EC Council Training Center
Skill India Development
 Skill India
ISO
IAF
NSDC

CompTIA A+ Certification Course in Delhi

image
image
image
image
image
image
IICSEH

CompTIA A+

Section-1 Hardware

  • Explain basic cable types, features, and their purposes
  • Identify common connector types
  • Given a scenario, install RAM types
  • Given a scenario, select, install and configure storage devices
  • Given a scenario, install and configure motherboards, CPUs, and add-on cards
  • Explain the purposes and uses of various peripheral types
  • Summarize power supply types and features
  • Given a scenario, select and configure appropriate components for a custom PC
  • configuration to meet customer specifications or needs
  • Given a scenario, install and configure common devices
  • Given a scenario, configure SOHO multifunction devices/printers and settings
  • Given a scenario, install and maintain various print technologies

Section-2 Operating System

  • Compare and contrast common operating system types and their purposes
  • Compare and contrast features of Microsoft Windows versions
  • Summarize general OS installation considerations and upgrade methods
  • Given a scenario, use appropriate Microsoft command line tools
  • Given a scenario, use Microsoft operating system features and tools
  • Given a scenario, use Microsoft Windows Control Panel utilities
  • Summarize application installation and configuration concepts

Section-3 Software Troubleshooting

  • Given a scenario, troubleshoot Microsoft Windows OS problems
  • Given a scenario, troubleshoot and resolve PC security issues
  • Given a scenario, use best practice procedures for malware removal

Section-4 Hardware and Network Troubleshooting

  • Given a scenario, use the best practice methodology to resolve problems
  • Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
  • Given a scenario, troubleshoot hard drives and RAID arrays
  • Given a scenario, troubleshoot video, projector, and display issues
  • Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
  • Given a scenario, troubleshoot printers
  • Given a scenario, troubleshoot common wired and wireless network problems

Section-5 Security

  • Summarize the importance of physical security measures
  • Explain logical security concepts
  • Compare and contrast wireless security protocols and authentication methods
  • Given a scenario, detect, remove, and prevent malware using appropriate tools and methods

Section-6 Networking

  • Compare and contrast TCP and UDP ports, protocols, and their purpose
  • Compare and contrast common networking hardware devices
  • Given a scenario, install and configure a basic wired/wireless SOHO network
  • Compare and contrast wireless networking protocols
  • Summarize the properties and purposes of services provided by networked hosts
  • Explain common network configuration concepts
  • Compare and contrast Internet connection types, network types, and their features
  • Given a scenario, use appropriate networking tools

Section-7 Mobile Devices

  • Given a scenario, install and configure laptop hardware and components
  • Given a scenario, install components within the display of a laptop
  • Given a scenario, use appropriate laptop features
  • Compare and contrast characteristics of various types of other mobile devices
  • Given a scenario, connect and configure accessories and ports of other mobile devices
  • Given a scenario, configure basic mobile device network connectivity and application support
  • Given a scenario, use methods to perform mobile device synchronization

Section-8 Virtualization Cloud Computing

  • Compare and contrast cloud computing concepts
  • Given a scenario, set up and configure client-side virtualization

Section-9 Operational Procedures

  • Compare and contrast best practices associated with types of documentation
  • Given a scenario, implement basic change management best practices.
  • Explain common safety procedures
  • Given a scenario, use remote access technologies