Course Description:
The CompTIA A+ Core 2 (220-1202) course is designed to prepare students for the second exam required to earn the CompTIA A+ certification, one of the most globally recognized entry-level IT certifications. This course focuses on the software, security, troubleshooting, and operational skills needed by modern IT support professionals.
While Core 1 (220-1201) focuses mainly on hardware and networking basics, Core 2 builds the real-world skills required to support users, secure systems, troubleshoot operating systems, and follow professional IT procedures in workplace environments.
This course follows CompTIA’s official Exam Objectives Version 3.0 (V15) to ensure students are fully aligned with the current exam blueprint.
Why This Course Is Needed
Modern IT support roles require more than just hardware knowledge. Organizations expect IT professionals to:
- Secure systems against malware and cyber threats
- Troubleshoot Windows, macOS, Linux, and mobile operating systems
- Support end users professionally and efficiently
- Follow operational, safety, documentation, and compliance procedures
The CompTIA A+ Core 2 course provides these essential skills, making it a critical step for anyone starting or growing a career in IT support.
What Students Will Learn
By completing this course, students will gain knowledge and hands-on understanding of:
- Operating Systems
- Windows 10 and Windows 11 configuration and management
- macOS and Linux fundamentals
- Command-line tools and system utilities
- Security
- Physical and logical security concepts
- Malware types, removal techniques, and prevention
- User account management, encryption, and authentication
- Mobile device and wireless security
- Software Troubleshooting
- Diagnosing and resolving OS and application issues
- Mobile device troubleshooting
- Security-related software problems
- Operational Procedures
- Professional communication and customer support
- Documentation, ticketing systems, and change management
- Backup and recovery methods
- Safety, compliance, licensing, and privacy concepts
- Basic scripting, automation, and remote access tools
- Introduction to AI concepts and responsible use
How This Course Helps Students
This course helps students:
- Prepare confidently for the CompTIA A+ Core 2 (220-1202) exam
- Build job-ready skills for roles such as:
- IT Support Specialist
- Help Desk Technician
- Desktop Support Technician
- Technical Support Analyst
- Understand real-world IT environments, not just exam theory
- Develop professional behavior and troubleshooting methodologies expected by employers
Who Should Take This Course
This course is ideal for:
- Beginners entering the IT field
- Students preparing for CompTIA A+ certification
- Help desk and technical support professionals
- Career changers looking for an entry point into IT
Recommended experience:
Approximately 12 months of hands-on experience in an IT support or help desk role (not mandatory but helpful).
Certification, Validity, and Renewal
- Certification Earned: CompTIA A+ (after passing Core 1 and Core 2 exams)
- Certification Validity: 3 years from the date of certification
- Renewal Options:
- Continuing Education Units (CEUs)
- Passing a higher-level CompTIA certification
- Completing CompTIA CertMaster CE
CompTIA A+ is part of CompTIA’s Continuing Education (CE) program, ensuring certified professionals stay current with evolving technologies.
Exam Information (Core 2 – 220-1202)
- Number of Questions: Maximum 90
- Question Types: Multiple-choice and performance-based
- Exam Duration: 90 minutes
- Passing Score: 700 (on a scale of 100–900)
- Exam Weighting:
- Operating Systems – 28%
- Security – 28%
- Software Troubleshooting – 23%
- Operational Procedures – 21%
Summary
The CompTIA A+ 220-1202 Exam Objectives (3.0) course equips students with essential IT support, security, troubleshooting, and professional skills required in today’s technology-driven workplaces. It serves as a strong foundation for an IT career and is widely trusted by employers across the globe.
