Grootste online IT opleider

Beste klantenservice

Award winning e-learning

Na betaling, direct starten

Livelab 220-1002: CompTIA A +

€ 149,00
€ 180,29 Incl. BTW

Duur: 25 uur |

Online toegang: 180 dagen |

In Onbeperkt Leren

Gegevens

Via dit LiveLab, gericht op het CompTIA examen 220-1002: CompTIA A +, krijg je uitgebreide praktijkervaring met de fundamentele computertechnologieën.

Door het uitvoeren van opdrachten in een echte omgeving verbeter je je praktische kennis en vaardigheden op de diverse examenonderwerpen.

Je gaat onder andere praktijkopdrachten uitvoeren met betrekking tot het ondersteunen, installeren, configureren en onderhouden van besturingssystemen, het onderhouden van Microsoft Windows en het oplossen van problemen met Microsoft Windows en netwerken, het beheren van gebruikers, werkstations en gedeelde bronnen, beveiliging en het implementeren van operationele procedures.

Resultaat

Je hebt uitgebreide praktijkervaring met Microsoft Windows en netwerken.

Voorkennis

Je beschikt over de theoretische kennis met betrekking tot dit certificeringsexamen. Je kunt online bij ons deze training volgen.

Doelgroep

Systeembeheerder, Netwerkbeheerder

Inhoud

Livelab 220-1002: CompTIA A +

25 uur

Use loop statements in a script

Use loop statements in a script

Test the Effectiveness of the Firewall Rule

Test the Effectiveness of the Firewall Rule

Use Device Manager

Use Device Manager

Disable Auto Login

Disable Auto Login

Enable Microsoft OneDrive as a Startup Service

Enable Microsoft OneDrive as a Startup Service

Enable System Protection

Enable System Protection

Use Backup and Restore (Windows 7) in Windows 10

Use Backup and Restore (Windows 7) in Windows 10

Configure a Password Policy

Configure a Password Policy

Learn about Malware

Learn about Malware

Perform Low-Level vs. High-Level Format

Perform Low-Level vs. High-Level Format

Explore the Performance Tab

Explore the Performance Tab

Use File Explorer

Use File Explorer

Manage Connections

Manage Connections

Learn About the Spoofing Attack

Learn About the Spoofing Attack

Know about Surge Protectors

Know about Surge Protectors

Robocopy

Robocopy

Test the Home Folder

Test the Home Folder

Assign a Home Folder to a Local User

Assign a Home Folder to a Local User

Learn about Zombie Systems

Learn about Zombie Systems

Learn about Cell Phone Operating Systems

Learn about Cell Phone Operating Systems

Perform MAC Address Filtering

Perform MAC Address Filtering

Set the Timeout Period on the Boot Tab

Set the Timeout Period on the Boot Tab

Follow the best practices

Follow the best practices

Configure Settings on Advanced Tab

Configure Settings on Advanced Tab

Perform a Clean Install

Perform a Clean Install

Create a Primary Partition

Create a Primary Partition

Troubleshoot operating system issues

Troubleshoot operating system issues

Manage Guest and Admin Accounts via Group Policy

Manage Guest and Admin Accounts via Group Policy

Explore Internet Explorer browser security features

Explore Internet Explorer browser security features

Using the Recovery Console

Using the Recovery Console

Change the Default Password

Change the Default Password

Partition a Dynamic Disk

Partition a Dynamic Disk

Change Interface Settings in PLABWIN10

Change Interface Settings in PLABWIN10

Work with Elevated Privileges

Work with Elevated Privileges

Configure Remote Connectivity Settings

Configure Remote Connectivity Settings

Read Environment Variables

Read Environment Variables

Use Dxdiag

Use Dxdiag

Troubleshoot application issues

Troubleshoot application issues

Configure Settings on General Tab

Configure Settings on General Tab

SFC

SFC

Ipconfig

Ipconfig

Configure Advanced Share Permissions

Configure Advanced Share Permissions

Commands Available with the Standard vs. Administrative Privileges

Commands Available with the Standard vs. Administrative Privileges

Set up a Boot Device

Set up a Boot Device

Check Application Compatibility

Check Application Compatibility

Gpresult

Gpresult

