CompTIA A+ Core 2

(SR-220-1202.AA1)
Lab
Get A Free Trial

Skills You’ll Get

1

Week 5

  • Creating a Restore Point
  • Enabling BranchCache
  • Configuring Screen Savers
  • Mounting a Drive to a Folder
  • Editing a Drive Letter
  • Propagating Permissions
  • Viewing the Status of a Disk
  • Using the netstat Command
  • Creating a Volume with Diskpart
  • Creating and Managing Dynamic Disks
  • Using the ipconfig and ifconfig Commands
  • Exploring Windows Registry
  • Personalizing Windows
  • Adding an MMC Snap-in
  • Managing Users and Groups in Windows
  • Using the Remote Desktop Service
  • Using Task Scheduler
  • Configuring Windows Defender Firewall
  • Setting Automatic Windows Updates
  • Uninstalling a Program
  • Observing the Control Panel Options from Different Views
  • Using Windows Security in Windows Defender Settings
  • Disabling the AutoPlay Feature
  • Setting Up a User Account
  • Installing a Printer
  • Configuring a VPN Connection
  • Creating a Power Plan
  • Configuring Proxy Settings
  • Installing and Uninstalling an Application in Windows
  • Configuring an IP Address in Linux
  • Managing Files and Directories
  • Searching for Files and Text in Linux
  • Managing Linux Passwords
  • Viewing Network Details Using Linux Commands
  • Managing Linux Processes
  • Converting a FAT32 Partition to NTFS
  • Diagnosing Network Issues Using Command-Line Utilities
  • Creating a Volume with Disk Management
  • Creating an Extended and Logical Partition
  • Mapping a Network Drive
  • Managing Linux File Permissions and Editing Text Files
  • Manipulating Files Using Command-Line Utilities
  • Archiving and Compressing Files in Linux
2

Week 6

  • Using Microsoft Office 365 Tools
  • Securing the Browser
  • Implementing Physical Security
  • Managing File Attributes and Permissions
  • Setting Up and Using Network File Sharing
  • Configuring NTFS Permissions
  • Sharing a Folder with a Specific User and Group
  • Configuring the Advanced Sharing Options
  • Configuring Folder Redirection in Windows
  • Enforcing Password Settings
  • Encrypting a File Using EFS
  • Using BitLocker to Encrypt a Drive
  • Encrypting and Decrypting a File Using OpenSSL
  • Implementing PGP for Secure Email and File Encryption
  • Performing Symmetric and Asymmetric Encryption
  • Configuring and Managing User Permissions in Windows
  • Configuring UAC Settings
  • Configuring Firewall Rules and Monitoring Network Logs Using pfsense
  • Examining Kerberos Settings
  • Implementing Malware Protection on Linux
  • Configuring a Windows Firewall
  • Viewing Logs in Windows Event Viewer
  • Using Task Manager for Performance Analysis
  • Monitoring System Performance Using Resource Monitor
  • Using Performance Monitor
  • Connecting an iPhone to Wi-Fi
  • Creating an OU
  • Configuring Group Policy Management
3

Week 7

  • Formatting and Cleaning a Disk
  • Jailbreaking an iPhone Exploring Customization and Risks
  • Detecting Threats Using Windows Defender
  • Configuring a Router Manually
  • Changing the Password for the Router
  • Configuring the SSID
  • Setting a Secure Passcode on iPhone
  • Installing an Application Based on System Requirements in Windows
  • Conducting a DoS Attack Using Smurf Attack
  • Conducting IP Spoofing
  • Creating and Binding an SSL Certificate to a Website
  • Simulating a DoS Attack
  • Simulating a DDoS Attack
  • Defending Against IP Spoofing
  • Using the SET Tool
  • Joining a Workstation to an AD Domain
  • Exploiting a Website Using SQL Injection
  • Attacking a Website Using XSS Injection
4

Week 8

  • Situations for Change Management
  • IT Project Management Cycle
  • Change Management Scenarios
  • IT Documentation Types
  • Scope of Change
  • ESD Prevention Tools
  • Electromagnetic Interference
  • Disassembling a Computer
  • Preventive Maintenance Kit Items
  • Basic Electronic Terminologies
  • Active Listening
  • Guidelines for Phone Support
  • Making Communication Easier
  • Demonstrating Professionalism
  • Password Policies
  • Regulatory Compliance Acts
  • Network Topology Diagrams
  • Asset Management
  • Security Threats of Artificial Intelligence
  • Artificial Intelligence and Mahine Learning
  • Proper Use of AI
  • Completing the Chain of Custody Form
  • Protecting the Computer Using a UPS
  • Creating a Restore Point
  • Configuring an SSH Server
  • Creating and Executing a Shell Script
  • Creating and Executing a Python Script
  • Creating and Executing a PowerShell Script
  • Creating Backups in Linux
  • Creating and Scheduling a Backup in Windows
  • Configuring and Using File History

Related Courses

All Courses
scroll to top