COMPTIA A+ (220-1001 and 220-1002)

ABOUT THIS COURSE:
Over 1 million IT professionals worldwide have the vendor neutral CompTIA A+ Certification and in the job market is considered the most essential IT certification for establishing an IT career. If you are trying to get your foot into the IT industry, this will help you achieve your goal. If you’re already an IT pro, the CompTIA A+ certification authenticates your skills and can enhances your career. CompTIA A+ certification endorses your understanding of the most common hardware and software technologies in business and certifies your skills necessary to support simple or difficult IT infrastructures. CompTIA A+ is a commanding credential that helps IT professionals globally ignite their IT career. Maximize your learning by not only testing your knowledge of the material, but also by providing additional information on the topics presented. To gain your COMPTIA A+ Global qualification you will be required to sit 2 exams. To find out more.
COURSE OBJECTIVE:
The CompTIA A+ Certification Program is one of the most highly recognisable qualifications in the IT world. Having the CompTIA A+ certification ensures that you are known for your IT skills as a generalist. This course gives you the following skills:
- You will be able to show core relevant security skills for IT support professionals
- Configure operating systems, such as Windows, Linux, Chrome OS, Mac, Android and iOS and administer client-based and also cloud-based (SaaS) software
- Spotting issues and solving core service issues and support challenges while applying best practices for documentation, change management, and scripting
- Support basic IT functions, Hardware, software and networking
- Configure and support PC, mobile and IoT device hardware
- Learn about disaster recovery methods in cybersecurity and much more…
Certification Exam Information:
The official Certification Exams is included with this Course. With CompTIA A+, there are 2 exams (1001 and 1002) and they are both included as part of this package.
We can help with booking your certification exam when you have completed the course. The Exam Vouchers are valid for 12 months and are to be used within the 12 month period. Exam vouchers is non – refundable. CLICK HERE and contact our Learning Consultants or ask a question via the chat function.
This Course Package includes:
- E- Learning Course – 12 months
- Practice Virtual Labs – 12 months
- Downloadable course notes
- Practice exam – Valid for 6 months from the first time you log in and access the Exam portal.
- Certification Exam Vouchers included and valid for 12 months
Pre-Requisite for course:
NO Pre-requisites to study the course.
Pre-Requisite for certification:
Complete this relevant study program and passing the practice exam at a score of above 80% score.
OPERATING SYSTEMS
- Overview
- Computer Operating Systems
- Microsoft Windows
- Apple MacOS
- GNU Linux
SOFTWARE AND APPLICATIONS
- Software Usage Requirements
- Business And Productivity Software
- Business And Productivity Software Part 2
- Collaboration Software
- Web Browser Settings
- Web Browser Settings Part 2
SOFTWARE DEVELOPMENT
- Programming Concepts
- Programming Concepts Part 2
- Developing With Python
COMPUTER HARDWARE
- Central Processing Unit (CPU)
- Common Hardware
- Common Hardware Part 2
- Peripheral Devices
- Peripheral Devices Part 2
- Display Hardware
- Storage Hardware
NETWORKING
- Basic Networking Concepts
- Basic Networking Concepts Part 2
- Configuring A Wireless Router
- Configuring A Wireless Router Part 2
- Connection And Service Types
- Connection And Service Types Part 2
DATABASES
- Database Concepts
- Querying A Database
- Table Design
SECURITY
- Basic Security Principles
- Basic Security Principles Part 2
- Security Best Practices
- Security Best Practices Part 2
- Security Best Practices Part 3
TROUBLESHOOTING
- Troubleshooting Methodology
- Troubleshooting Methodology Part 2
- Troubleshooting Example
STUDY UNIT/ CURRICULUM
Overview | |
|
Common Operating Systems |
Common Operating Systems Part 2 | |
Common Operating Systems Part 3 | |
Common Operating Systems Part 4 | |
Troubleshooting Methodology | |
Windows Features And Tools | |
Windows Features And Tools Part 2 | |
