9610652257,9929044779
   

CompTIA A+


CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.

CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.

CompTIA 220-901 A+


Section 1: Hardware


BIOS and UEFI

  • -> BIOS Configurations

  • -> BIOS Security

  • -> Installing BIOS Upgrades

Motherboards & RAM

  • -> An Overview of Motherboard Types

  • -> Motherboard Expansion SLOTS and Bus Speeds

  • -> Motherboard RAM Slots

  • -> CPU Sockets

  • -> Motherboard Jumpers and Connectors

  • -> An Overview of PC Memory Types

  • -> Understanding PC Memory

PC Expansion Cards & Storage Devices

  • -> Installing and Configuring Expansion Cards

  • -> An Overview of Storage Devices

  • -> An Overview of RAID

CPU Technologies

  • -> An Overview of CPU Socket Types

  • -> Understanding CPU Characteristics

  • -> CPU Cooling

Interfaces

  • -> Computer Interface Speeds and Distances

  • -> Wireless Interface Speeds and Distances

  • -> Connection Characteristics

Display Devices & Connector Types

  • -> An Overview of Display Devices

  • -> Display Specifications

  • -> Display Connectors and Cables

  • -> Device Connectors and Cables

Adapters and Convertors Printers & Printer Maintenance

  • -> Understanding & Maintenance Laser Printers

  • -> Understanding & Maintenance Inkjet Printers

  • -> Understanding & Maintenance Thermal Printers & Impact Printers

  • -> Understanding & Maintenance Virtual Printers

Section 2: Networking


Network Cabling, IP Addressing, Ports and Protocols

  • -> Distinguish between shielded and unshielded twisted-pair cabling.

  • -> Describe how fiber cabling works.

  • -> Distinguish between RG-6 and RG-59 coaxial cabling

  • -> Specify the class of an IP address

  • -> Distinguish between IPv4 and IPv6 addressing types

  • -> Identify the default subnet masks for Class A, B, and C networks

  • -> Describe how DHCP assignment works

  • -> Recognize how common ports are used

Networking Technologies

  • -> Distinguish between the standard used for wireless networks

  • -> Use encryption methods to secure wireless networks

  • -> Implement the features of small office~/ office routers

  • -> Use encryption techniques to secure wireless networks

  • -> Implement SOHO routers

  • -> Use the appropriate network topology for a given scenario

  • -> Determine the most appropriate network types for given requirements

Networking Devices and Tools

  • -> Distinguish between the functions of different network level devices

  • -> Recognize the advantages of NAS servers

  • -> Describe the key Characteristics of firewalls

  • -> Match the networking tools to descriptions their functions

  • -> Identify the correct application for different network devices

Section 3: Mobile Devices


Laptops

  • -> Recognize key characteristics of laptop computer cards

  • -> Describe how a USB flash drive works

  • -> Recognize the difference between the displays technologies used for laptops

  • -> Choose appropriate laptop displays in given scenarios

  • -> Use laptop features

  • -> Describe how laptop components are used

Mobile Devices

  • -> Match the mobile device to its characteristics

  • -> Distinguish between iOS and Android systems

  • -> Describe the featues of iOS synchronization

  • -> Describe the options available when synchronization with Android based devices

  • -> Distinguish between the security characteristics of iOS and Android

  • -> Describe the backup options available on Android

  • -> Recognize how to manage online access with a mobile device

  • -> Describe how to secure a mobile device

Section 4: Hardware and Network Troubleshooting


  • -> Troubleshooting Computer Hardware

  • -> Troubleshooting Storage Devices

  • -> Troubleshooting Display Issues

  • -> Troubleshooting Networks

  • -> Troubleshooting Mobile Devices

  • -> Troubleshooting Printers


CompTIA 220-902 A+


Section 1: Windows Operating Systems


Introducing Microsoft Windows

  • -> Distinguish between Windows operating systems

  • -> Ditinguish between 32-bit and 64-bit operating systems

  • -> Match Windows features to their descriptions

  • -> Match the security and administrative tools to their descriptions

  • -> Choose the appropriate Windows tools for a particular task

Installing and Configuring Windows

  • -> Choose a Windows installation method

  • -> Describe the different Windows installation types

  • -> Describe the decisions that need to be made prior to running a Windows Installation

  • -> Distinguish between the formatting options available when working in Windows.

  • -> Identity basic Windows configuration tasks

  • -> Describe the characteristics of key OS command tools

  • -> Add Administrative Tools to the Start menu

  • -> Use Administrative Tools

Optimizing Windows

  • -> Manage hard drive volumes

  • -> Describe Windows migration tools

  • -> Use the Correct Windows utility for a given scenario

  • -> Use Windows optimization tools

  • -> Determine the most appropriate Windows Utility to use in a given scenario

Section 2: Other Operating Systems and Technologies


Mac OS and Linux

  • -> Client-side Virtualization

  • -> Basic Cloud Concepts

  • -> Network Services

  • -> Mobile Operating System Features

  • -> Configuring Email on Mobile Devices

  • -> Mobile Device Synchronization


Section 3: Security


  • -> Common Security Threats

  • -> Physical Security Prevention Methods

  • -> Digital Security Prevention Methods

  • -> Windows Security Settings

  • -> Securing Mobile Devices

  • -> Data Destruction and Disposal

  • -> Securing a SOHO Network

Section 4: Software Troubleshooting


  • -> Operating System Troubleshooting & Tools

  • -> Best Practices for Malware Removal

  • -> Tools for Security Troubleshooting

  • -> Mobile Device App Troubleshooting


Section 5: Operational Procedures


  • -> Managing Electrostatic Discharge

  • -> Computer Safety Procedures

  • -> Managing Your Computing Environment

  • -> Prohibited Activity and End User Policies

  • -> Communication and Professionalism

REQUEST A CALL BACK

( * )Please fill all the texts in the fields

www.iantudaipur.com © 2017 All rights reserved.