Script with decision-making statements

Script with decision-making statements

Install an Antispyware

Install an Antispyware

Invoke Run As a feature

Invoke Run As a feature

Re-initialize a Disk

Re-initialize a Disk

Create a PowerShell Script

Create a PowerShell Script

Configure Web Utility Access

Configure Web Utility Access

Explore Registry Editor

Explore Registry Editor

Know about the Same Vendor Compatibility and Different Vendor Compatibility

Know about the Same Vendor Compatibility and Different Vendor Compatibility

Know about application compatibility

Know about application compatibility

Configure the Network File System (NFS)

Configure the Network File System (NFS)

Nslookup

Nslookup

Use Cloud Storage for Backup

Use Cloud Storage for Backup

Configure Settings on Programs Tab

Configure Settings on Programs Tab

Configure Encrypting File System (EFS)

Configure Encrypting File System (EFS)

Implement Basic Change Management Best Practices

Implement Basic Change Management Best Practices

Configure Local Security Policy

Configure Local Security Policy

Perform Image-Level Backup

Perform Image-Level Backup

Copy

Copy

Tracert

Tracert

Know about prerequisites/hardware compatibility

Know about prerequisites/hardware compatibility

Disable Auto Login

Disable Auto Login

Update a Device Driver

Update a Device Driver

Use Windows Update

Use Windows Update

Use MSinfo32

Use MSinfo32

Explore Print Management Properties

Explore Print Management Properties

Assign a Home Folder to a Domain User

Assign a Home Folder to a Domain User

Assign Remote Access Permissions

Assign Remote Access Permissions

Create FAT32 and NTFS File Systems

Create FAT32 and NTFS File Systems

Create a Sample Folder

Create a Sample Folder

Diskpart

Diskpart

View the Swap File in Windows 10

View the Swap File in Windows 10

Create and Secure a Remote Desktop Connection

Create and Secure a Remote Desktop Connection

Xcopy

Xcopy

Perform Basic Configuration for the OpenSSH Server

Perform Basic Configuration for the OpenSSH Server

Configure time/date/region/language settings

Configure time/date/region/language settings

Use Documentation and Licences Best Practices

Use Documentation and Licences Best Practices

Demonstrate the working of HomeGroup

Demonstrate the working of HomeGroup

Learn about the Distributed Denial-of-Service Attack

Learn about the Distributed Denial-of-Service Attack

Use Media Center

Use Media Center

Create a User Account

Create a User Account

Disable a Service on the Services Tab

Disable a Service on the Services Tab

Dism

Dism

Prepare a Boot Drive

Prepare a Boot Drive

Exploring a Shared folder and its Permissions

Exploring a Shared folder and its Permissions

Manage Storage Spaces

Manage Storage Spaces

Work With the View Tab

Work With the View Tab

Troubleshoot network issues

Troubleshoot network issues

Test User Account Control Prompt

Test User Account Control Prompt

Learn about the Brute Force Attack

Learn about the Brute Force Attack

Connect with the OpenSSH

Connect with the OpenSSH

Learn About Multifactor Authentication

Learn About Multifactor Authentication

Perform a System Restore

Perform a System Restore

Learn about Zero-day

Learn about Zero-day

Ping

Ping

Use Proper Communication Techniques and Professionalism

Use Proper Communication Techniques and Professionalism

Use Windows Defender

Use Windows Defender

Taskkill

Taskkill

Use the following commands:

Use the following commands:

Reconfigure the Firewall Rule Created

Reconfigure the Firewall Rule Created

Invoke Run As using the shortcut menu

Invoke Run As using the shortcut menu

Initialize a Disk

Initialize a Disk

Verify the Drive Space and RAM Requirements

Verify the Drive Space and RAM Requirements

Perform an Online Account Recovery

Perform an Online Account Recovery

Troubleshoot PC Security Issues

Troubleshoot PC Security Issues

Use an online anti-malware scanner

Use an online anti-malware scanner

Use the Microsoft Terminal Services Client (MSTSC)

