CompTIA A+ Certification Training Course
1 Hardware
1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
-
Firmware upgrades – flash BIOS
-
BIOS component information
-
BIOS configurations
-
Built-in diagnostics
-
HIDS
1.2 Explain the importance of motherboard components, their purpose, and properties
-
Sizes
-
Expansion slots
-
RAM slots
-
CPU sockets
-
Chipsets
-
CMOS battery
-
Power connections and types
-
Fan connectors
-
Front/Top panel connectors
-
Bus speeds
1.3 Compare and contrast various RAM types and their features.
1.4 Install and configure PC expansion cards.
-
Sound cards
-
Video cards
-
Network cards
-
USB cards
-
Firewire cards
-
Thunderbolt cards
-
Device sharing
-
Public/shared devices
-
Wireless/cellular cards
1.5 Compare and contrast differences between the various print technologies and the associated imaging process
-
Laser
-
Inkjet
-
Thermal
-
Impact
-
Virtual
1.6 Given a scenario, perform appropriate printer maintenance.
-
Laser
-
Thermal
-
Impact
-
Inkjet
2.1 Identify the various types of network cables and connectors.
-
Fiber
-
Twisted Pair
-
Coaxial
2.2 Compare and contrast the characteristics of connectors and cabling.
-
Fiber
-
Twisted pair
-
Coaxial
2.3 Explain the properties and characteristics of TCP/IP.
-
IPv4 vs. IPv6
-
Public vs. private vs. APIPA/link local
-
Static vs. dynamic
-
Client-side DNS settings
-
Client-side DHCP
-
Standard thick client
-
Thin client
-
Home Server PC
2.4 Compare and contrast types of display devices and their features.
-
Types
-
Refresh / frame rates
-
Resolution
-
Native resolution
-
Brightness/lumens
-
Analog vs. digital
-
Privacy/antiglare filters
-
Multiple displays
-
Aspect ratios
2.5 Identify common PC connector types and associated cables.
-
Display connector types
-
Display cable types
-
Device cables and connectors
-
Adapters and convertors
2.6 Install and configure common peripheral devices.
-
Input devices
-
Output devices
-
Input & Output devices
-
Real time LUN Migration Scenario
2.7 Install SOHO multifunction device / printers and configure appropriate settings.
-
Use appropriate drivers for a given operating system
-
VNX snap view snapshot configuration
-
Managing and configuring snap view snapshots
-
VNX snap shot configuration
-
Subnet mask vs. CIDR
-
Gateway
2.8 Explain common TCP and UDP ports, protocols, and their purpose.
-
Ports
-
Protocols
-
TCP vs. UDP
2.9 Compare and contrast various Wi-Fi networking standards and encryption types.
-
Standards
-
Encryption types
2.10 Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings
-
Channels
-
Port forwarding, port triggering
-
DHCP (on/off)
-
DMZ
-
NAT / DNAT
-
Basic QoS
-
Firmware
-
UPnP
2.11 Compare and contrast Internet connection types, network types, and their features
-
Internet Connection Types
-
Network Types
2.12 Compare and contrast network architecture devices, their functions, and features
-
Hub
-
Switch
-
Router
-
Access point
-
Bridge
-
Modem
-
Firewall
-
Patch panel
-
Repeaters/extenders
-
Ethernet over Power
-
Power over Ethernet injector
2.13 Given a scenario, use appropriate networking tools
-
Crimper
-
Cable stripper
-
Router
-
Multimeter
-
Tone generator & probe
-
Cable tester
-
Loopback plug
-
Punchdown tool
-
WiFi analyzer
3.1 Install and configure laptop hardware and components.
-
Expansion options
-
Hardware/device replacement
3.2 Explain the function of components within the display of a laptop.
-
Types
-
Hardware/device replacement
-
Wi-Fi antenna connector/placement
-
Webcam
-
Microphone
-
Inverter
-
Digitizer
3.3 Given a scenario, use appropriate laptop features.
-
Special function keys
-
Docking station
-
Physical laptop lock and cable lock
-
Rotating / removable screens
3.4 Explain the characteristics of various types of other mobile devices.
-
Tablets
-
Smart phones
-
Wearable technology devices
-
Phablets
-
e-Readers
-
Smart camera
-
GPS
3.5 Compare and contrast accessories & ports of other mobile devices.
-
Connection types
-
Accessories
4 Hardware and Network Troubleshooting
4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools
4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools
4.3 Given a scenario, troubleshoot common video, projector and display issues
4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools
-
Common symptoms
-
Hardware tools
-
Command line tools
4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures
-
Common symptoms
-
Disassembling processes for proper re-assembly
4.6 Given a scenario, troubleshoot printers with appropriate tools
5 Windows Operating Systems
5.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8 and Windows 8.1)
5.2 Given a scenario, install Windows PC operating systems using appropriate methods
-
Boot methods
-
Type of installations
-
Partitioning
-
File system types/formatting
-
Load alternate third-party drivers when necessary
-
Workgroup vs. Domain setup
-
Time/date/region/language settings
-
Driver installation, software and windows updates
-
Factory recovery partition
-
Properly formatted boot drive with the correct partitions/format
5.3 Given a scenario, apply appropriate Microsoft command line tools
-
TASKKILL
-
BOOTREC
-
SHUTDOWN
-
TASKLIST
-
MD
-
RD
-
CD
-
DEL
-
FORMAT
-
COPY
-
XCOPY
-
ROBOCOPY
-
DISKPART
-
SFC
-
CHKDSK
-
GPUPDATE
-
GPRESULT
-
DIR
-
EXIT
-
HELP
-
EXPAND
-
[command name] /?
