Scroll to top button

Computer Software Technician (CompTIA A+ 220-1002) Course & Lab

ISBN : 9781644590478

Prepare for CompTIA A+ 220-1002 certification exam with CompTIA A+ course and lab. The lab comes with a well-organized component library for every task and deliver a hands-on experience. The course and lab offer complete coverage of the 220-1002 exam objectives and provide expertise in operating systems, windows management, windows networking, security principles and technologies, operational procedures, safety and professionalism, and more.

CompTIA A+ exam is an internationally accepted industry standard for establishing an IT career. CompTIA Core Series 220-1001 and 220-1002 is the latest updated version of 901 and 902 exam. Candidates are required to pass 220-1001 and 220-1002 exam to earn CompTIA A+ Core Series certification. The 220-1002 exam validates candidates' expertise in installing and configuring operating systems, expanding security, software troubleshooting, and operational procedures.

Glossary of terms
Pre Assessment Questions
Full Length Tests
Post Assessment Questions
Performance lab
Learn the real world skills using LiveLab.
Video tutorials
Get interactive learning videos with transcripts and voice-over.
Signify the duration of video tutorials in labs.

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Exam related FAQs
What are the prerequisites for this exam? CompTIA recommends 9 to 12 months hands-on experience in the lab or field.
What is the exam registration fee? USD 219
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple choice questions (single and multiple response), drag and drops, and performance-based questions
How many questions are asked in the exam? The exam contains 90 questions.
What is the duration of the exam? 90 minutes
What is the exam's retake policy?

In the event that you fail your first attempt at passing the A+ examination, CompTIA's retake policies are

  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least 14 calendar days from the date of your last attempt before you can retake the exam.
What is the validity of the certification? CompTIA A+ certification expires after three years from the date of issue, after which the certification holder will need to renew their certification via CompTIA's Continuing Education Program.
Where can I find more information about this exam? To know more about the A-220-1002, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Support Specialist
  • Field Service Technician
  • Desktop Support Analyst
  • Help Desk Tier 2 Support
  • Module A: Windows versions and features
  • Module B: Non-Windows operating systems
  • Module C: Operating system installation and upgrades
  • Module D: Applications and scripting
  • Summary
  • Module A: Operating system features and tools
  • Module B: Control Panel utilities
  • Module C: Command-line tools
  • Module D: Operating system troubleshooting
  • Summary
  • Module A: Network shares
  • Module B: Network connections
  • Module C: Connection troubleshooting
  • Summary
  • Module A: Threats and vulnerabilities
  • Module B: Security controls
  • Summary
  • Module A: Operating system security
  • Module B: Security hardware and software
  • Summary
  • Module A: Workstation security
  • Module B: Mobile device security
  • Module C: Network security
  • Module D: Security troubleshooting
  • Summary
  • Module A: IT operations
  • Module B: Incident response
  • Module C: Backup and recovery
  • Summary
  • Module A: Safety
  • Module B: Environmental factors
  • Module C: Professionalism
  • Summary

Hands on Activities (Labs)

  • Creating and Running a ps1 File
  • Executing the Basic Commands through a ps1 File
  • Working with Variables
  • Creating a Loop in PowerShell
  • Enabling BranchCache
  • Encrypting File System (EFS)
  • Displaying Windows Versions
  • Adding an MMC snap-in
  • Displaying Windows PowerShell snap-ins
  • Creating a Restore Point
  • Using Cortana
  • Using Windows Event Viewer
  • Using Basic Linux Commands
  • Listing Files and Directories
  • Verifying the Working Directory
  • Listing Files of the Current Directory
  • Performing a Text Search
  • Managing NTFS Permissions
  • Converting a FAT32 Partition to NTFS
  • Disabling a Service
  • Converting a Basic Disk to a Dynamic Disk
  • Setting Automatic Windows Update
  • Viewing the Status of a Disk
  • Mounting a Drive to a Folder
  • Editing a Drive Letter
  • Using MSConfig
  • Using Task Manager to Start an Application
  • Configuring Windows Defender Firewall
  • Configuring Computer Management Services
  • Observing the Control Panel options in different views
  • Uninstalling a Program
  • Using cmd Commands
  • Joining Workgroups or Domains
  • Changing Network Locations
  • Managing Offline Files
  • Sharing a Printer
  • Sharing Folders
  • Using the net Command
  • Creating a Dial-up Connection
  • Connecting to a Server using Remote Desktop Connection
  • Creating a Remote Access VPN Connection
  • Configuring a Proxy Server
  • Using the nbtstat command
  • Using the netstat Command
  • Using the nslookup Command
  • Using the ping Command
  • Tracing Route Using Tracert
  • Identifying Current Virus Threats
  • Reviewing the Top 10 OWASP Attacks
  • Conducting a Dos Attack using Smurf Attack 
  • Performing a MITM Attack
  • Conducting IP Spoofing  
  • Using a Symmetric Encryption Algorithm
  • Using an Asymmetric Encryption Algorithm
  • Stopping Permissions Inheritance
  • Propagating Permissions
  • Removing a Credential
  • Configuring an Audit Group Policy
  • Configuring an Account Password Policy
  • Disabling AutoPlay
  • Configuring Screensavers
  • Securing User Accounts
  • Creating a New User
  • Using BitLocker 
  • Locking an iPhone with a Password
  • Using Windows Security
  • Backing up Files
  • Restoring Files
  • Setting Up a Surge Protected Computer System
  • Using a UPS to Power the Computer Components and Ensure the Network Connectivity