Windows Features And Tools Part 3 | |
Windows Features And Tools Part 4 | |
Manage Files In Windows | |
Manage Files In Windows Part 2 | |
Manage Files In Windows Part 3 | |
Manage Files In Windows Part 4 | |
Manage Disks In Windows | |
Manage Disks In Windows Part 2 | |
Manage Disks In Windows Part 3 | |
Manage Disks In Windows Part 4 | |
Manage Disks In Windows Part 5 | |
Manage Devices In Windows | |
Manage Devices In Windows Part 2 | |
Manage Devices In Windows Part 3 | |
Manage Devices In Windows Part 4 | |
Manage Devices In Windows Part 5 |
INSTALLING AND CONFIGURING PC COMPONENTS
Common Connection Interfaces | |
Safety Procedures | |
Common Connection Interfaces Part 2 | |
Safety Procedures Part 2 | |
Common Connection Interfaces Part 3 | |
Common Connection Interfaces Part 4 | |
PC Components | |
PC Components Part 2 | |
Peripheral Device Types | |
PC Components Part 3 | |
PC Components Part 4 | |
Peripheral Device Types Part 2 | |
PC Components Part 5 | |
PC Components_ Motherboard Form Factors | |
PC Components: Expansion Slots |
INSTALLING CONFIGURING TROUBLESHOOTING DISPLAY AND MULTIMEDIA DEVICES
Display Device: Connections | |
Display Device: Connections Part 2 | |
Display Devices: Characteristics | |
Display Devices: Resolution | |
Troubleshooting Display Devices | |
Multimedia Devices |
INSTALLING CONFIGURING TROUBLESHOOTING STORAGE DEVICES
Install System Memory | |
Install System Memory Part 2 | |
Install System Memory Part 3 | |
Mass Storage Devices: Optical Drives | |
Mass Storage Devices: Optical Drives Part 2 | |
Mass Storage Devices: Flash Storage | |
Mass Storage Devices: HDDs And SSDs | |
Mass Storage Devices: HDDs And SSDs Part 2 | |
Mass Storage Devices: RAID | |
Mass Storage Devices: RAID Part 2 | |
Removable Storage Devices | |
Troubleshooting Storage Devices |
INSTALLING CONFIGURING TROUBLESHOOTING INTERNAL SYSTEM COMPONENTS
Configure And Upgrade BIOS UEFI | |
Configure And Upgrade BIOS UEFI Part 2 | |
Power Supplies | |
Troubleshoot Internal System Components | |
Custom PCs | |
Custom PCs Part 2 |
INSTALLING CONFIGURING AND MAINTAINING OPERATING SYSTEMS
Configure And Use Linux | |
Configure And Use Linux Part 2 | |
Configure And Use MacOS | |
Configure And Use MacOS Part 2 | |
Configure And Use MacOS Part 3 | |
Configure And Use MacOS Part 4 | |
Install And Upgrade Operating Systems | |
Install And Upgrade Operating Systems Part 2 | |
Install And Upgrade Operating Systems Part 3 | |
Maintain Operating Systems | |
Maintain Operating Systems Part 2 | |
Maintain Operating Systems Part 3 |
MAINTAINING AND TROUBLESHOOTING MICROSOFT WINDOWS
Install And Manage Windows Applications | |
Install And Manage Windows Applications Pt2 | |
Install And Manage Windows Applications Pt3 | |
Install And Manage Windows Applications Pt4 | |
Manage Windows Performance | |
Manage Windows Performance Part 2 | |
Manage Windows Performance Part 3 | |
Troubleshoot Windows | |
Troubleshoot Windows Part 2 | |
Troubleshoot Windows Part 3 | |
Troubleshoot Windows Part 4 |
NETWORK INFRASTRUCTURE CONCEPTS
Wired Networks | |
Wired Networks Part 2 | |
Wired Networks Part 3 | |
Wired Networks Part 4 | |
Wired Networks Part 5 | |
Network Hardware Devices | |
Network Hardware Devices Part 2 | |
Network Hardware Devices Part 3 | |
Wireless Networks | |
Wireless Networks Part 2 | |
Wireless Networks Part 3 | |
Wireless Networks Part 4 | |
Internet Connections Types | |
Internet Connection Types Part 2 | |
Internet Connection Types Part 3 | |
Network Configuration: OSI And TCP/IP | |
Network Configuration: OSI And TCP/IP Pt.2 | |
Network Configuration: Routers | |
Network Configuration: IPv4 Addressing | |
Network Configuration: IPv4 Addressing Pt.2 | |
Network Configuration: IPv6 | |
Network Configuration: Host Configuration | |
Network Configuration: Host Configuration Part 2 | |
Network Configuration: IP Address Format | |
Network Configuration: IP Address Format Pt.2 | |
Network Configuration: Network Services | |
Network Configuration: Network Services Part 2 | |
Network Configuration: Network Services Pt.3 | |
Network Configuration: Network Services Pt.4 |
CONFIGURING AND TROUBLESHOOTING NETWORKS
Network Connection Settings | |
Network Connection Settings Part 2 | |
Install And Configure SOHO Networks | |
