Instructional Video5:14
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Users and Super Users

Higher Ed
This video explains users and super users. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware concerns as a PC...
Instructional Video9:15
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - What Is an Operating System

Higher Ed
This video explains what an operating system is. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware concerns as...
Instructional Video7:01
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Physical Safety

Higher Ed
In this video, you will learn how to use anti-ESD tools, protect their fingers, and employ proper lifting techniques. This clip is from the chapter "Safety and Professionalism" of the series "CompTIA A+ Certification Core 2...
Instructional Video7:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Professional Communication, Part 2

Higher Ed
This video explains seeing the results in action. This clip is from the chapter "Safety and Professionalism" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section introduces you to Safety and Professionalism. It also...
Instructional Video5:51
Curated Video

Connecting Across Continents: The Evolution of Video Calls

6th - Higher Ed
Discover how technology has transformed communication, allowing us to stay visually connected with friends and family worldwide, even from remote vacation spots. This video delves into the advancements from traditional satellite...
Instructional Video6:55
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Ticketing Systems

Higher Ed
As a tech, you will almost certainly be dealing with tickets. Customers or employees run into technical issues all the time and it's important to prioritize and address the problems and solve them in a timely manner. This is where...
Instructional Video5:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Environmental Controls

Higher Ed
Controlling environmental factors enables you to create a safe computing space. This video looks at options for disposing of waste such as old printer cartridges and controlling temperature and humidity. The author describes proper...
Instructional Video4:50
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Incident Response

Higher Ed
Although procedures can vary among companies, the CompTIA A+ objectives follow a logical set of responses. This video describes each step. This clip is from the chapter "Securing Computers" of the series "CompTIA A+ Certification Core 2...
Instructional Video9:22
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Licensing

Higher Ed
Some software is free to use. Some are free for non-commercial use. Some require a paid license for any purpose. Some licenses focus on the number of human users, while others focus on the number of systems, or even the number of...
Instructional Video5:37
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Higher Ed
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing. This clip is from the chapter "Securing Computers"...
Instructional Video13:11
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Malware

Higher Ed
Malware comes in many forms; infestations have many symptoms. This video describes malware in all its lovely shades of ugly, from viruses and worms to spontaneous application crashes and invalid certificate errors. This clip is from the...
Instructional Video7:58
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Physical Security

Higher Ed
Secure your assets in three layers: perimeter, rooms, and individual devices. The author explores options for each layer, from security guards at the perimeter to cable locks on individual devices. This clip is from the chapter "Securing...
Instructional Video6:07
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Proxy Servers

Higher Ed
In this video, the author describes how proxy servers work to block certain websites and filter outgoing or incoming content. The video shows how to set up a browser to connect to a proxy server. This clip is from the chapter "The...
Instructional Video8:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - File Transfer Protocol (FTP)

Higher Ed
In this video, the author tackles one of the earliest and most common protocols for moving files, File Transfer Protocol (FTP). He explores how FTP works, including passive mode and active mode, and port triggering. This clip is from the...
Instructional Video8:52
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The World Wide Web

Higher Ed
The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether a website can be trusted. This clip is from the chapter "The...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Remote Desktop Connections

Higher Ed
The Remote Desktop Protocol (RDP) enables you to connect to a remote Windows system and control it using the graphical user interface. Virtual Network Computing (VNC) enables you to connect to all sorts of computers, including Windows,...
Instructional Video6:45
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Telnet and SSH

Higher Ed
The Telnet and SSH protocols enable techs to access and control hosts remotely using the command-line interface in Windows. Telnet offers no security. SSH connections are encrypted for better security. This clip is from the chapter "The...
Instructional Video7:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall

Higher Ed
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Instructional Video11:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Basic Router Configuration

Higher Ed
All routers share some basic configuration steps every tech must know. From router passwords to LAN IDs, this is the place to learn about these settings. This clip is from the chapter "Local Area Networking" of the series "CompTIA A+...
Instructional Video4:12
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The net Command

Higher Ed
The Windows net command has so many features that it deserves its own video. We use the net command for everything—from querying the network to accessing shares. This clip is from the chapter "Local Area Networking" of the series...
Instructional Video13:35
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory

Higher Ed
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks. This clip is from the chapter...
Instructional Video5:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Naming

Higher Ed
Microsoft introduced a series of naming protocols, some of which predate the Internet. Interestingly, these protocols (or at least their modern versions) are still alive and well not only on Windows systems but on Linux and macOS systems...
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video8:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Connections

Higher Ed
When two computers begin the process of sharing data, they create what we call a connection (or session). A good tech knows how to use common utilities to observe these connections and diagnose issues. This clip is from the chapter...