Library

Course: CompTIA A+ Certification 902. The Total Course

CompTIA A+ Certification 902. The Total Course

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

Welcome to the CompTIA A+ Certification 902. The Total Course from Mike Meyers and Total Seminars.

This is the second of a two course series for CompTIA A+ and is designed to prepare you to take and pass the CompTIA A+ 220-902 exam. To become fully A+ certified you will need to pass both the 220-901 and 220-902 exams. This course is over 10 hours in length containing over 100 video lectures. The first goal of the course is to make you a good PC Tech and in the process make sure you are ready to pass the CompTIA 902 exam.

The course covers all the CompTIA A+ 220-902 Objective Domains:

  • Windows Operating Systems: 29%
  • Other Operating Systems & Technologies: 12%
  • Security: 17%
  • Software Troubleshooting: 28%
  • Operational Procedures: 13%

Topics include how to:

  • Set up, upgrade and maintain all versions of Windows
  • Basics of OS X and Linux
  • Configure and secure mobile devices
  • Protect your PC and your network
  • Work with virtualization technologies
  • Understand safety and environmental issues

Who is the target audience?

  • This course is intended for anyone that is preparing for an entry level PC technician position or looking to improve their skills and become CompTIA A+ Certified. However, it goes beyond that and will give you the skills you need to be a better tech on the job
Basic knowledge
  • Basic familiarity with PCs and networks
  • There are no specific prerequisites as the course covers all the topics in detail
What you will learn
  • This is a complete and comprehensive CompTIA A+ 220-902 course. It is designed to prepare the student to be able to take and pass the second of two A+ exams needed to become CompTIA A+ Certified. To become A+ Certified requires you to pass BOTH the 220-901 and 220-902 exams. There is a separate course covering the 220-901 exam
  • Once you complete the two CompTIA A+ courses, you will have the knowledge and confidence to pass the exams AND the skills to be a great PC tech. This course is ideal as both a study tool and an on-the-job reference
  • Your new skills and the CompTIA A+ Certification will help you land your first PC tech job or if you are already a PC tech, get that raise or advancement you are seeking
Curriculum
Lectures quantity: 101
Common duration: 13:58:58
Path of the PC Tech
  • What is the CompTIA A+  

    In this episode, Mike welcomes you to the CompTIA A+ course.

  • How to Pass the A+ Exams  

    In this episode, Mike discusses strategies for successfully studying for the CompTIA A+ exams.


  • What is on the A+ 220-902 Exam  

    In this episode, Mike goes into detail explaining what is covered on the CompTIA A+ 220-902 Exam.

  • Why Get A+ Certified Preview  

    Why Get A+ Certified.



Operational Procedures
  • Professionalism  

    In this episode, Mike talks about acting like a professional tech.

  • Communication  

    In this episode, Mike explains how to properly communicate with customers while on the job.

  • Three Threats to Your PC  

    In this episode, Mike teaches the dangers of and avoidance strategies for ESD, EMI, and RFI.


  • Physical Safety  

    In this episode, Mike and Ford demonstrate proper (and improper) techniques on physical safety, including what to wear, when to unplug the computer, and how to properly lift heavy items.


  • Equipment Safety  

    In this episode, Mike teaches you how to keep your equipment safe, including proper techniques for managing cables, extinguishing fires, and testing electricity. You will also learn what items to keep in your tech toolkit.

  • Troubleshooting Theory  

    In this episode, Mike and Janelle use the CompTIA A+ troubleshooting process to fix a printer issue at the office.

The Visible Computer
  • Touring Windows Vista  

    In this episode, Mike takes you on a tour of Microsoft's Windows Vista operating system.

  • Touring Windows 7 Part 1  

    In the first of three episodes touring Windows 7, Mike explores the Aero desktop, gadgets, and User Account Control (UAC).

  • Touring Windows 7 Part 2  

    In the second of three episodes touring Windows 7, Mike discusses the Action Center, Event Viewer and log files, and Windows 7 Compatibility mode.


  • Touring Windows 7 Part 3  

    In the third of three episodes touring Windows 7, Mike covers Homegroups, with their reliance on IPv6; Task Manager, the tool for dealing with unruly applications; and Resource Monitor, a great tool for checking system performance.

  • Touring Windows 8  

    In this episode, Mike looks at features of the user interface that makes Windows 8 very different from previous versions of Windows. He explores the Start screen, with its tiled apps that open full screen and can only be purchased from the Store app. Mike finishes the episode with a look at Windows 8.1, where Microsoft brought back the Start button and other useful features.

  • Touring Windows 10  

    In this Beyond A+ episode, Mike discusses aspects of Windows 10 from the perspective of Windows 8 users, covering UI improvements, multiple desktops, Microsoft Edge browser, and Cortana, the voice assistant.