Configure SOHO Network Security | |
Configure SOHO Network Security Part 2 | |
Configure Remote Access | |
Configure Remote Access Part 2 | |
Troubleshooting Network Connections | |
Troubleshooting Network Connections Part 2 | |
Troubleshooting Network Connections Part 3 | |
Troubleshooting Network Conneciton Part 4 | |
Install And Configure IoT Devices |
MANAGING USERS WORKSTATIONS AND SHARED RESOURCES
Manage Users | |
Manage Users Part 2 | |
Manage Users Part 3 | |
Shared Resources: Shares And Printer Sharing | |
Shared Resources: Shares And Printer Sharing Pt2 | |
Shared Resources: Network And Sharing Center | |
Shared Resources: Workgroups And HomeGroups | |
Shared Resources: NTFS Permissions | |
Shared Resources: NTFS Permissions Part 2 | |
Shared Resources: NTFS Permissions Part 3 | |
Shared Resources: NTFS Permissions Part 4 | |
Configure Active Directory Accounts And Policies | |
Configure Active Directory Accounts, Policies Pt 2 | |
Configure Active Directory Accounts, Policies Pt 3 | |
Configure Active Directory Accounts, Policies Pt 4 |
IMPLEMENTING CLIENT VIRTUALIZATION AND CLOUD COMPUTING
Configure Client-Side Virtualization | |
Configure Client-Side Virtualization Part 2 | |
Configure Client-Side Virtualization Part 3 | |
Cloud Computing Concepts | |
Cloud Computing Concepts Part 2 |
SECURITY CONCEPTS
Logical Security Concepts | |
Logical Security Concepts Part 2 | |
Logical Security Concepts Part 3 | |
Logical Security Concepts Part 4 | |
Physical Security | |
Threats And Vulnerabilities | |
Threats And Vulnerabilities Part 2 |
SECURING WORKSTATIONS AND DATA
Implement Security Best Practices | |
Implement Security Best Practices Part 2 | |
Implement Data Protection Policies | |
Implement Data Protection Policies Part 2 | |
Protect Data During Incident Response |
TROUBLESHOOTING WORKSTATION SECURITY ISSUES
Detect, Remove And Prevent Malware | |
Detect, Remove And Prevent Malware Part 2 | |
Detect, Remove And Prevent Malware Part 3 | |
Workstation Security Issues | |
Workstation Security Issues Part 2 | |
Workstation Security Issues Part 3 |
SUPPORTING AND TROUBLESHOOTING LAPTOPS
Use Laptop Features | |
Install And Configure Laptop Hardware | |
Install And Configure Laptop Hardware Pt.2 | |
Troubleshoot Common Laptop Issues |
SUPPORTING AND TROUBLESHOOTING MOBILE DEVICES
Mobile Device Types | |
Mobile Device Types Part 2 | |
Mobile Device Types Part 3 | |
Mobile Device Accessories | |
Mobile Device Accessories Part 2 | |
Configure Mobile Device Network Connectivity | |
Configure Mobile Device Network Connectivity Pt2 | |
Supporting Mobile Apps | |
Securing Mobile Devices | |
Mobile Device Issues: Applications | |
Mobile Device Issues: OS And App Security | |
Mobile Device Issues: Operating Systems |
INSTALLING CONFIGURING AND TROUBLESHOOTING PRINT DEVICES
Printers | |
Printers Part 2 | |
Maintain Laser Printers | |
Maintain Laser Printers Part 2 | |
Maintain Inkjet Printers | |
Maintain Impact, Thermal And 3D Printers | |
Maintain Impact, Thermal And 3D Printers Pt.2 | |
Install And Configure Printers | |
Install And Configure Printers Part 2 | |
Install And Configure Printers Part 3 | |
Install And Configure Printers Part 4 | |
Troubleshoot Print Device Issues | |
Troubleshooting Print Device Issues Part 2 | |
Troubleshoot Print Device Issues Part 3 | |
Install And Configure Imaging Devices |
IMPLEMENTING OPERATIONAL PROCEDURES
Environmental Impacts And Controls | |
Environmental Impacts And Controls Part 2 | |
Environmental Impacts And Controls Part 3 | |
Environmental Impacts And Controls Part 4 | |
Create And Maintain Documentation | |
Basic Configuration And Change Management | |
Basic Configuration And Change Management Pt2 | |
Disaster Prevention And Recovery Methods | |
Disaster Prevention And Recovery Methods Pt2 | |
Disaster Prevention And Recovery Methods Pt3 | |
Basic Scripting Concepts | |
Basic Scripting Concepts Part 2 | |
Professionalism And Communication | |
Professionalism And Communication Part 2 |
HOW MANY HOURS TO STUDY
The course duration shown above depends on the learner, how quickly you pick the skills is up to you – the student. You have a comfortable 12 months (365 days) months access to your course material. You have more than enough time to complete this short course.
