CompTIA A+ Core 2
I. Overview:
Start your tech career with CompTIA A+, the industry standard certification for entry-level roles. Trusted by employers worldwide, A+ builds foundational skills in hardware, software, networking, troubleshooting, and security. The latest version, V15, is updated for today's technology and prepares you for roles like IT support specialist and help desk technician through two exams—Core 1 and Core 2.
II. Duration: 48 hours (6 days)
III. Objectives:
- Apply basic cybersecurity methods to mitigate threats and secure systems.
- Install and support multiple operating systems, including Windows, Linux, and macOS.
- Follow best practices for safety, environmental impacts, and effective communication.
- Provide customer support using appropriate troubleshooting and communication skills.
IV. Intended Audience:
- Echnical support specialist
- System administrator
- Cyber defense infrastructure support specialist
V. Prerequisites:
- 12 months of hands-on experience in an IT support specialist job role.
VI. Course outlines:
1. Operating Systems
- Explain common operating system (OS) types and their purposes.
- Given a scenario, perform OS installations and upgrades in a diverse environment.
- Compare and contrast basic features of Microsoft Windows editions.
- Given a scenario, use Microsoft Windows operating system features and tools.
- Given a scenario, use the appropriate Microsoft command-line tools.
- Given a scenario, configure Microsoft Windows settings.
- Given a scenario, configure Microsoft Windows networking features on a client/desktop.
- Explain common features and tools of the macOS/desktop operating system.
- Identify common features and tools of the Linux client/desktop operating system.
- Given a scenario, install applications according to requirements.
- Given a scenario, install and configure cloud-based productivity tools.
2. Security
- Summarize various security measures and their purposes.
- Given a scenario, configure and apply basic Microsoft Windows OS security settings.
- Compare and contrast wireless security protocols and authentication methods.
- Summarize types of malware and tools/methods for detection, removal, and prevention.
- Compare and contrast common social engineering attacks, threats, and vulnerabilities.
- Given a scenario, implement procedures for basic small office/home office (SOHO) malware removal.
- Given a scenario, apply workstation security options and hardening techniques.
- Given a scenario, apply common methods for securing mobile devices.
- Compare and contrast common data destruction and disposal methods.
- Given a scenario, apply security settings on SOHO wireless and wired networks.
- Given a scenario, configure relevant security settings in a browser.
3. Software Troubleshooting
- Given a scenario, troubleshoot common Windows OS issues.
- Given a scenario, troubleshoot common mobile OS and application issues.
- Given a scenario, troubleshoot common mobile OS and application security issues.
- Given a scenario, troubleshoot common personal computer (PC) security issues.
4. Operational Procedures
- Given a scenario, implement best practices associated with documentation and support systems information management.
- Given a scenario, apply change management procedures.
- Given a scenario, implement workstation backup and recovery methods.
- Given a scenario, use common safety procedures.
- Summarize environmental impacts and local environment controls.
- Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.
- Given a scenario, use proper communication techniques and professionalism.
- Explain the basics of scripting.
- Given a scenario, use remote access technologies.
- Explain basic concepts related to artificial intelligence (AI).
Học trực tuyến
Học tại Hồ Chí Minh
Học tại Hà Nội



