RSSCompTIA A+ 220-1002

Documentation Best Practices – CompTIA A+ 220-1002 – 4.1

Documentation Best Practices – CompTIA A+ 220-1002 – 4.1

| June 23, 2019

We often spend as much time on documentation as we do on technology. In this video, you’ll learn about the many and varied types of documentation that are commonly required in an information technology role. << Previous Video: Troubleshooting Mobile Device Security Next: Change Management >>

Continue Reading

Troubleshooting Mobile Device Security – CompTIA A+ 220-1002 – 3.5

Troubleshooting Mobile Device Security – CompTIA A+ 220-1002 – 3.5

| June 13, 2019

We rely on the security of our mobile devices to keep all of our confidential data safe. In this video, you’ll learn how to troubleshoot issues related to the security of our mobile devices. << Previous Video: Troubleshooting Mobile Apps Next: Documentation Best Practices >>

Continue Reading

Troubleshooting Mobile Apps – CompTIA A+ 220-1002 – 3.4

Troubleshooting Mobile Apps – CompTIA A+ 220-1002 – 3.4

| June 13, 2019

Our mobile devices are complex computing devices, and they can experience many different technical issues. In this video, you’ll learn how to troubleshoot common mobile app issues. << Previous Video: Removing Malware Next: Troubleshooting Mobile Device Security >>

Continue Reading

Removing Malware – CompTIA A+ 220-1002 – 3.3

Removing Malware – CompTIA A+ 220-1002 – 3.3

| June 13, 2019

Malware infections can be a challenge to remove. In this video, you’ll learn the step-by-step process for removing malware from a Windows computer. << Previous Video: Troubleshooting Security Issues Next: Troubleshooting Mobile Apps >>

Continue Reading

Troubleshooting Security Issues – CompTIA A+ 220-1002 – 3.2

Troubleshooting Security Issues – CompTIA A+ 220-1002 – 3.2

| June 13, 2019

Some troubleshooting tasks can be related to security issues on a workstation. In this video, you’ll learn about browser redirections, security alerts, malware symptoms, and more. << Previous Video: Troubleshooting Solutions Next: Removing Malware >>

Continue Reading

Troubleshooting Solutions – CompTIA A+ 220-1002 – 3.1

Troubleshooting Solutions – CompTIA A+ 220-1002 – 3.1

| June 13, 2019

The troubleshooting process can involve many different tasks and utilities. In this video, you’ll learn about defragmentation, restarting services, rolling back to previous configurations, and much more. << Previous Video: Troubleshooting Windows Next: Troubleshooting Security Issues >>

Continue Reading

Troubleshooting Windows – CompTIA A+ 220-1002 – 3.1

Troubleshooting Windows – CompTIA A+ 220-1002 – 3.1

| June 13, 2019

The Windows operating system provides a number of tools and utilities that can help you keep things running efficiently. In this video, you’ll learn how to troubleshoot some of the most common Windows issues. << Previous Video: Securing a SOHO Network Next: Troubleshooting Solutions >>

Continue Reading

Securing a SOHO Network – CompTIA A+ 220-1002 – 2.10

Securing a SOHO Network – CompTIA A+ 220-1002 – 2.10

| June 10, 2019

The security requirements of a small office/home office aren’t much different than a large organization. In this video, you’ll learn about the techniques for securing wireless networks, configuring firewalls, filtering content, and more. << Previous Video: Data Destruction and Disposal Next: Troubleshooting Windows >>

Continue Reading

Data Destruction and Disposal – CompTIA A+ 220-1002 – 2.9

Data Destruction and Disposal – CompTIA A+ 220-1002 – 2.9

| June 10, 2019

Disposing of a storage drive is important for keeping confidential data safe and secure. In this video, you’ll learn how to properly dispose of storage drives, how to securely format data, and methods for securely deleting individual files. << Previous Video: Securing Mobile Devices Next: Securing a SOHO Network >>

Continue Reading

Securing Mobile Devices – CompTIA A+ 220-1002 – 2.8

Securing Mobile Devices – CompTIA A+ 220-1002 – 2.8

| June 10, 2019

We rely on our mobile devices to securely store our personal information. In this video, you’ll learn about the security technologies that are used in our mobile phones and tablet devices. << Previous Video: Workstation Security Best Practices Next: Data Destruction and Disposal >>

Continue Reading

X