1.0 Operating Systems (28%)
1.1 Explain common operating system (OS) types and their purposes
- Feature updates
−Product life cycle - Workstation operating systems
- −Windows
- −Linux
- −macOS
- −Chrome OS
- Mobile OSs
−iPadOS
−iOS
−Android - Various filesystem types
−New Technology File System (NTFS)
−Resilient File System (ReFS)
−File Allocation Table 32 (FAT32)
−Fourth extended filesystem (ext4)
−Extended filesystem (XFS)
−Apple File System (APFS)
−Extensible File Allocation Table (exFAT) - Vendor life-cycle limitations
−End-of-life (EOL)
−Update limitations - Compatibility concerns between operating systems
1.2 Given a scenario, perform OS installations and upgrades in a diverse environment.
- Boot methods
−Universal Serial Bus (USB)
−Network
−Solid-state/flash drives
−Internet-based
−External/hot-swappable drive
−Internal hard drive (partition)
−Multiboot - Types of installations
−Clean install
−Upgrade
−Image deployment
−Remote network installation
−Zero-touch deployment
−Recovery partition
−Repair installation
−Other considerations
գThird-party drivers - Partitioning
−GUID [globally unique identifier] Partition Table (GPT)
−Master boot record (MBR) - Drive format
- Upgrade considerations
−Backup files and user preferences
−Application and driver support/backward compatibility
−Hardware compatibility - Feature updates
−Product life cycle
1.3 Compare and contrast basic features of Microsoft Windows editions.
- Windows 10 editions
−Home
−Pro
−Pro for Workstations
−Enterprise - Windows 11 editions
−Home
−Pro
−Enterprise - N versions
- Feature differences
−Domain vs. workgroup
−Desktop styles/user interface
−Availability of Remote
Desktop Protocol (RDP)
−Random-access memory
(RAM) support limitations
−BitLocker
−gpedit.msc - Upgrade paths
−In-place upgrade
−Clean install - Hardware requirements
−Trusted Platform Module (TPM)
−Unified Extensible Firmware
Interface (UEFI)
1.4 Given a scenario, use Microsoft Windows operating system features and tools.
- Task Manager
−Services
−Startup
−Performance
−Processes
−Users - Microsoft Management
Console (MMC) snap-in
−Event Viewer (eventvwr.msc)
−Disk Management (diskmgmt.msc)
−Task Scheduler (taskschd.msc)
−Device Manager (devmgmt.msc)
−Certificate Manager (certmgr.msc)
−Local User and Groups
(lusrmgr.msc)
−Performance Monitor (perfmon.msc)
−Group Policy Editor (gpedit.msc) - Additional tools
−System Information (msinfo32. exe)
−Resource Monitor (resmon.exe)
−System Configuration
(msconfig. exe)
−Disk Cleanup (cleanmgr.exe)
−Disk Defragment (dfrgui.exe)
−Registry Editor (regedit.exe)
1.5 Given a scenario, use the appropriate Microsoft command-line tools.
- Navigation
−cd
−dir - Network
−ipconfig
−ping
−netstat
−nslookup
−net use
−tracert
−pathping - Disk management
−chkdsk
−format
−diskpart - File management
−md
−rmdir
−robocopy - Informational
−hostname
−net user
−winver
−whoami
−[command name] /? - OS management
−gpupdate
−gpresult
−sfc
1.6 Given a scenario, configure Microsoft Windows settings
- Internet Options
- Devices and Printers
- Program and Features
- Network and Sharing Center
- System
- Windows Defender Firewall
- Sound
- User Accounts
- Device Manager
- Indexing Options
- Administrative Tools
- File Explorer Options
−View hidden files
−Hide extensions
−General options
−View options - Power Options
−Hibernate
−Power plans
−Sleep/suspend
−Standby
−Choose what closing the lid does
−Turn on fast startup
−USB selective suspend - Ease of Access
- Time and Language
- Update and Security
- Personalization
- Apps
- Privacy
- System
- Devices
- Network and Internet
- Gaming
- Accounts
1.7 Given a scenario, configure Microsoft Windows networking features on a client/desktop.
- Domain joined vs. workgroup
−Shared resources
−Printers
−File servers
−Mapped drives - Local OS firewall settings
−Application restrictions and exceptions
−Configuration - Client network configuration
−Internet Protocol (IP) addressing scheme
−Domain Name System (DNS) settings
−Subnet mask
−Gateway
−Static vs. dynamic - Establish network connections
−Virtual private network (VPN)
