Instructional Video6:55
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Ticketing Systems

Higher Ed
As a tech, you will almost certainly be dealing with tickets. Customers or employees run into technical issues all the time and it's important to prioritize and address the problems and solve them in a timely manner. This is where...
Instructional Video6:27
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Recycling and Data Destruction

Higher Ed
Disposing of old computer gear means using environmentally friendly methods and wiping all your data from any storage devices. Batteries in computers need to go to special recycling centers. Data wiping methods take many forms, from...
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The Zen of Backup

Higher Ed
Back up your data before you lose it! Create local backups, image backups, and file backups. Use Cloud storage for even more security. This clip is from the chapter "Operational Procedures" of the series "CompTIA A+ Certification Core 2...
Instructional Video5:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Change Management

Higher Ed
This video explains change management in operational procedures. This clip is from the chapter "Operational Procedures" of the series "CompTIA A+ Certification Core 2 (220-1102)".null
Instructional Video3:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Data You Need to Know

Higher Ed
Data is everywhere in our networks. Good techs understand the types of data used on networks and how to handle that data from a business, legal, and moral standpoint. Organizing our data also helps us understand the types of protections...
Instructional Video8:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Documents You Need to Know

Higher Ed
Good techs must be comfortable with the common documentation used by IT departments everywhere. From hardware inventory to network diagrams to the many policies used in our industry, tech should know when and how documentation comes into...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Malware in Action

Higher Ed
This video demonstrates some destructive malware and ransomware applications to give you an idea of what to look for when you suspect a system has been infected. WARNING! If you attempt these at home, be sure you're in a sandbox or...
Instructional Video5:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Environmental Controls

Higher Ed
Controlling environmental factors enables you to create a safe computing space. This video looks at options for disposing of waste such as old printer cartridges and controlling temperature and humidity. The author describes proper...
Instructional Video4:50
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Incident Response

Higher Ed
Although procedures can vary among companies, the CompTIA A+ objectives follow a logical set of responses. This video describes each step. This clip is from the chapter "Securing Computers" of the series "CompTIA A+ Certification Core 2...
Instructional Video9:22
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Licensing

Higher Ed
Some software is free to use. Some are free for non-commercial use. Some require a paid license for any purpose. Some licenses focus on the number of human users, while others focus on the number of systems, or even the number of...
Instructional Video5:37
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Higher Ed
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing. This clip is from the chapter "Securing Computers"...
Instructional Video11:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Anti-Malware

Higher Ed
The CompTIA A+ objectives outline a very detailed series of steps for dealing with malware infestation. This video looks at important pre-malware steps and then describes the CompTIA procedures. This clip is from the chapter "Securing...
Instructional Video13:11
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Malware

Higher Ed
Malware comes in many forms; infestations have many symptoms. This video describes malware in all its lovely shades of ugly, from viruses and worms to spontaneous application crashes and invalid certificate errors. This clip is from the...
Instructional Video4:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Multifactor Authentication (MFA)

Higher Ed
Multifactor authentication (MFA) is the process of proving you are who you say you are using unique identifiers that only you have or know. This video explores the different options for MFA, as well as some interesting biometrics such as...
Instructional Video13:36
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication

Higher Ed
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Instructional Video7:58
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Physical Security

Higher Ed
Secure your assets in three layers: perimeter, rooms, and individual devices. The author explores options for each layer, from security guards at the perimeter to cable locks on individual devices. This clip is from the chapter "Securing...
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video9:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Threats

Higher Ed
You can't protect your networks unless you understand the threats they face. Using the concept of security shells makes it easier to categorize and mitigate threats. This clip is from the chapter "Securing Computers" of the series...
Instructional Video9:23
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Troubleshooting

Higher Ed
Mobile devices can encounter problems ranging from unresponsive touchscreens to complete system lockout. This video explores common symptoms, such as slow performance (caused by excessive app running) or overheating, and their solutions....
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video9:19
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail

Higher Ed
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Instructional Video10:29
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Maintaining Mobile Devices

Higher Ed
Mobile devices are surprisingly self-maintaining these days, but there are a few issues that come up occasionally. A big part of this is understanding the names and functions of certain settings unique to smartphones. This clip is from...
Instructional Video2:24
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual Reality

Higher Ed
Virtual reality enables you to experience remote or fanciful locations via computer. Augmented reality layers virtual elements onto a camera feed of the real world, making it easier to follow navigation instructions or chase fanciful...
Instructional Video7:25
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Touring iOS

Higher Ed
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more. This clip is from the...