Instructional Video8:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Documents You Need to Know

Higher Ed
Good techs must be comfortable with the common documentation used by IT departments everywhere. From hardware inventory to network diagrams to the many policies used in our industry, tech should know when and how documentation comes into...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Malware in Action

Higher Ed
This video demonstrates some destructive malware and ransomware applications to give you an idea of what to look for when you suspect a system has been infected. WARNING! If you attempt these at home, be sure you're in a sandbox or...
Instructional Video5:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Environmental Controls

Higher Ed
Controlling environmental factors enables you to create a safe computing space. This video looks at options for disposing of waste such as old printer cartridges and controlling temperature and humidity. The author describes proper...
Instructional Video4:50
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Incident Response

Higher Ed
Although procedures can vary among companies, the CompTIA A+ objectives follow a logical set of responses. This video describes each step. This clip is from the chapter "Securing Computers" of the series "CompTIA A+ Certification Core 2...
Instructional Video9:22
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Licensing

Higher Ed
Some software is free to use. Some are free for non-commercial use. Some require a paid license for any purpose. Some licenses focus on the number of human users, while others focus on the number of systems, or even the number of...
Instructional Video5:37
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Higher Ed
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing. This clip is from the chapter "Securing Computers"...
Instructional Video11:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Anti-Malware

Higher Ed
The CompTIA A+ objectives outline a very detailed series of steps for dealing with malware infestation. This video looks at important pre-malware steps and then describes the CompTIA procedures. This clip is from the chapter "Securing...
Instructional Video13:11
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Malware

Higher Ed
Malware comes in many forms; infestations have many symptoms. This video describes malware in all its lovely shades of ugly, from viruses and worms to spontaneous application crashes and invalid certificate errors. This clip is from the...
Instructional Video4:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Multifactor Authentication (MFA)

Higher Ed
Multifactor authentication (MFA) is the process of proving you are who you say you are using unique identifiers that only you have or know. This video explores the different options for MFA, as well as some interesting biometrics such as...
Instructional Video13:36
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication

Higher Ed
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Instructional Video7:58
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Physical Security

Higher Ed
Secure your assets in three layers: perimeter, rooms, and individual devices. The author explores options for each layer, from security guards at the perimeter to cable locks on individual devices. This clip is from the chapter "Securing...
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video9:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Threats

Higher Ed
You can't protect your networks unless you understand the threats they face. Using the concept of security shells makes it easier to categorize and mitigate threats. This clip is from the chapter "Securing Computers" of the series...
Instructional Video9:23
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Troubleshooting

Higher Ed
Mobile devices can encounter problems ranging from unresponsive touchscreens to complete system lockout. This video explores common symptoms, such as slow performance (caused by excessive app running) or overheating, and their solutions....
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video9:19
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail

Higher Ed
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Instructional Video10:29
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Maintaining Mobile Devices

Higher Ed
Mobile devices are surprisingly self-maintaining these days, but there are a few issues that come up occasionally. A big part of this is understanding the names and functions of certain settings unique to smartphones. This clip is from...
Instructional Video2:24
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual Reality

Higher Ed
Virtual reality enables you to experience remote or fanciful locations via computer. Augmented reality layers virtual elements onto a camera feed of the real world, making it easier to follow navigation instructions or chase fanciful...
Instructional Video7:25
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Touring iOS

Higher Ed
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more. This clip is from the...
Instructional Video9:58
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Touring Android

Higher Ed
Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This video explores features specific to Android devices. This clip is from the chapter...
Instructional Video10:56
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Power Management

Higher Ed
Saving power is important, especially on mobile devices and laptops. Every CPU has a built-in feature to shut down different parts of a computer to reduce power needs. It's up to the techs to make sure the power management settings are...
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Browser Security

Higher Ed
With the variety of browsers available to download, it's important to know where the trusted sources are. There are also many other important features to browsers such as extensions and plugins, settings, ad blockers, password managers,...
Instructional Video6:44
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Troubleshooting Internet Connections

Higher Ed
The CompTIA A+ exams have many network troubleshooting scenario questions. The author gives you a few rules to help you get through these questions. In addition, a few basic tools and preparation makes troubleshooting most problems easy...
Instructional Video3:32
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Internet of Things (IoT)

Higher Ed
Author explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. The author...