This guide summarizes the four major domains covered in the Core 2 (220-1102) CompTIA A+ certification exam. It is intended for aspiring help desk technicians, field service techs, and IT support professionals.
💻 1.0 Operating Systems (31%)
- Windows editions: Home, Pro, Enterprise, features like BitLocker, RDP, domain joining.
- CLI tools: ipconfig, chkdsk, net user, sfc, etc.
- Control Panel & Settings: Configure Firewall, Power Options, Device Manager.
- OS management: Use Task Manager, Event Viewer, MMC snap-ins, msconfig.
- Networking: VPN setup, proxy, static/dynamic IPs, private vs. public networks.
- Application installation: Requirements, distribution methods, OS compatibility.
- OS types: Windows, Linux, macOS, Android, iOS, Chrome OS.
- Install methods: Clean, recovery, dual boot, image deployment.
- macOS tools: Keychain, Disk Utility, Terminal, System Preferences.
- Linux tools: sudo, apt-get, grep, nano, chown, etc.
🔐 2.0 Security (25%)
- Physical security: Locks, biometrics, motion sensors, video surveillance. Learn more about physical security from the SANS Institute .
- Logical security: MFA, ACLs, AD groups, principle of least privilege. For more details, visit the NIST Cybersecurity Framework .
- Wireless security: WPA3, WPA2, RADIUS, TACACS+. Learn more about wireless security standards from the Wi-Fi Alliance .
- Malware tools: Remove trojans, ransomware, keyloggers, rootkits. For malware removal best practices, refer to Kaspersky Threats Resource Center .
- Social engineering: Phishing, whaling, tailgating, impersonation. Learn how to prevent social engineering attacks from CISA (Cybersecurity and Infrastructure Security Agency) .
- Threat mitigation: DDoS, spoofing, SQLi, XSS, zero-day vulnerabilities. Learn about threat mitigation techniques from OWASP (Open Web Application Security Project) .
- Windows security: BitLocker, UAC, group policies, file permissions. For more information, visit the Microsoft Security Documentation .
- Device hardening: Screen locks, MDM, failed login lockouts, encryption. Learn about device hardening techniques from CIS (Center for Internet Security) .
- Data disposal: Wiping, low-level format, degaussing, vendor certification. For secure data disposal methods, refer to NIST Special Publication 800-88
🛠️ 3.0 Software Troubleshooting (22%)
- Windows issues: BSOD, slow boot, failed services, profile errors.
- Security symptoms: Popups, antivirus alerts, file changes, browser redirects.
- Malware removal: Safe mode scan, restore, reimage, user education.
- Mobile OS problems: Crashing apps, connectivity issues, screen not rotating.
- Mobile security: APK concerns, fake apps, performance slowdown, data leaks.
📋 4.0 Operational Procedures (22%)
- Documentation: Tickets, asset tags, AUPs, network diagrams, SOPs.
- Change management: Approvals, rollback plans, scope and risk.
- Backup: Full, incremental, differential; rotation strategies; 3-2-1 rule.
- Safety: ESD protection, lifting, fire safety, power safety. Learn more about safety best practices from the Occupational Safety and Health Administration (OSHA) .
- Environmental: Ventilation, proper disposal of e-waste, surge protection. For proper e-waste disposal guidelines, refer to the EPA Electronics Recycling Guide .
- Policy & law: Chain of custody, DRM, EULA, PII regulations. Learn more about data privacy regulations from the GDPR Information Portal .
- Communication: Listen, avoid jargon, professionalism, follow-up. For effective communication tips, visit the MindTools Communication Skills Guide .
- Scripting: .bat, .ps1, .sh for automation and task execution. Learn more about scripting basics from the Codecademy Command Line Course .
- Remote access: VPN, SSH, MSRA, VNC, third-party remote tools. For secure remote access practices, refer to the Cisco VPN Overview .