Loading...
Skip to Content
Menu
Standards
Motherboards
Form Factors
ATX
Micro ATX
Mini ATX
Connections
SATA
USB
PCIe
SATA
Black Hovers
Wireless 802.11
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Cables
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Connectors
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Wide (Gutter)
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Wide (Titles)
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Masonry
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Single
Single 1
Single 2
Single 3
Single 4
Single 5
Parallax
Promo
Lazyload
Hardware Standards Reference
Components
Motherboard Form Factors
Section 1.1
Image Parallax 2
Image Parallax 3
Image Parallax 4
Image Parallax 5
Fullwidth Image
Text Rotator
Slider Fullscreen
Slider Zoom Effect
Slider Fullwidth
Slider Background
Slider Revolution 1
Slider Revolution 2
Content Slider
With Play Button
BG Video Fullwidth
BG Video Fullscreen 1
BG Video Fullscreen 2
BG HTML5 Video (local)
Agency Header
Special Demos
New
Connections
SATA
Motherboards
Motherboard Form Factors
Computer Cooling
PCI Express
Image Parallax 5
Fullwidth Image
Text Rotator
Slider Fullscreen
Slider Zoom Effect
Slider Fullwidth
Slider Background
Slider Revolution 1
Slider Revolution 2
Content Slider
With Play Button
BG Video Fullwidth
BG Video Fullscreen 1
BG Video Fullscreen 2
BG HTML5 Video (local)
Agency Header
Special Demos
New
Chapter Highlights
Core 1
Chapter 1 Highlights
About Us 2
About Us 3
Services 1
Services 2
Services 3
Clients
Landing Page
Group 2
Team 1
Team 2
FAQ 1
FAQ 2
Pricing 1
Pricing 2
Contact 1
Contact 2
Group 3
Gallery Col 1
Gallery Col 2
Gallery Col 3
Gallery Col 4
Gallery Col 6
Login / Register
Under Construction
Error 404
Cable Standards
Accordions
Bars (Progress)
Buttons
Features Box
Form Fields
Grid
Icons Et-line
Icons Font Awesome
Images Lazyload
Messages
Page Titles
Sliders
Sliders Lazyload
Tabs
Typography
Video / Sound
Header Dark
Header Dark Transp
Header White
Header White Transp
Portfolio
Boxed
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Boxed (Gutter)
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Boxed (Titles)
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Wide
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Wide (Gutter)
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Wide (Titles)
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Masonry
2 Columns
3 Columns
4 Columns
5 Columns
Black Hovers
Single
Single 1
Single 2
Single 3
Single 4
Single 5
Parallax
Promo
Lazyload
Blog
Classic
Sidebar Left
Sidebar Right
Fullwidth
Columns
2 Columns
3 Columns
4 Columns
Masonry
2 Columns
3 Columns
4 Columns
Single
Sidebar Left
Sidebar Right
Fullwidth
Shop
2 Columns
3 Columns
4 Columns
Single Product
Shopping Cart
Search
Cart(0)
Eng
English
France
Germany
A+ Certification Core 2
Online resources for Certification
Home
/
A+
/
Index
A+ Certification
A Personal-Use reference page for the A+ Certification 220-1002 Core 2
Section 1 - Operating Systems
1.1 Operating Systems
Operating Systems Overview
1.2 Microsoft Windows
An Overview of Windows 7
An Overview of Windows 8 & 8.1
An Overview of Windows 10
Windows in the Enterprise
1.3 Installing Operating Systems
Installing Operating Systems
Installing and Upgrading Windows
1.4 The Windows Command Line
Microsoft Command Line Tools
Network Command Line Tools
1.5 Windows Features
Windows Administrative Tools
Windows Firewall with Advanced Security
System Configuration
Task Manager
Disk Management
System Utilities
1.6 Windows Control Panel
The Windows Control Panel
1.7 Installation Concepts
Installing Applications
1.8 Windows Networking
Home Groups, Workgroups and Domains
Windows Network Technoligies
Establishing Windows Network Connections
Configuring Windows Firewall
Windows IP Adress Configuration
Network Adapter Properties
1.9 macOS and Linux
Best Practices for macOS
macOS Tools
macOS Features
Best Practices for Linux
Linux Tools
Basic Linux Commands
Section 2 - Security
2.1 Physical Security
Physical Security
2.2 Logical Security
Logical Security
2.3 Wireless Security
Wireless Security
2.4 Malware
Types of Malware
Ani-Malware Tools
2.5 Security Threats
Social Engineering Attacks
Denial of Service
Zero-day Attacks
Man-in-the-middle
Brute Force Attacks
Spoofing
Non-compliant Systems
2.6 Windows Security
Windows Security Setttings
2.7 Workstation Security
Workstation Security Best Practices
2.8 Mobile Device Security
Securing Mobile Devices
2.9 Data Destruction and Disposal
Data Destruction and Disposal
2.10 SOHO Network Security
Securing a SOHO network
Section 3 - Software Troubleshooting
3.1 Troubleshooting Windows
Troubshooting Windows
Troubleshooting Solutions
3.2 Troubleshooting Security Issues
Troubleshooting Security Issues
3.3 Malware Removal
Removing Malware
3.4 Troubleshooting Mobile Applications
Troubleshooting Mobile Apps
3.5 Troubleshooting Mobile Device Security
Troubleshooting Mobile Device Security
Section 4 - Operational Procedures
4.1 Documentation
Documentation Best Practices
4.2 Change Management
Change Management
4.3 Disaster Recovery
Disaster Recovery
4.4 Safety Procedures
Safety Procedures
Managing Electrostatic Discharge
4.5 Environmental Impacts
Environmental Impacts
4.6 Privacy, Licensing, and Policies
Privacy, Licensing, and Policies
4.7 Communication and Professionalism
Comminucation
Professionalism
4.8 Scripting
Scripting
4.9 Remote Access
Remote Access Technologies