Overview
This lecture covers key objectives of the CompTIA A+ Core 2 exam, focusing on operating systems, security, troubleshooting, documentation, scripting, and remote access best practices.
Windows Editions & Features
- Windows 10/11 editions: Home (128 GB RAM/client RDP), Pro (2 TB RAM/BitLocker/Domain), Pro for Workstations & Enterprise (6 TB RAM/client & server RDP).
- Only Pro, Workstations, Enterprise can join domains; Home edition cannot.
- RDP: All editions support client-side, only Pro/Workstations/Enterprise support incoming connections.
- BitLocker and Group Policy Editor (gpedit.msc) available in Pro editions and above.
- Hyper-V virtualization not available on Home edition.
- Upgrade paths maintain data; in-place upgrades preserve apps/settings, downgrades do not.
Windows Command Line & Tools
- Key commands: cd, dir, md, rmdir, copy, xcopy, robocopy, del, diskpart, format, defrag, chkdsk, sfc, gpupdate, rsop, winver, shutdown.
- Networking: ipconfig, ping, tracert, pathping, netstat, nslookup, net use, hostname.
- MMC snap-ins: eventvwr, diskmgmt, taskschd, devmgmt, perfmon, certmgr, lusrmgr.
Windows Graphical Tools & Settings
- Task Manager: manage processes, performance, startup, services (Ctrl+Shift+Esc).
- Control Panel: access Internet Options, Devices/Printers, Programs/Features, Firewall, User Accounts, Indexing Options, Power, Accessibility.
- Settings App: manage system, devices, network, personalization, apps, accounts, privacy, updates.
Networking Fundamentals
- Workgroup: peer-to-peer, no central authority.
- Domain: centralized control, common in businesses.
- IP configuration: static vs. DHCP, DNS, subnet mask, gateway.
- VPN: secure connections; wireless/wired/WAN options.
- Proxy servers: mediate/secure/filter internet access.
- Network types: public (restrictive), private (sharing enabled).
Application Installation & OS Types
- Check system/OS requirements, 32/64-bit compatibility, RAM/CPU/OS support.
- Distribution: physical media, downloads, ISO mounting.
- Windows RAM limits: Home 128GB; Pro 2TB; Workstation/Enterprise 6TB; 32-bit CPUs 4GB.
- OS Types: Windows, macOS, Linux, Chrome OS, Android, iOS.
- File systems: NTFS, FAT32, exFAT (Windows); ext4, ext3, NFS, swap (Linux); APFS, HFS+ (macOS).
- Vendor lifecycle: plan upgrades before EOL.
Installing & Partitioning Operating Systems
- Boot/install methods: USB, optical, PXE, internal/external drive, internet.
- Installation types: clean, upgrade, unattended, image, reset/restore, multiboot.
- Partitions: GPT (modern/UEFI/many partitions), MBR (old/BIOS/2TB/4 partitions).
- Back up before upgrades; select drive format (NTFS for Windows).
macOS & Linux Essentials
- macOS: closed source, Unix-based, key featuresβFinder, Spotlight, System Preferences, Keychain, Time Machine, Disk Utility, FileVault.
- Linux: open source, command line via terminal/bash, package management (apt, yum/dnf), ext4 file system, swap, common commands (ls, cd, mv, cp, rm, grep).
- Samba: enables Linux-Windows file sharing.
Security Fundamentals
- Physical security: locks, smart cards, biometrics, CCTV, alarms.
- Logical security: authentication factors, MFA, least privilege, UAC, MDM, Active Directory, group policies.
- Wireless security: WPA2/WPA3 (AES), RADIUS/TACACS+/Kerberos (know ports), avoid WEP/TKIP.
- Malware types: virus, worm, Trojan, spyware, rootkit, ransomware, keylogger, cryptominer.
- Malware defense: antivirus, OS updates, firewall, user education.
Software & Mobile Troubleshooting
- Windows Recovery Environment (WinRE): system restore, startup repair, safe mode.
- Troubleshoot: slow performance, app crashes, update failures, device/printing issues.
- Security issues: malware symptoms, browser redirection, invalid certificates, remote control, ransomware hoax.
- Mobile: troubleshoot app failures, connectivity, battery issues, update problems, reset (soft/hard).
Data & Device Security
- Encryption: BitLocker/EFS (Windows), FileVault (macOS), full drive encryption (recommended).
- Password best practices: complex, long, enforce via policies.
- Mobile device security: screen lock, timeout, remote wipe, locator apps, updates, encryption, antivirus.
- IoT security: strong passwords, updates, network segmentation.
Data Destruction & Disposal
- Overwrite, full format, diskpart/clean, Linux dd command, NIST 800-88: clear, purge, destroy.
- Certificates of destruction and chain of custody for compliance.
SOHO Network & Browser Security
- Router: change default passwords, update firmware, WPA2/3, MAC filtering, DHCP scope, disable WPS/UPnP, firewall, guest network, physical security.
- Browser: download from official sources, manage extensions, password manager, TLS/HTTPS, clear browsing data, use private browsing.
Documentation & Support
- Key docs: topology diagrams, incident reports, SOPs, compliance policies, AUPs, user checklists, ticketing systems, asset management.
- Change management: document purpose, scope, risk, rollback/backup plans, test in sandbox, get approvals.
Backup & Safety Procedures
- Backup types: full, incremental, differential, synthetic; 3-2-1 rule; backup rotation (GFS), on/offsite.
- Safety: use ESD prevention, anti-static tools, disconnect power, fire safety (Class C extinguisher), ergonomics, MSDS, recycling/battery disposal.
Scripting & Remote Access
- Data types: integer, string; constructs: if statements, loops; environment variables; comment syntax; script types/extensions (.ps1, .bat, .sh, .py, .js, .vbs).
- Remote access: RDP (port 3389), SSH (port 22), VPN, VNC, TeamViewer; use MFA, encryption, firewall settings.
Key Terms & Definitions
- Domain β Centralized computer network for businesses.
- Workgroup β Peer-to-peer network with no central control.
- NTFS β Windows file system supporting permissions/encryption.
- BitLocker β Full disk encryption for Windows.
- Active Directory (AD) β Microsoft directory service for management of users and computers.
- VPN β Secure, encrypted remote connection to a private network.
- RADIUS β Centralized authentication protocol (UDP 1812/1813).
- WPA2/WPA3 β Secure Wi-Fi protocols.
- Group Policy β Centralized management of Windows settings.
- Malware β Malicious software like virus, Trojan, ransomware, etc.
- Restore Point β Snapshot of Windows system state for recovery.
- Sandbox Testing β Safe, isolated environment for software changes.
- 3-2-1 Backup Rule β 3 copies, 2 media types, 1 off-site.
Action Items / Next Steps
- Review and practice key Windows/Linus/macOS commands and utilities.
- Explore Control Panel, Settings App, and MMC tools on a test system.
- Practice upgrade, backup, and restore procedures.
- Memorize security protocols, authentication ports, and practical malware removal steps.
- Develop sample documentation (SOP, incident report, backup plan).
- Practice safe browser and SOHO network configurations.