−Wireless
−Wired
−Wireless wide area network (WWAN)/cellular network - Proxy settings
- Public network vs. private network
- File Explorer navigation–network paths
- Metered connections and limitations
1.8 Explain common features and tools of the macOS/desktop operating system.
- Installation and uninstallation
- of applications
- −File types
- գ .dmg
- գ .pkg
- գ .app
- −App Store
- −Uninstallation process
- System folders
−/Applications
−/Users
−/Library
−/System
−/Users/Library - Apple ID and corporate restrictions
- Best practices
−Backups
−Antivirus
−Updates/patches
−Rapid Security Response (RSR) - System Preferences
−Displays
−Networks
−Printers
−Scanners
−Privacy
−Accessibility
−Time Machine - Features
−Multiple desktops
−Mission Control
−Keychain
−Spotlight
−iCloud
գ iMessage
գFaceTime
գDrive
−Gestures
−Finder
−Dock
−Continuity - Disk Utility
- FileVault
- Terminal
- Force Quit
1.9 Identify common features and tools of the Linux client/desktop operating system.
- File management
−ls
−pwd
−mv
−cp
−rm
−chmod
−chown
−grep
−find - Filesystem management
−fsck
−mount - Administrative
−su
−sudo - Package management
−apt
−dnf - Network
−ip
−ping
−curl
−dig
−traceroute - Informational
−man
−cat
−top
−ps
−du
−df - Text editors
−nano - Common configuration files
−/etc/passwd
−/etc/shadow
−/etc/hosts
−/etc/fstab
−/etc/resolv.conf - OS components
−systemd
−kernel
−bootloader - Root account
1.10 Given a scenario, install applications according to requirements.
- System requirements
for applications
−32-bit vs. 64-bit dependent
application requirements
−Dedicated vs. integrated
graphics card
−Video random-access memory
(VRAM) requirements
−RAM requirements
−Central processing unit
(CPU) requirements
−External hardware tokens
−Storage requirements
−Application to OS compatibility - Distribution methods
−Physical media vs.
mountable ISO file
−Downloadable package
−Image deployment - Impact considerations
for new applications
−Device
−Network
−Operation
−Business
1.11 Given a scenario, install applications and cloud-based productivity tools
- Email systems
- Storage
−Sync/folder settings - Collaboration tools
−Spreadsheets
−Videoconferencing
−Presentation tools
−Word processing tools
−Instant messaging - Identity synchronization
- Licensing assignment
2.0 Security (28%)
2.1 Summarize physical and logical security measures
- Physical security
−Bollards
−Access control vestibule
−Badge reader
−Video surveillance
−Alarm systems
−Motion sensors
−Door locks
−Equipment locks
−Security guards
−Fences - Physical access security
−Key fobs
−Smart cards
−Mobile digital key
−Keys
−Biometrics
գRetina scanner
գFingerprint scanner
գPalm print scanner
գFacial recognition
technology (FRT)
գVoice recognition technology
−Lighting
−Magnetometers - Logical security
−Principle of least privilege
−Zero Trust model
−Access control lists (ACLs)
−Multifactor authentication (MFA)
գEmail
գHardware token
գ Authenticator application
գ Short Message Service (SMS)
գVoice call
գTime-based one-time
password (TOTP)
գOne-time password/
passcode (OTP)
−Security Assertions Markup
Language (SAML)
−Single sign-on (SSO)
−Just-in-time access
գPrivileged access
management (PAM)
−Mobile device management (MDM)
−Data loss prevention (DLP)
−Identity access management (IAM)
−Directory services
2.2 Given a scenario, configure and apply basic Microsoft Windows OS security settings.
- Defender Antivirus
−Activate/deactivate
−Update definitions - Firewall
−Activate/deactivate
−Port security
−Application security - User and groups
−Local vs. Microsoft account
−Standard account
−Administrator
−Guest user
−Power user - Log-in OS options
−Username and password
−Personal identification number (PIN)
−Fingerprint
−Facial recognition
−SSO
−Passwordless/Windows Hello - NTFS vs. share permissions
−File and folder attributes
−Inheritance - Run as administrator
vs. standard user - User Account Control (UAC)
- BitLocker
- BitLocker-To-Go
- Encrypting File System (EFS)
