Overview
This lecture provides a comprehensive review of CompTIA A+ Core 2 exam topics, focusing on operating systems, security, troubleshooting, and support best practices essential for IT professionals.
Windows Operating Systems & Editions
- Windows 10 editions: Home, Pro, Pro for Workstations, and Enterprise have different features and RAM limits.
- Only Pro, Pro for Workstations, and Enterprise can join a domain and host Remote Desktop connections.
- Home edition lacks BitLocker, Hyper-V, and Group Policy Editor (gpedit.msc).
- Upgrading from older Windows versions retains data if done in-place; downgrades do not.
Command Line & System Tools
- Command Prompt is for basic commands; PowerShell adds scripting and is recommended for advanced use.
- Key navigation commands: cd (change directory), dir (list), md (make directory), rd (remove directory).
- File commands: copy, xcopy, robocopy, del (delete), diskpart (partition management), format, defrag.
- System repair: chkdsk, sfc, DISM, gpupdate, rsop.msc, winver, shutdown.
- Networking: ipconfig, ping, tracert, netstat, nslookup, net use, hostname.
Windows Graphical Tools
- Task Manager: manage processes, performance, startup, services.
- Microsoft Management Console (MMC) hosts snap-ins like Event Viewer, Disk Management, Task Scheduler, Device Manager, and Performance Monitor.
- Control Panel utilities: Programs and Features, Network and Sharing Center, Firewall, Device Manager, Power Options, Ease of Access, and more.
Modern Settings App & Networking
- Settings app centralizes configuration for System, Devices, Network, Gaming, Privacy, Update, and Security.
- Workgroup = peer-to-peer; Domain = centralized client-server.
- Network settings: IP address, DNS, subnet mask, gateway, VPN, wired/wireless types, proxy, public/private networks, metered connections.
Application Installation & OS Types
- Check application compatibility (32/64 bit), system requirements, and OS version.
- Windows 10: RAM limits by edition; 32-bit CPUs limited to 4GB RAM.
- Distribution: physical, download, ISO. Consider security, permissions, and network impact.
- OS types: Windows, macOS, Linux, Chrome OS (workstation); iOS, Android (mobile).
- File systems: NTFS (Windows), FAT32/xFAT (removable), ext4 (Linux), APFS/HFS+ (Mac).
- Vendor lifecycle: be aware of end-of-life/support for OS.
OS Installation & Upgrades
- Boot methods: USB, optical, network, external, internet.
- Installation types: clean, upgrade, unattended, imaging, network install, reset/restore, multiboot.
- Partition types: primary, extended, GPT vs MBR, basic vs dynamic.
- Backup before upgrade, verify compatibility, use BIOS/UEFI to boot from USB.
Mac OS & Linux Fundamentals
- macOS: GUI elements (menu bar, Dock), Finder, Spotlight, System Preferences, Keychain, Time Machine, Disk Utility, FileVault.
- Linux: open-source, multiple distributions, command line essential (ls, cd, mv, cp, rm, grep, df, chmod, chown, ps, kill, sudo).
- Package management: apt (Debian/Ubuntu), dnf/yum (Fedora/Red Hat), samba (file sharing).
- Backup utilities, anti-malware, and system maintenance tools are essential.
Security: Physical & Logical
- Physical: locks, key cards, biometrics, CCTV, shredding documents.
- Logical: authentication types, least privilege, UAC, MFA, MDM, Active Directory, group policies, access control lists.
- Wireless security: Prefer WPA3/WPA2-AES, avoid WEP/TKIP/open, use RADIUS/TACACS+/Kerberos for enterprise.
- Malware types: virus, Trojan, spyware, ransomware, keylogger, rootkit. Use antivirus, firewalls, OS/app updates, user education.
Security Best Practices
- Encrypt data at rest (BitLocker, EFS).
- Enforce strong passwords, account lockout, disable guest account, manage permissions.
- Secure mobile devices: screen locks, remote wipe, updates, encryption, MDM, secure IoT devices.
Data Disposal & Network Security
- Data sanitization: clearing (overwriting), purging (secure erase/degauss), destroying (physical).
- Secure SOHO routers: change defaults, update firmware, configure SSID, disable WPS, use MAC filtering, set up guest networks, firewall settings.
Troubleshooting Processes
- Windows Recovery Environment (WinRE): reset, system restore, safe mode, startup repair.
- Common PC issues: slow performance, BSOD, device errors, network problems—use Event Viewer, Device Manager, MSConfig, Safe Mode.
- Malware removal: CompTIA 7-step process (identify, quarantine, disable restore, remediate, update, enable restore, educate).
Documentation, Backup, Safety, and Professionalism
- Use diagrams, incident reports, SOPs, ticketing, asset management.
- Change management: document, test, approve, roll back if needed.
- Backup methods: full, incremental, differential, synthetic; rotate backups and test regularly.
- Safety: prevent ESD, handle components safely, manage power risks, proper environmental controls.
- Privacy, licensing, GDPR/PHI/PCI compliance.
- Communication: clear, professional, maintain confidentiality.
Scripting & Remote Access
- Understand data types, control structures, environment variables, comment syntax, file extensions (.ps1, .bat, .sh, .py).
- PowerShell for Windows, Bash for Linux, Python/JavaScript for specialized scripting.
- Remote access: RDP (TCP 3389), SSH (TCP 22), VPN protocols (PPTP, L2TP, SSTP, IKEv2).
- Secure remote tools: use strong passwords, MFA, encryption, firewall rules.
Key Terms & Definitions
- Domain — Network with centralized control (Active Directory).
- Workgroup — Peer-to-peer network without central control.
- BitLocker — Full disk encryption for Windows.
- NTFS — New Technology File System, default for Windows.
- Group Policy — Centralized Windows configuration management.
- UEFI/BIOS — Firmware interfaces for booting systems.
- MDM — Mobile Device Management for security/compliance.
- WPA3/WPA2 — Wi-Fi encryption standards.
- Kerberos — Ticket-based authentication protocol.
- Malware — Malicious software (virus, worm, Trojan, etc.).
Action Items / Next Steps
- Practice using Windows, macOS, and Linux tools and commands.
- Explore and configure operating system security features.
- Review and memorize CompTIA 7-step malware removal.
- Create backup and recovery plans for systems.
- Complete assigned readings and lab exercises on system administration and security.