  • Touring OS X  

    In this episode, Mike takes you on a tour of Apple's OS X operating system.

  • Touring Ubuntu Linux  

    In this episode, Mike explores Ubuntu Linux, a well-liked and polished distro, focusing on the Unity interface options

  • Tech Paths  

    In this episode, Mike describes how to get to essential tech tools in every OS on the CompTIA A+ exams, such as Windows Vista/7/8/8.1, Linux, and Mac OS X.

RAM
  • RAM: Sticks and Speeds  

    These horned creatures can often be found roaming the hills of...oh, wait. Random Access Memory, not rams, right? Okay. In this episode, Mike explains the purpose and some of the features of RAM.

  • RAM Capacity  

    How much RAM do you need? Or, perhaps a more important question, how much RAM can you possibly fit in your PC? Mike answers these questions and more in this episode.

  • Virtual Memory  

    What if you could have RAM that wasn't really RAM at all? What would you call it? Virtual memory? I like it!

Power Supplies
  • Choosing a Power Supply  

    Mike talks about the process of choosing a power supply to purchase. Also, peanut butter.

  • Power Protection  

    Electricity can be dangerous, both to you and to your computer. In this episode, Mike explains how to protect your PC from surges and sags using various devices.

Implementing Hard Drives
  • Understanding Partitioning  

    In this episode, Mike delves into the two main partitioning schemes, MBR and GPT. MBR enables two partition types—primary and extended—with the extended further divided into logical drives. GPT enables large capacity volumes with up to 128 volumes per drive.

  • Basic Partitioning  

    In this episode, Mike explores implementing hard drives using basic volumes or MBR partitioning.

  • Dynamic Disks  

    In this episode, Mike discusses implementing hard drives using dynamic disks, a feature built into Windows.

  • File Systems  

    In this episode, Mike describes the purpose of file systems; then looks at evolution, from FAT to FAT32 to NTFS. In addition, the episode examines Linux and Mac OS X partition types.

  • Storage Spaces  

    In this episode, Mike explores the Windows-specific software RAID called Storage Spaces.

Essential Peripherals
  • Configuring USB  

    In the second USB episode, Mike looks into tech-oriented configuration and troubleshooting issues. What should always be simple plug and play, after all, sometimes doesn't work as planned and you need to know what to do.


Building a PC
  • Media Sources  

    In this episode, Mike explores the various media for installing Windows, from optical media (such as DVDs) to flash media, and using ISO images for block-by-block reproductions of installation media.

  • Windows Install Options  

    In this episode, Mike discusses the less-common installation methods for Windows, such as unattended installation routines, installing over a network using PXE, and image deployment.


  • Windows Upgrade Paths  

    In this episode, Mike explores the differences between clean installations and upgrade installations. Mike then discusses how to upgrade within various versions of Windows.


  • Installing Windows  

    In this episode, Mike walks you through the process of installing Windows, using Windows 8.1 as an example.

  • Post-Installation Tasks  

    In this episode, Mike explores post-installation tasks in Windows, from updating device drivers to setting up proper security. The episode ends with building a recovery disc.


Windows Under the Hood
  • What is the Registry  

    This episode covers the massive database that contains every Windows setting.

  • The Boot Process  

    In this episode, Mike discusses the essential boot files in Windows, such as winload.exe, bootmgr, and bcd; plus, he explores the interaction of these files to get to a Windows Desktop.

  • Processes  

    Learn about the difference between applications and services in this exciting video.

  • Dealing with Processes  

    Mike shows you how to use the Task Manager as well as the tasklist command.

  • Services  

    Learn how to view, start, and stop services.


  • Windows 8 Task Manager  

    Microsoft revamped the Task Manager starting in Windows 8 to add new features and an improved interface. In this episode, Mike uses Windows 8, 8.1., and 10 to explore these new features.


Users, Groups, and Permissions
  • Introduction to Users and Groups  

    Dive into the enticing world of authentication and authorization with users and groups.

  • Creating Users in Windows Vista/7  

    If you've got a PC shared by more than one person, this video will show you how to create user accounts for all of them, but this time in Windows Vista and 7.

  • Managing Users in Windows 8 or 8.1  

    Mike explores adding and changing users and groups in the Local Users and Groups in Administrative Tools (like in Vista/7), but focuses on PC Settings, available in Windows 8 and later.

  • Sharing Folders and Files  

    In this episode, Mike discusses sharing successfully among multiple accounts on a single machine. The episode also dives into NTFS permissions and permission propagation.


Maintaining and Optimizing Operating Systems
  • The Zen of Computer Maintenance  

    Mike notes in this episode that most maintenance issues happen automatically now, with the exception of autostarting programs (covered in a subsequent episode).