- Active Directory
−Joining domain
−Assigning log-in script
−Moving objects within
organizational units
−Assigning home folders
−Applying Group Policy
−Selecting security groups
−Configuring folder redirection
2.3 Compare and contrast wireless security protocols and authentication methods.
- Protocols and encryption
−Wi-Fi Protected Access 2 (WPA2)
−WPA3
−Temporal Key Integrity
Protocol (TKIP)
−Advanced Encryption
Standard (AES) - Authentication
−Remote Authentication Dial
in User Service (RADIUS)
−Terminal Access Controller Access
control System (TACACS+)
−Kerberos
−Multifactor
2.4 Summarize types of malware and tools/methods for detection, removal, and prevention.
- Malware
−Trojan
−Rootkit
−Virus
−Spyware
−Ransomware
−Keylogger
−Boot sector virus
−Cryptominer
−Stalkerware
−Fileless - Adware
−Potentially unwanted program (PUP) - Tools and methods
−Recovery console
−Endpoint detection and
response (EDR)
−Managed detection and
response (MDR)
−Extended detection and
response (XDR)
−Antivirus
−Anti-malware
−Email security gateway
−Software firewalls
−User education regarding
common threats
գAntiphishing training
−OS reinstallation
2.5 Compare and contrast social engineering attacks, threats, and vulnerabilities
- Social engineering
−Phishing
գVishing
գSmishing
գ QR code phishing
գ Spear phishing
գ Whaling
−Shoulder surfing
−Tailgating
−Impersonation
−Dumpster diving - Threats
−Denial of service (DoS)
−Distributed denial of service (DDoS)
−Evil twin
−Zero-day attack
−Spoofing
−On-path attack
−Brute-force attack
−Dictionary attack
−Insider threat
−Structured Query Language
(SQL) injection
−Cross-site scripting (XSS)
−Business email compromise (BEC)
−Supply chain/pipeline attack - Vulnerabilities
−Non-compliant systems
−Unpatched systems
−Unprotected systems (missing
antivirus/missing firewall)
−EOL
−Bring your own device (BYOD)
2.6 Given a scenario, implement procedures for basic small office/home office (SOHO) malware
removal.
- Investigate and verify
malware symptoms. - Quarantine infected system.
- Disable System Restore in Windows
Home. - Remediate infected systems.
- Update anti-malware software.
- Scan and removal techniques
(e.g., safe mode, preinstallation
environment) - Reimage/reinstall.
- Schedule scans and run updates.
- Enable System Restore and create
a restore point in Windows Home. - Educate the end user.
2.7 Given a scenario, apply workstation security options and hardening techniques.
- Data-at-rest encryption
- Password considerations
−Length
−Character types
−Uniqueness
−Complexity
−Expiration - Basic input/output system (BIOS)/
Unified Extensible Firmware
Interface (UEFI) passwords - End-user best practices
−Use screensaver locks
−Log off when not in use
−Secure/protect critical
hardware (e.g., laptops)
−Secure personally identifiable
information (PII) and passwords
−Use password managers - Account management
−Restrict user permissions
−Restrict log-in times
−Disable guest account
−Use failed attempts lockout
−Use timeout/screen lock
−Apply account expiration dates - Change default administrator’s
user account/password - Disable AutoRun
- Disable unused services
2.8 Given a scenario, apply common methods for securing mobile devices.
- Hardening techniques
−Device encryption
−Screen locks
գ Facial recognition
գPIN codes
գ Fingerprint
գ Pattern
գ Swipe
−Configuration profiles - Patch management
−OS updates
−Application updates - Endpoint security software
−Antivirus
−Anti-malware
−Content filtering - Locator applications
- Remote wipes
- Remote backup applications
- Failed log-in attempts restrictions
- Policies and procedures
−MDM
−BYOD vs. corporate-owned devices
−Profile security requirements
2.9 Compare and contrast data destruction and disposal methods
- Physical destruction of hard drives
−Drilling
−Shredding
−Degaussing
−Incineration - Recycling or repurposing
best practices
−Erasing/wiping
−Low-level formatting
−Standard formatting - Outsourcing concepts
−Third-party vendor
−Certification of destruction/recycling - Regulatory and environmental
requirements
2.10Given a scenario, apply security settings on SOHO wireless and wired networks.