Use the Microsoft Terminal Services Client (MSTSC)

Netstat

Netstat

Configure User Account Control Settings

Configure User Account Control Settings

Create a Dynamic Partition

Create a Dynamic Partition

Use the Defragment and Optimize Drives Utility

Use the Defragment and Optimize Drives Utility

Create a Shared Folder

Create a Shared Folder

Learn About TACACS

Learn About TACACS

Work with Troubleshooting Options

Work with Troubleshooting Options

Execute basic Linux commands

Execute basic Linux commands

Configure Static IP Address on the Wireless Router

Configure Static IP Address on the Wireless Router

Specify the Startup Type for Computer

Specify the Startup Type for Computer

Prepare for an Unattended Installation

Prepare for an Unattended Installation

Use the Microsoft Management Console (MMC)

Use the Microsoft Management Console (MMC)

Educate the End User

Educate the End User

Determine Effective Permissions

Determine Effective Permissions

Create a Simple Windows Firewall Rule

Create a Simple Windows Firewall Rule

Work With the Search Tab

Work With the Search Tab

Manage Applications Using Programs and Features

Manage Applications Using Programs and Features

Create an Extended and Logical Partition

Create an Extended and Logical Partition

Perform a Network-based Installation

Perform a Network-based Installation

Test Folder Redirection

Test Folder Redirection

Learn About Non–compliant Systems

Learn About Non–compliant Systems

Configure Performance Settings

Configure Performance Settings

Configure RADIUS-based Authentication

Configure RADIUS-based Authentication

Identify Different Types of Social Engineering

Identify Different Types of Social Engineering

Assign Remote Access Permissions

Assign Remote Access Permissions

Use the Network and Sharing Center

Use the Network and Sharing Center

Create a Windows Batch File

Create a Windows Batch File

Know the Key Differences between 32-bit and 64-bit Operating Systems

Know the Key Differences between 32-bit and 64-bit Operating Systems

Enable BitLocker without TPM Support

Enable BitLocker without TPM Support

Create a Recovery partition

Create a Recovery partition

Verify the Settings Configured in Folder Options

Verify the Settings Configured in Folder Options

Remove a System from Domain

Remove a System from Domain

Work with the General tab

Work with the General tab

Use Search

Use Search

Select a Workstation Operating System as per the Need

Select a Workstation Operating System as per the Need

Install PuTTY

Install PuTTY

Format

Format

Gpupdate

Gpupdate

Net User

Net User

Deal with Difficult Customers or Situations

Deal with Difficult Customers or Situations

Disable Public Network in PLABWIN10

Disable Public Network in PLABWIN10

Disconnect a User on the Users Tab

Disconnect a User on the Users Tab

Configure a Local User Account

Configure a Local User Account

Navigation commands

Navigation commands

Use Windows PowerShell to Manage Remote Computers

Use Windows PowerShell to Manage Remote Computers

Create a Power Plan

Create a Power Plan

Configure Windows Memory Diagnostics

Configure Windows Memory Diagnostics

Explore Disk Management Operations

Explore Disk Management Operations

Set Environment Variables

Set Environment Variables

Access the Event Viewer Logs

Access the Event Viewer Logs

Configure Share Permissions

Configure Share Permissions

Access Computer Management Tools

Access Computer Management Tools

Know the Vendor-specific Limitations of Operating Systems

Know the Vendor-specific Limitations of Operating Systems

View the Swap Partition on CentOS

View the Swap Partition on CentOS

Shutdown

Shutdown

Chkdsk

Chkdsk

End a Task on the Processes Tab

End a Task on the Processes Tab

Net Use

Net Use

Change UAC Setting via Local Security Policy

Change UAC Setting via Local Security Policy

Verify a 64-bit Operating System

Verify a 64-bit Operating System

Configure System Protection Settings

Configure System Protection Settings

Customize an Existing Power Plan

Customize an Existing Power Plan