-
Commands available with standard privileges vs. administrative privileges
5.4 Given a scenario, use appropriate Microsoft operating system features and tools
-
Administrative
-
MSCONFIG
-
Task Manager
-
Disk management
-
Other
-
System utilities
5.5 Given a scenario, use Windows Control Panel utilities
-
Internet options
-
Display/Display Settings
-
User accounts
-
Folder options
-
System
-
Windows firewall
-
Power options
-
Programs and features
-
HomeGroup
-
Devices and Printers
-
Sound
-
Troubleshooting
-
Network and Sharing Center
-
Device Manager
5.6 Given a scenario, install and configure Windows networking on a client/desktop
-
HomeGroup vs. WorkGroup
-
Domain setup
-
Network shares/administrative shares/mapping drives
-
Printer sharing vs. network printer mapping
-
Establish networking connections
-
Proxy settings
-
Remote Desktop Connection
-
Remote Assistance
-
Home vs. Work vs. Public network settings
-
Firewall settings
-
Sound
-
Configuring an alternative IP address in Windows
-
Network and Sharing Center
5.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools
6 Windows Operating Systems
6.1 Identify common features and functionality of the Mac OS and Linux operating systems
-
Best practices
-
Tools
-
Features
-
Basic Linux commands
6.2 Given a scenario, setup and use client-side virtualization
-
Purpose of virtual machines
-
Resource requirements
-
Emulator requirements
-
Security requirements
-
Network requirements
-
Hypervisor
6.3 Identify basic cloud concepts
-
SaaS
-
IaaS
-
Paas
-
Public vs. Private vs. Hybrid vs. Community
-
Rapid Elasticity
-
On-demand
-
Resource pooling
-
Measured service
6.4 Summarize the properties and purpose of services provided by networked hosts
-
Server roles
-
Internet appliance
-
Legacy / embedded systems
6.5 Identify basic features of mobile operating systems
-
Android vs. iOS vs. Windows
6.6 Install and configure basic mobile device network connectivity and email
-
Wireless / cellular data network (enable/disable)
-
Bluetooth
-
Corporate and ISP email configuration
-
Integrated commercial provider email configuration
-
PRI updates/PRL updates/Baseband updates
-
Radio firmware
-
IMEI vs. IMSI
-
VPN
6.7 Summarize methods and data related to mobile device synchronization
-
Types of data to synchronize
-
Synchronization methods
-
Mutual authentication for multiple services (SSO)
-
Software requirements to install the application on the PC
-
Connection types to enable synchronization
7.1 Identify common security threats and vulnerabilities
-
Malware
-
Phishing
-
Spear phishing
-
Spoofing
-
Social engineering
-
Shoulder surfing
-
Zero-day attack
-
Zombie/botnet
-
Brute forcing
-
Dictionary attacks
-
Non-compliant systems
-
Violations of security best practices
-
Tailgating
-
Man-in-the-middle
7.2 Compare and contrast common prevention methods
-
Physical security
-
Digital security
-
User education/AUP
-
Principle of least privilege
7.3 Compare and contrast differences of basic Windows OS security settings
-
User and groups
-
NTFS vs. Share permissions
-
Shared files and folders
-
System files and folders
-
User authentication
-
Run as administrator vs. standard user
-
Bitlocker
-
Bitlocker-To-Go
-
EFS
7.4 Given a scenario, deploy and enforce security best practices to secure a workstation
-
Password best practices
-
Account management
-
Disable autorun
-
Data encryption
-
Patch/update management
7.5 Compare and contrast various methods for securing mobile devices
-
Screen locks
-
Remote wipes
-
Locator applications
-
Remote backup applications
-
Failed login attempts restrictions
-
Antivirus/Antimalware
-
Patching/OS updates
-
Biometric authentication
-
Full device encryption
-
Multifactor authentication
-
Authenticator applications
-
Trusted sources vs. untrusted sources
-
Firewalls
-
Policies and procedures
7.6 Given a scenario, use appropriate data destruction and disposal methods
Physical destruction
-
Recycling or repurposing best practices
7.7 Given a scenario, secure SOHO wireless and wired networks.
-
Wireless specific
-
Change default user-names and passwords
-
Enable MAC filtering
-
Assign static IP addresses
-
Firewall settings
-
Port forwarding/mapping
-
Disabling ports
-
Content filtering / parental controls
-
Update firmware
-
Physical security
8 Software Troubleshooting
8.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools
8.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices
-
Common symptoms
-
Tools
-
Best practice procedure for malware removal
8.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools
8.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools
9.1 Given a scenario, use appropriate safety procedures
-
Equipment grounding
-
Proper component handling and storage
-
Toxic waste handling
-
Personal safety
-
Compliance with local government regulations
9.2 Given a scenario with potential environmental impacts, apply the appropriate controls
-
MSDS documentation for handling and disposal
-
Temperature, humidity level awareness and proper ventilation
-
Power surges, brownouts, blackouts
-
Protection from airborne particles
-
Dust and debris
-
Compliance to local government regulations
9.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts
-
Incident Response
-
Licensing / DRM / EULA
-
Personally, Identifiable Information
-
Follow corporate end-user policies and security best practices
9.4 Demonstrate proper communication techniques and professionalism
-
Use proper language – avoid jargon, acronyms, slang when applicable
-
Maintain a positive attitude / Project confidence
-
Actively listen (taking notes) and avoid interrupting the customer
-
Be culturally sensitive
-
Be on time (if late contact the customer)
-
Avoid distractions
-
Dealing with difficult customer or situation
-
Set and meet expectations/timeline and communicate status with the customer
-
Deal appropriately with customers confidential and private materials
9.5 Given a scenario, explain the troubleshooting theory
-
Always consider corporate policies, procedures and impacts before implementing change