For Example:
** Part – time students dedicate on average 5 hours study time per week. Therefore, a 40 hour course would approximately take 8 – 10 weeks to complete at that pace of study.
COURSE LOCATION
Online – 100% Flexible Self Study – You study at your own pace, at your own time. You have 24 hours access via your own private study portal and you study at your time.
START DATE
Once you have enrolled and made payment for the course, our consultants will give you a ring and walk you through your portal set-up. You will receive your login details via the email address provided on the enrolment form within 48 hours. You can also pick your own start date! To pick your start date, after the payment is made, please send an email or send a message via our CONTACT US page.
Mode of Delivery & Duration
The course is offered through an online learning mode. The self paced online mode can be started and completed anytime during the course access duration of 12 months.
PRACTICE LABS INFORMATION
- Gain practical experience with real-world scenarios.
- You have access to real hardware and software in real time.
- Experiment and put theory that you learn into real practice.
- 100% hands on excercises on real equipment connected remotely.
- You receive 12 months access to the practice labs
PRACTICE EXAMS INFORMATION
The practice tests are designed to help candidates prepare for and pass the relevant certification exams first time.
The practice exam is aimed at professionals and covers a wide range of fundamental topics related to the certification exam. It simulates the actual exam with time being measured.
System Requirements
- Windows 7 or newer, OSX 10.9 or newer
Brower Requirements
- PC: Chrome 39 or newer; Firefox 34 or newer; Internet Explorer 10 or newer
- Linux: Chrome 39 or newer; Firefox 34 or newer
- Mac: Chrome 39 or newer; Firefox 34 or newer; Safari 8 or newer
- iOS: Safari 8 or newer; Chrome 39 or newer
- Android: 4.0 or newer; Chrome 39 or newer
Delivery
Your will receive your login details within 24 hours after your transaction is complete that will include a registration key and instructions on how to redeem the key. Ensure you are registered for the oractice exam within 12 months of purchase. Please contact us if you have any questions around the practice tests.
Validity
Practice Exams are valid for 6 months from the first date that you log into your Practice Exam portal.
20 hours study time
Course Access: 12 months
Study Mode: Online
Certificate of Completion
Support: Practice Test included
Pre Requisites: None
Fees: AUD $1,295.00

Career opportunities:
- Anyone looking for a start in IT
- Career changer into IT
- Graduate
- School leaver
- IT Hobbyist
- IT Technician role
- IT Helpdesk roles
- IT Administration Roles
Looking to study more than one course?
If you are looking at completing more than one Certification in the next 12 months, it might be worthwhile looking at our Course Subscription option. To find out more SUBSCRIPTION OPTIONS
Resources Required:
- Access to the internet with atleast ADSL2 connection
- MAC or PC computer
- Basic knowledge of computers i.e be able to surf the internet and be comfortable listening to audio and visuals.
PAYMENT OPTIONS:
- Payment an be made up-front via credit or debit card, bank transfer or PayPal. Click on the Enrol Now Button to Enrol
- Contact our learning consultants and they can support you through the enrolment process too.
Fees: AUD $1,295.00
Further Questions? Enter your details...
What others looked at
Certified Ethical Hacker – CEH v11
Ethical Council – Certified Ethical Hacker v11ABOUT THIS COURSE:The Certified Ethical Hacker training course is the latest Cybersecurity certification released in October 2020. Attention! IT security professionals, this course provides you with an in depth viewpoint...
Certified Secure Computer User (CSCU)
Ethical Council – Certified Secure Computer User (CSCU)ABOUT THIS COURSE:The Certified Secure Computer User (CSCU) from the Ethical Council is a study program aimed at individuals who want to up skill and gain knowledge on how to protect IT Information assets on an...
CompTIA IT Fundamentals+ (Exam – FC0-U61)
CompTIA IT Fundamentals+ (Exam - FC0-U61)ABOUT THIS COURSE:This course is designed for anyone who has no IT experience and would like to understand what a career in IT would be like. Individuals who have completed this course improve their knowledge in the different...