Know the Interface Differences

Know the Interface Differences

Configure Single-factor Authentication

Configure Single-factor Authentication

Know about UPS

Know about UPS

Perform Data Wipe

Perform Data Wipe

Configure User Account Properties

Configure User Account Properties

Troubleshoot device drivers issues

Troubleshoot device drivers issues

Troubleshoot printing issues

Troubleshoot printing issues

Use the backup and recovery tools

Use the backup and recovery tools

Learn about the Denial of service attack

Learn about the Denial of service attack

Learn about the Dictionary Attack

Learn about the Dictionary Attack

Use Notepad

Use Notepad

Convert to MBR or GPT Disk

Convert to MBR or GPT Disk

Learn About the Rainbow Table

Learn About the Rainbow Table

Configure Settings on Privacy Tab

Configure Settings on Privacy Tab

Run SUPERAntiSpyware

Run SUPERAntiSpyware

Create a Program Shortcut to use with Run as Feature

Create a Program Shortcut to use with Run as Feature

Verify that network connection is enabled

Verify that network connection is enabled

Create a Restore Point

Create a Restore Point

Add a Data Source to a Listed Driver

Add a Data Source to a Listed Driver

Configure Settings on the Security Tab

Configure Settings on the Security Tab

Learn about Man-in-the-middle Attack

Learn about Man-in-the-middle Attack

Perform Windows Refresh

Perform Windows Refresh

Configure a Password Protected Screensaver

Configure a Password Protected Screensaver

View Default Share Permissions on the New Folder

View Default Share Permissions on the New Folder

Configure BranchCache

Configure BranchCache

Use the Services Console

Use the Services Console

Create a GPO to Redirect the Documents Folder

Create a GPO to Redirect the Documents Folder

Explore Component Services

Explore Component Services

Examine the Workings of UAC

Examine the Workings of UAC

Create a Task on the Task Scheduler

Create a Task on the Task Scheduler

Opties bij cursus

Wij bieden, naast de training, in sommige gevallen ook diverse extra leermiddelen aan. Wanneer u zich gaat voorbereiden op een officieel examen dan raden wij aan om ook de extra leermiddelen te gebruiken die beschikbaar zijn bij deze training. Het kan voorkomen dat bij sommige cursussen alleen een examentraining en/of LiveLab beschikbaar is.

Examentraining (proefexamens)

In aanvulling op deze training kunt u een speciale examentraining aanschaffen. De examentraining bevat verschillende proefexamens die het echte examen dicht benaderen. Zowel qua vorm als qua inhoud. Dit is de ultieme manier om te testen of u klaar bent voor het examen. 

LiveLab

Als extra mogelijkheid bij deze training kunt u een LiveLab toevoegen. U voert de opdrachten uit op de echte hardware en/of software die van toepassing zijn op uw Lab. De LiveLabs worden volledig door ons gehost in de cloud. U heeft zelf dus alleen een browser nodig om gebruik te maken van de LiveLabs. In de LiveLab omgeving vindt u de opdrachten waarmee u direct kunt starten. De labomgevingen bestaan uit complete netwerken met bijvoorbeeld clients, servers, routers etc. Dit is de ultieme manier om uitgebreide praktijkervaring op te doen.

Waarom Icttrainingen.nl?

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Bestelproces

Zodra wij uw order en betaling hebben verwerkt, zetten wij uw trainingen klaar en kunt u aan de slag. Heeft u toch nog vragen over ons orderproces kunt u onderstaande button raadplegen.

lees meer over het orderproces

Wat is inbegrepen?

Certificaat van deelname nee
Voortgangsbewaking ja
Geschikt voor mobiel ja
Kennis delen Onbeperkte toegang tot onze community met IT professionals
Studieadvies Onze consultants zijn beschikbaar om je te voorzien van studieadvies
Studiemateriaal Gecertificeerde docenten met uitgebreide kennis over de onderwerpen
Service Service via chat, telefoon, e-mail (razendsnel)

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Meerdere cursussen volgen? Misschien is ons Life Long Learning concept wel wat voor u

lees meer

Neem contact op

Studieadvies nodig? Neem contact op!


Contact