- Router settings
− Change default passwords
− IP filtering
− Firmware updates
− Content filtering
− Physical placement/secure locations
− Universal Plug and Play (UPnP)
− Screened subnet
− Configure secure
management access - Wireless specific
− Changing the service
set identifier (SSID)
− Disabling SSID broadcast
− Encryption settings
− Configuring guest access - Firewall settings
− Disabling unused ports
− Port forwarding/mapping
2.11 Given a scenario, configure relevant security settings in a browser.
- Browser download/installation
− Trusted sources
գ Hashing
− Untrusted sources - Browser patching
- Extensions and plug-ins
− Trusted sources
− Untrusted sources
CompTIA A+ Core 2 (220-1202) V15 Certification Exam
Exam Objectives Document Version 3.0
Copyright © 2024 CompTIA, Inc. All rights reserved. - Password managers
- Secure connections/
sites–valid certificates - Settings
− Pop-up blocker
− Clearing browsing data
− Clearing cache
− Private-browsing mode
− Sign-in/browser data
synchronization
− Ad blockers
− Proxy
− Secure DNS - Browser feature management
− Enable/disable
գ Plug-ins
գ Extensions
գ Features
3.0 Software Troubleshooting (23%)
3.1 Given a scenario, troubleshoot common Windows OS issues.
- Blue screen of death (BSOD)
- Degraded performance
- Boot issues
- Frequent shutdowns
- Services not starting
- Applications crashing
- Low memory warnings
- USB controller resource warnings
- System instability
- No OS found
- Slow profile load
- Time drift
3.2 Given a scenario, troubleshoot mobile OS and application security issues
- Application fails to launch
- Application fails to close/crashes
- Application fails to update
- Application fails to install
- Slow to respond
- OS fails to update
- Battery life issues
- Random reboots
- Connectivity issues
−Bluetooth
−Wi-Fi
−Near-field communication (NFC) - Screen does not autorotate
3.3 Given a scenario, troubleshoot common mobile OS and application security issues.
- Security concerns
−Application source/unofficial
application stores
−Developer mode
−Root access/jailbreak
−Unauthorized/malicious application
գ Application spoofing - Common symptoms
−High network traffic
−Degraded response time
−Data-usage limit notification
−Limited internet connectivity
−No internet connectivity
−High number of ads
−Fake security warnings
−Unexpected application behavior
−Leaked personal files/data
3.4 Given a scenario, troubleshoot common personal computer (PC) security issues.
- Common symptoms
−Unable to access the network
−Desktop alerts
−False alerts regarding
antivirus protection
−Altered system or personal files
գ Missing/renamed files
գ Inability to access files
−Unwanted notifications
within the OS
−OS updates failures - Browser-related symptoms
−Random/frequent pop-ups
−Certificate warnings
−Redirection
−Degraded browser performance
4.0 Operational Procedures (21%)
4.1 Given a scenario, implement best practices associated with documentation and support
systems information management.
- Ticketing systems
−User information
−Device information
−Description of issues
−Categories
−Severity
−Escalation levels
−Clear, concise written
communication
գ Issue description
գProgress notes
գ Issue resolution - Asset management
−Inventory lists
−Configuration management
database (CMDB)
−Asset tags and IDs
−Procurement life cycle
−Warranty and licensing
−Assigned users - Types of documents
−Incident reports
−Standard operating
procedures (SOPs)
գ Software package custom
installation procedure
−New user/onboarding
setup checklist
−User off-boarding checklist
−Service-level agreements (SLAs)
