Part A: Introduction
What is the CompTIA A+?.
CompTIA overlaps with.
CompTIA A+ has changed for 2022. What is new?.
What can you do with a CompTIA A+ Certification?.
CompTIA is “vendor neutral”.
CompTIA A+ consists of two sections, 220-1101 and 220-1102.
How do I obtain the A+ Certification?.
About the Exam…
Recommended Tools, Hardware & Software.
Acronyms Used in This Book.
Part B: 220-1101 1.0 Mobile Devices.
1.1 Given a scenario, install and configure laptop hardware and components.
1.2 Compare and contrast the display components of mobile devices.
1.3 Given a scenario, set up and configure accessories and ports of mobile devices.
1.4 Given a scenario, configure basic mobile device network connectivity and application support.
Part C: 220-1101 2.0 Networking.
2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes.
2.2 Compare and contrast common networking hardware devices.
2.3 Compare and contrast protocols for wireless networking.
2.4 Summarize services provided by networked hosts.
2.5 Given a scenario, install and configure basic wired/wireless small office / home office (SOHO) networks
2.6 Compare and contrast common network configuration concepts
2.7 Compare and contrast Internet connection types, network types, and their features.
2.8 Given a scenario, use appropriate networking tools.
Part D: 220-1101 3.0 Hardware.
3.1 Explain basic cable types and their connectors, features, and their purposes.
3.2 Given a scenario, install the appropriate RAM.
3.3 Given a scenario, select and install storage devices.
3.4 Given a scenario, install and configure motherboards, central processing units (CPUs), and add-on cards.
3.5 Given a scenario, install or replace the appropriate power supply.
3.6 Given a scenario, deploy and configure multifunction devices / printers and settings.
3.7 Given a scenario, install and replace printer consumables.
Part E 220-1101 4.0 Virtualization and Cloud Computing.
4.1 Summarize Cloud-Computing Concepts
4.2 Summarize aspects of client-side virtualization.
Part F 220-1101 5.0 Hardware and Network Troubleshooting.
5.1 Given a scenario, apply the best practice methodology to resolve problems.
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
5.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays.
5.4 Given a scenario, troubleshoot video, projector, and display issues.
5.5 Given a scenario, troubleshoot common issues with mobile devices.
5.6 Given a scenario, troubleshoot and resolve printer issues.
5.7 Given a scenario, troubleshoot problems with wired and wireless networks
Part G 220-1102 1.0 Operating Systems.
1.1 Identify basic features of Microsoft Windows editions
1.2 Given a scenario, use the appropriate Microsoft command line tools.
1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS)
1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility.
1.5 Given a scenario, use the appropriate Windows settings
1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop.
1.7 Given a scenario, apply application installation and configuration concepts
1.8 Explain common OS types and their purposes.
1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment
1.10 Identify common features and tools of the Mac OS / desktop OS.
1.11 Identify common features and tools of the Linux client / desktop OS.
Part H 220-1102 2.0 Security.
2.1 Summarize various security measures and their purposes.
2.2 Compare and contrast wireless security protocols and authentication methods.
2.3 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
2.4 Explain common social engineering attacks, threats, and vulnerabilities.
2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.
2.6 Given a scenario, configure a workstation to meet best practices for security.
2.7 Explain common methods for securing mobile and embedded devices.
2.8 Given a scenario, use common data destruction and disposal methods
2.9 Given a scenario, configure appropriate security settings on small office / home office (SOHO) wireless and wired networks.
2.10 Given a scenario, install and configure browsers and relevant security settings.
Part I 220-1102 3.0 Software Troubleshooting.
3.1 Given a scenario, troubleshoot common Windows OS problems.
3.2 Given a scenario, troubleshoot common personal computer (PC) security issues.
3.3 Given a scenario, use best practice procedures for malware removal.
3.4 Given a scenario, troubleshoot common mobile OS and application issues.
3.5 Given a scenario, troubleshoot mobile OS and application security issues.
Part J 220-1102 4.0 Operational Procedure.
4.1 Given a scenario, implement best practices associated with documentation and support systems information management
4.2 Explain basic change-management best practices.
4.3 Given a scenario, implement workstation backup and recovery methods
4.4 Given a scenario, use common safety procedures.
4.5 Summarize environmental impacts and local environmental controls
4.6 Explain the importance of prohibited content/activity, and privacy, licensing, and policy concepts.
4.7 Given a scenario, use proper communication techniques and professionalism.
4.8 Identify the basics of scripting.
4.9 Given a scenario, use remote access technologies.