Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Ticketing Systems
As a tech, you will almost certainly be dealing with tickets. Customers or employees run into technical issues all the time and it's important to prioritize and address the problems and solve them in a timely manner. This is where...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Recycling and Data Destruction
Disposing of old computer gear means using environmentally friendly methods and wiping all your data from any storage devices. Batteries in computers need to go to special recycling centers. Data wiping methods take many forms, from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The Zen of Backup
Back up your data before you lose it! Create local backups, image backups, and file backups. Use Cloud storage for even more security. This clip is from the chapter "Operational Procedures" of the series "CompTIA A+ Certification Core 2...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Change Management
This video explains change management in operational procedures. This clip is from the chapter "Operational Procedures" of the series "CompTIA A+ Certification Core 2 (220-1102)".null
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Data You Need to Know
Data is everywhere in our networks. Good techs understand the types of data used on networks and how to handle that data from a business, legal, and moral standpoint. Organizing our data also helps us understand the types of protections...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Documents You Need to Know
Good techs must be comfortable with the common documentation used by IT departments everywhere. From hardware inventory to network diagrams to the many policies used in our industry, tech should know when and how documentation comes into...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Malware in Action
This video demonstrates some destructive malware and ransomware applications to give you an idea of what to look for when you suspect a system has been infected. WARNING! If you attempt these at home, be sure you're in a sandbox or...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Environmental Controls
Controlling environmental factors enables you to create a safe computing space. This video looks at options for disposing of waste such as old printer cartridges and controlling temperature and humidity. The author describes proper...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Incident Response
Although procedures can vary among companies, the CompTIA A+ objectives follow a logical set of responses. This video describes each step. This clip is from the chapter "Securing Computers" of the series "CompTIA A+ Certification Core 2...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Licensing
Some software is free to use. Some are free for non-commercial use. Some require a paid license for any purpose. Some licenses focus on the number of human users, while others focus on the number of systems, or even the number of...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Social Engineering
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing. This clip is from the chapter "Securing Computers"...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Anti-Malware
The CompTIA A+ objectives outline a very detailed series of steps for dealing with malware infestation. This video looks at important pre-malware steps and then describes the CompTIA procedures. This clip is from the chapter "Securing...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Malware
Malware comes in many forms; infestations have many symptoms. This video describes malware in all its lovely shades of ugly, from viruses and worms to spontaneous application crashes and invalid certificate errors. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Multifactor Authentication (MFA)
Multifactor authentication (MFA) is the process of proving you are who you say you are using unique identifiers that only you have or know. This video explores the different options for MFA, as well as some interesting biometrics such as...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Physical Security
Secure your assets in three layers: perimeter, rooms, and individual devices. The author explores options for each layer, from security guards at the perimeter to cable locks on individual devices. This clip is from the chapter "Securing...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Threats
You can't protect your networks unless you understand the threats they face. Using the concept of security shells makes it easier to categorize and mitigate threats. This clip is from the chapter "Securing Computers" of the series...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Troubleshooting
Mobile devices can encounter problems ranging from unresponsive touchscreens to complete system lockout. This video explores common symptoms, such as slow performance (caused by excessive app running) or overheating, and their solutions....
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Maintaining Mobile Devices
Mobile devices are surprisingly self-maintaining these days, but there are a few issues that come up occasionally. A big part of this is understanding the names and functions of certain settings unique to smartphones. This clip is from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual Reality
Virtual reality enables you to experience remote or fanciful locations via computer. Augmented reality layers virtual elements onto a camera feed of the real world, making it easier to follow navigation instructions or chase fanciful...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Touring iOS
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more. This clip is from the...