գ Internal
գExternal/third-party
−Knowledge base/articles
4.2 Given a scenario, apply change management procedures.
- Documented business processes
−Rollback plan
−Backup plan
−Sandbox testing
−Responsible staff members - Change management
−Request forms
−Purpose of the change
−Scope of the change
−Change type
գStandard change
գNormal change
գEmergency change
−Date and time of change
գChange freeze
գMaintenance windows
−Affected systems/impact
−Risk analysis
գRisk level
−Change board approvals
−Implementation
−Peer review
−End-user acceptance
4.3 Given a scenario, implement workstation backup and recovery methods.
- Backup
−Full
−Incremental
−Differential
−Synthetic full - Recovery
−In-place/overwrite
−Alternative location - Backup testing
−Frequency - Backup rotation schemes
−Onsite vs. offsite
−Grandfather-father-son (GFS)
−3-2-1 backup rule
4.4 Given a scenario, use proper safety procedures
- Electrostatic discharge (ESD) straps
- ESD mats
- Electrical safety
− Equipment grounding - Proper component
handling and storage - Cable management
- Antistatic bags
- Compliance with
government regulations - Personal safety
− Disconnect power
before repairing PC
− Lifting techniques
− Fire safety
− Safety goggles
− Air filter mask
4.5 Summarize environmental impacts and local environment controls.
- Material safety data sheet (MSDS)
documentation for handling and disposal
− Proper battery disposal
− Proper toner disposal
− Proper disposal of other devices and assets - Temperature, humidity-level awareness,
and proper ventilation
− Location/equipment placement
− Dust cleanup
− Compressed air/vacuums - Power surges, brownouts, and blackouts
− Uninterruptible power supply (UPS)
− Surge suppressor
4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.
- Incident response
− Chain of custody
− Informing management/law enforcement as necessary
− Copy of drive (data integrity and preservation)
− Incident documentation
− Order of volatility - Licensing/digital rights management (DRM)/
end-user license agreement (EULA)
− Valid licenses
− Perpetual license agreement
− Personal-use license vs. corporate-use license
− Open-source license
CompTIA A+ Core 2 (220-1202) V15 Certification Exam
Exam Objectives Document Version 3.0
Copyright © 2024 CompTIA, Inc. All rights reserved. - Non-disclosure agreement (NDA)/mutual
non-disclosure agreement (MNDA) - Regulated data
− Credit card payment information
− Personal government-issued information
− PII
− Healthcare data
− Data retention requirements - Acceptable use policy (AUP)
- Regulatory and business compliance requirements
− Splash screens
4.7 Given a scenario, use proper communication techniques and professionalism.
- Present a professional appearance
and wear appropriate attire.
−Match the required attire of
the given environment.
գ Formal
գ Business casual - Use proper language and
avoid jargon, acronyms, and
slang, when applicable. - Maintain a positive attitude/
project confidence. - Actively listen and avoid
interrupting the customer. - Be culturally sensitive.
−Use appropriate professional titles
and designations, when applicable. - Be on time (if late, contact
the customer). - Avoid distractions.
−Personal calls
−Texting/social media sites
−Personal interruptions - Appropriately deal with difficult
customers or situations.
−Do not argue with customer
and/or be defensive.
−Avoid dismissing customer issues.
−Avoid being judgmental.
−Clarify customer statements (i.e.,
ask open-ended questions to
narrow the scope of the issue,
restate the issue, or question
to verify understanding).
−Use discretion and
professionalism when discussing
experiences/encounters. - Set and meet expectations/
timeline and communicate
status with the customer.
−Offer repair/replacement
options, as needed.
−Provide proper documentation
on the services provided.
−Follow up with customer/user at a
later date to verify satisfaction. - Appropriately handle customers’
confidential and private materials.
−Located on a computer,
desktop, printer, etc
4.8 Explain the basics of scripting.
- Script file types
−.bat
−.ps1
−.vbs
−.sh
−.js
−.py - Use cases for scripting
−Basic automation
−Restarting machines
−Remapping network drives
−Installation of applications
−Automated backups
−Gathering of information/data
−Initiating updates - Other considerations
when using scripts
−Unintentionally introducing malware
−Inadvertently changing
system settings
−Browser or system crashes due
to mishandling of resources
4.9 Given a scenario, use remote access technologies.
- Methods/tools
−RDP
−VPN
−Virtual network computer (VNC)
−Secure Shell (SSH)
−Remote monitoring and
management (RMM)
−Simple Protocol for Independent
Computing Environments (SPICE)
−Windows Remote
Management (WinRM)
−Third-party tools
գ Screen-sharing software
գVideoconferencing software
գ File transfer software
գ Desktop management software - Security considerations of
each access method
4.10 Explain basic concepts related to artificial intelligence (AI).
- Application integration
- Policy
−Appropriate use
−Plagiarism - Limitations
−Bias
−Hallucinations
−Accuracy - Private vs. public
−Data security
−Data source
−Data privacy