  • Patch Management  

    In this episode, Mike explores Windows Update and processes for keeping Windows patched, safe, and robust.

  • Autostarting Programs in Windows  

    In this episode, Mike describes how to shut off and, in some cases, remove autostarting programs to keep Windows snappy.

  • Meet the MMC  

    In this episode, Mike shows how to create a custom Microsoft Management Console with all the Administrative Tools you need for your environment.

  • Installing and Uninstalling Programs - Windows  

    In this episode, Mike examines the processes for installing and uninstalling applications; plus, he covers how to add and remove features built into Windows.

  • Windows System Restore  

    In this episode, Mike shows how System Restore takes snapshots of Windows over time. If something goes wrong, you can use the tool for getting Windows back to a working version.

  • Windows Backup  

    In this episode, Mike explores the backup utilities built into Windows, starting with Windows Vista and going through the latest versions.

Working with the Command Line Interface
  • Windows Command Line Basics  

    In this episode, Mike explores the command line interface in Windows, discussing how to open it in both normal and admin mode. Plus, he looks at basic commands such as dir and cd, and using switches to access additional tools within a command.

  • Working with folders and files  

    In this episode, Mike discusses essential commands for working with files and folders, such as md, rd, copy, and move; additionally, the episode covers the del and erase commands and working with wildcards.

  • Fancy Copying  

    In this episode, Mike examines advanced copying techniques at the command line using xcopy and robocopy.


  • Working With Drives  

    In this episode, Mike details command line commands for working with drives, such as format, diskpart, chkdsk, and sfc.

  • Advanced Windows Command Line  

    In this episode, Mike explores advanced command line commands, such as gpupdate, gpresult, tasklist, and taskkill.

  • Linux Command Line Basics  

    In this episode, Mike describes how to get to the Linux Terminal and run some essential commands, such as pwd, ls, and cd. Mike shows how to work with text files with the venerable vi program.  

  • Working with Folders and Files in Linux  

    In this episode, Mike explores many common and useful Linux commands, such as cp, mv, rm, rmdir, mkdir, and dd. 

  • Linux File Permissions  

    In this episode, Mike discusses permissions specific to Linux files and folders, such as read, write, and execute; these apply to the creator/owner, group, and everyone else. 

  • Miscellaneous Linux Commands  

    In this episode, Mike explores many common and useful Linux commands, such as cp, mv, rm, rmdir, mkdir, and dd. 


Troubleshooting Operating Systems
  • The Recovery Console  

    In this flashback episode, Mike explores an essential tool for fixing Windows low-level issues. This applies primarily to Windows XP and earlier operating systems, but some of these options show up in the 902 objectives.

  • Windows Recovery Environment  

    In this episode, Mike discusses the essential boot-level tool WinRE, used to recover from a failed Windows boot.

  • Advanced Startup Options Part 1  

    In this episode, Mike covers the options for starting a Windows PC when problems happen, such as using the F8 key in Windows Vista/7 to get to options like Safe mode and Last known good configuration.

  • Advanced Startup Options Part 2  

    Windows 8 and later offer a different-looking set of startup options, though the functions of many things are the same (like Safe Mode and Safe Mode with Networking). Mike shows you how to access the Advanced Startup Options from PC Settings.

  • Boot Problems  

    Several things can cause boot problems in Windows. In this episode, Mike explores hardware, BIOS, Desktop, and autostarting programs.

  • Event Viewer and Action Center  

    In this episode, Mike describes Windows logs and Event Viewer, plus the Action Center for essential notifications.

  • Application Troubleshooting  

    In this episode, Mike examines the symptoms, causes, and fixes for typical application issues in Windows. These include missing DLLs and services, compatibility issues with specific versions of Windows, and system lockups caused by improperly written or configured applications.  

  • Kernel Panics  

    Every OS has some kind of system lockup where the OS shuts everything down to make sure no serious damage happens. In this episode, Mike describes processes for recovering from BSoDs and other stop errors.

Virtualization
  • Virtualization Basics  

    In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.

  • Your First Virtual Machine  

    Mike goes through the process of creating a virtual machine and installing an OS into that VM.

  • Infrastructure as a Service IaaS  

    Here, Mike looks at Infrastructure as a Service via Amazon Web Services.

  • Platform as a Service PaaS  

    Mike shows us the Heroku PaaS.

  • Software as a Service SaaS  

    Mike shows us that Software as a Service is all around us with Dropbox and others.

  • Cloud Ownership  

    In this episode, Mike discusses the difference between public and private clouds.

The Internet
  • Internet Options  

    In this episode, Mike describes the most important tabs in Internet Options, a feature that adjusts specific features in Microsoft Internet Explorer.

