CompTIA A+

Prerequisite: None

Course Duration:  35 hours
                             5 days training
                             9am - 4pm

Course Schedule: Monday - Friday
                           Every Saturday
                           Every Sunday

Equipment: Desktop & Laptop
                   Cat 6 crimping toolkit
                   SOHO Router, Switches
                   Windows OS
                   Linux OS
                   Patch Panel
                   Fiber Opptic Cable Termination

Inclusion (face-to-face training):  Lunch Meal
                                                     Certificate of completion
                                                     Training handout
                                                     Review material for exam
                                                     Free flowing coffee

Inclusion (Online Training):  Certificate of completion
                                              Training handout (soft copy)
                                              Review material for exam

Day 1

         1.0 Mobile Devices
• Given a scenario, monitor mobile device hardware and use appropriate replacement techniques.
• Compare and contrast accessories and connectivity options for mobile devices.
• Given a scenario, configure basic mobile device network connectivity and provide application support.

            2.0 Networking
• Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes.
• Explain wireless networking technologies.
• Summarize services provided by networked hosts.
• Explain common network configuration concepts.
• Compare and contrast common networking hardware devices.
• Given a scenario, configure basic wired/wireless small office/home office (SOHO) networks.
• Compare and contrast internet connection types, network types, and their characteristics.
• Explain networking tools and their purposes.

Day 2

               3.0 Hardware
• Compare and contrast display components and attributes.
• Summarize basic cable types and their connectors, features, and purposes.
• Compare and contrast RAM characteristics.
• Compare and contrast storage devices.
• Given a scenario, install and configure motherboards, central processing units (CPUs), and add-on cards.
• Given a scenario, install the appropriate power supply.
• Given a scenario, deploy and configure multifunction devices/printers and settings.
• Given a scenario, perform appropriate printer maintenance.

    4.0 Virtualization and Cloud
                Computing

• Explain virtualization concepts.
• Summarize cloud computing concepts.

     5.0 Hardware and Network
              Troubleshooting

• Given a scenario, troubleshoot motherboards, RAM, CPUs, and power.
• Given a scenario, troubleshoot drive and RAID issues.

Day 3

• Given a scenario, troubleshoot video, projector, and display issues.
• Given a scenario, troubleshoot common mobile device issues.
• Given a scenario, troubleshoot network issues.
• Given a scenario, troubleshoot printer issues.

         6.0 Operating Systems
• Explain common operating system (OS) types and their purposes.
• Given a scenario, perform OS installations and upgrades in a diverse environment.
• Compare and contrast basic features of Microsoft Windows editions.
• Given a scenario, use Microsoft Windows operating system features and tools.
• Given a scenario, use the appropriate Microsoft command-line tools.
• Given a scenario, configure Microsoft Windows settings.
• Given a scenario, configure Microsoft Windows networking features on a client/desktop.
• Explain common features and tools of the macOS/desktop operating system.
• Identify common features and tools of the Linux client/desktop operating system.

Day 4

• Given a scenario, install applications according to requirements.
• Given a scenario, install and configure cloud-based productivity tools.

               7.0 Security
• Summarize various security measures and their purposes.
• Given a scenario, configure and apply basic Microsoft Windows OS security settings.
• Compare and contrast wireless security protocols and authentication methods.
• Summarize types of malware and tools/methods for detection, removal, and prevention.
• Compare and contrast common social engineering attacks, threats, and vulnerabilities.
• Given a scenario, implement procedures for basic small office/home office (SOHO) malware removal.
• Given a scenario, apply workstation security options and hardening techniques.
• Given a scenario, apply common methods for securing mobile devices.
• Compare and contrast common data destruction and disposal methods.
• Given a scenario, apply security settings on SOHO wireless and wired networks.
• Given a scenario, configure relevant security settings in a browser.

Day 5

     8.0 Software Troubleshooting
• Given a scenario, troubleshoot common Windows OS issues.
• Given a scenario, troubleshoot common mobile OS and application issues.
• Given a scenario, troubleshoot common mobile OS and application security issues.
• Given a scenario, troubleshoot common personal computer (PC) security issues.

      9.0 Operational Procedures
• Given a scenario, implement best practices associated with documentation and support systems information management.
• Given a scenario, apply change management procedures.
• Given a scenario, implement workstation backup and recovery methods.
• Given a scenario, use common safety procedures.
• Summarize environmental impacts and local environment controls.
• Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.
• Given a scenario, use proper communication techniques and professionalism.
• Explain the basics of scripting.
• Given a scenario, use remote access technologies.
• Explain basic concepts related to artificial intelligence (AI).