings
- 2.29Install and maintain various print technologies
- 2.304.0 VIRTUALIZATION & CLOUD COMPUTING
- 2.31Compare and contrast cloud computing concepts.
- 2.32Set up and configure client-side virtualization
- 2.335.0 HARDWARE & NETWORK TROUBLESHOOTING
- 2.34Use the best practice methodology to resolve problems
- 2.35Troubleshoot problems related to motherboards, RAM, CPUs, and power
- 2.36Troubleshoot hard drives and RAID arrays
- 2.37Troubleshoot video, projector, and display issues
- 2.38Troubleshoot common mobile device issues while adhering to the appropriate procedures
- 2.39Troubleshoot printers
- 2.40Troubleshoot common wired and wireless network problems
- CORE 2 (220-1002)37
- 3.11.0 OPERATING SYSTEMS
- 3.2Compare and contrast common operating system types and their purposes
- 3.3Compare and contrast features of Microsoft Windows versions.
- 3.4Summarize general OS installation considerations and upgrade methods
- 3.5Use appropriate Microsoft command line tools
- 3.6Use Microsoft operating system features and tools
- 3.7Use Microsoft Windows Control Panel utilities
- 3.8Summarize application installation and configuration concepts.
- 3.9Configure Microsoft Windows networking on a client/desktop
- 3.10Use features and tools of the Mac OS and Linux client/desktop operating systems
- 3.112.0 SECURITY
- 3.12Summarize the importance of physical security measures
- 3.13Explain logical security concepts
- 3.14Compare and contrast wireless security protocols and authentication methods
- 3.15Detect, Remove, and Prevent malware using appropriate tools and methods
- 3.16Compare and contrast social engineering, threats, and vulnerabilities
- 3.17Compare and contrast the differences of basic Microsoft Windows OS security settings
- 3.18Implement security best practices to secure a workstation
- 3.19Implement methods for securing mobile devices
- 3.20Implement appropriate data destruction and disposal methods
- 3.21Configure security on SOHO wireless and wired networks
- 3.223.0 SOFTWARE TROUBLESHOOTING
- 3.23Troubleshoot Microsoft Windows OS problems
- 3.24Troubleshoot and resolve PC security issues
- 3.25Use best practice procedures for malware removal
- 3.26Troubleshoot mobile OS and application issues
- 3.27Troubleshoot mobile OS and application security issues
- 3.284.0 OPERATIONAL PROCEDURES
- 3.29Compare and contrast best practices associated with types of documentation
- 3.30Implement basic change management best practices
- 3.31Implement basic disaster prevention and recovery methods
- 3.32Explain common safety procedures.
- 3.33Explain environmental impacts and appropriate controls
- 3.34Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts
- 3.35Use proper communication techniques and professionalism
- 3.36Identify the basics of scripting
- 3.37Use remote access technologies