  • Proxy Servers  

    In this episode, Mike looks at proxy servers, essential tools for filtering traffic into and out of a network. He discusses how to configure a Web browser for a proxy server.

  • Troubleshooting Internet Connections  

    In this episode, Mike troubleshoots the entire Internet at once! No, wait, that's not right. In this episode, Mike troubleshoots Internet connection problems like slow connections, and worse, no connections.

Understanding Mobile Devices
  • Touring Android  

    In this episode, Mike plays with phones running the open-source Android operating system (OS). He shows variations in launchers and common features as well, such as the Google Play store and the Settings options.

  • Touring iOS  

    In this episode, Mike describes features and capabilities of the closed-source Apple iOS operating system.

  • Touring Windows Mobile  

    Although Windows Mobile has a tiny market share compared to Android or iOS, it’s on the CompTIA A+ exam and becoming more common in the field. In this episode, Mike explores essential features of Windows Mobile.

Care and Feeding of Mobile Devices
  • Cellular Configuration  

    In this episode, Mike describes the two primary cellular technologies, the older CDMA and the more current GSM.

  • Wireless Mobile Connections - Part 1  

    In this episode, Mike explores the various ways to connect wirelessly, starting with 802.11, and continuing with Bluetooth and cellular.

  • Wireless Mobile Connections - Part 2  

    This episode picks up where episode 2 left off, with Mike discussing more connection options for mobile devices. He describes hotspots, tethering, near-field communication, and Wi-Fi Direct.

  • Mobile Devices and Email  

    In this episode, Mike describes how to set up a mobile device to get e-mail, through Web services (like gmail) to traditional POP/SMTP systems and Exchange.

  • Synchronization  

    In this episode, Mike explores methods of syncing among various platforms, such as Apple devices and Android devices.

  • Securing Android Devices  

    Mobile devices can come under attack from multiple directions. With Android devices, you should protect yourself from strangers grabbing your device and the occasional virus designed for mobile devices. In this episode, Mike shows you how to keep your Android device secure.

  • Securing iOS Devices  

    While Apple's notoriously tight grip on their mobile devices will keep you safe from a lot of attacks like malware and viruses, you still need to keep your device safe from the guy who grabs it out of your purse or car. Thankfully, Apple provides a few nifty features to help you out. Watch this episode to find out more.

Printers and Multifunction Devices
  • Installing Local Printers  

    In this episode, Mike describes the basic steps for installing a printer directly connected to a PC, such as getting drivers and plugging things in.

  • Installing Network Printers  

    In this episode, Mike describes printers that function over a network. They get an IP address available to all authorized hosts, regardless of desktop OS.

  • Cloud Printing  

    In this episode, Mike discusses the various forms of cloud printing, that is, connecting to shared print devices over the Internet to create hard copy. The common services include Google Cloud Printing and Apple AirPrint.

Securing Computers
  • Physical Security  

    PC security goes way beyond virus protection and passwords. Things like locking the doors to important PCs and shredding your trash often go forgotten when securing your PC. In this episode, Mike helps you physically secure your PC.

  • Passwords and Authentication  

    Passwords, passwords, passwords. I'll say it again: passwords! You need a strong password if you want to secure anything on your PC. In this episode, Mike discusses authentication through passwords. Passwords.

  • Protecting Against Snoops  

    Have you ever sat on a plane and noticed the person next to you watching your every move? What if you're working on something private, like your plans to take over the world? In this episode, Mike shows you how to protect yourself and your data from nosy people.

  • Malware  

    You need to protect your Internet-connected PC from many dangers, such as viruses, spyware, and Trojans. We call these attacks malware, and in this episode, Mike explains how each type of malware works.

  • Anti-Malware Applications  

    Plenty of applications exist that help you protect your system from malware attacks. In this episode, Mike shows you how to use a few popular antimalware applications.

  • Anti-Malware Practices  

    To best solve malware issues, you can follow a specific step-by-step process that identifies, quarantines, and removes the malware, then remediates your system. Learn how in this episode.

  • Hardware Firewalls  

    In this episode, Mike describes stateless (or dumb) firewalls and stateful firewalls, two common implementations of network protection.

  • Software Firewalls  

    In this episode, Mike looks at programs that monitor network traffic that goes in and out of specific hosts.

  • Data Destruction  

    When a hard drive's days come to an end, you need to destroy the drive safely and securely. Fortunately, a number of incredibly cool machines exist to do this for you. Watch just how pulverized a hard drive can get in this episode.

  • Incident Response  

    In this episode, Mike explores the processes for techs to deal with problems that happen in the network. Techs should contact the incident response leader, know best practices for evidence handling, and do proper incident reports.

Reviews (0)