This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
A Plus (220-1201 / 220-1202)
CompTIA A+ (220-1201/220-1202) teaches entry‑level IT professionals core hardware, networking, mobile, virtualization, cloud, and troubleshooting skills, preparing them to diagnose and resolve common support issues.
Who Should Take This
The certification is ideal for recent graduates, self‑taught technicians, or junior help‑desk staff seeking to validate their foundational knowledge. It targets individuals with limited professional experience who aim to pursue a career in IT support, system administration, or technical troubleshooting.
What's Covered
1
All domains in the CompTIA A+ Core 1 (220-1201) exam: Mobile Devices
2
, Networking
3
, Hardware
4
, Virtualization and Cloud Computing
5
, and Hardware and Network Troubleshooting
6
All domains in the CompTIA A+ Core 2 (220-1202) exam: Operating Systems
7
, Security
8
, Software Troubleshooting
9
, Operational Procedures
10
, and Networking
What's Included in AccelaStudy® AI
Course Outline
80 learning goals
1
Core 1 Domain 1: Mobile Devices
2 topics
Laptop Hardware and Components
- Identify replaceable laptop components including RAM (SO-DIMM), storage drives (2.5-inch SSD, M.2), wireless cards, batteries, keyboards, and screens and describe the replacement procedure for each.
- Describe laptop display types including LCD, OLED, and touchscreen technologies and explain how display resolution, brightness, and panel type affect user experience.
- Explain laptop-specific features including docking stations, port replicators, USB-C/Thunderbolt connectivity, and function key toggling for wireless, display, and keyboard backlight controls.
Mobile Device Configuration and Synchronization
- Configure mobile device connectivity options including Wi-Fi, Bluetooth, cellular data, hotspot/tethering, NFC, and GPS location services for common usage scenarios.
- Describe mobile device synchronization methods including cloud-based sync, desktop sync applications, and enterprise MDM enrollment and explain data types synchronized (contacts, email, calendar, photos).
- Identify common mobile device accessories including protective cases, credit card readers, trackpads, drawing pads, and external speakers/headsets and describe the connectivity interface used by each.
2
Core 1 Domain 2: Networking
3 topics
TCP/IP and Network Protocols
- Identify common TCP and UDP ports including FTP (20/21), SSH (22), Telnet (23), SMTP (25), DNS (53), HTTP (80), POP3 (110), IMAP (143), HTTPS (443), SMB (445), LDAP (389), and RDP (3389) and state the service associated with each.
- Explain the difference between TCP and UDP transport protocols and classify common services by their default transport protocol based on reliability requirements.
- Describe IPv4 address classes, private address ranges (10.x, 172.16-31.x, 192.168.x), APIPA addressing (169.254.x), loopback (127.0.0.1), and basic CIDR notation for subnet identification.
- Explain the purpose of DNS and DHCP services and demonstrate how a client obtains an IP address via DHCP and resolves a hostname to an IP address via DNS.
Network Hardware and Topologies
- Identify network infrastructure devices including managed and unmanaged switches, routers, wireless access points, firewalls, patch panels, PoE injectors, and cable modems and describe the function of each.
- Describe network cable types including Cat 5e, Cat 6, Cat 6a, coaxial, and fiber optic (single-mode and multi-mode) and explain the maximum speed and distance specifications for each.
- Configure a basic SOHO network including router placement, SSID configuration, wireless security settings, port forwarding, and DHCP scope management.
Wireless Networking
- Identify IEEE 802.11 wireless standards (a, b, g, n/Wi-Fi 4, ac/Wi-Fi 5, ax/Wi-Fi 6) and describe the frequency bands, maximum throughput, and range characteristics of each.
- Compare 2.4 GHz and 5 GHz frequency bands and evaluate which is more appropriate for a given wireless deployment based on range, speed, interference, and device density requirements.
3
Core 1 Domain 3: Hardware
4 topics
Motherboards, CPUs, and RAM
- Identify motherboard form factors (ATX, Micro-ATX, Mini-ITX), chipset features, expansion slots (PCIe x1, x4, x16), and common connectors (24-pin power, SATA, front panel headers) and describe their roles.
- Describe CPU characteristics including core count, clock speed, cache levels, hyperthreading, thermal design power (TDP), and socket types and explain how they affect system performance.
- Identify RAM types (DDR4, DDR5), form factors (DIMM, SO-DIMM), specifications (speed, latency, capacity), and channel configurations (single, dual, quad) and install RAM following proper ESD procedures.
- Analyze a system specification scenario to evaluate whether the motherboard, CPU, and RAM combination is compatible and meets the stated performance requirements.
Storage Devices and Interfaces
- Identify storage device types including HDD, SATA SSD, NVMe SSD, M.2 drives, and eMMC and describe the interface, speed, and form factor characteristics of each.
- Describe RAID levels 0, 1, 5, and 10 and explain how each provides performance improvement, data redundancy, or both and calculate usable capacity for a given disk configuration.
- Compare storage technologies and evaluate the optimal storage solution for a given scenario based on performance, capacity, reliability, and budget requirements.
Power Supplies, Displays, and Peripherals
- Identify power supply unit (PSU) specifications including wattage, efficiency ratings (80 Plus), modular vs non-modular designs, and connector types (24-pin, 8-pin CPU, PCIe, SATA, Molex).
- Describe display connector types including HDMI, DisplayPort, DVI, VGA, and USB-C/Thunderbolt and configure multi-monitor setups for desktop and laptop systems.
- Identify common cable types and connectors including USB (Type-A, Type-B, Type-C, Micro-USB), Lightning, serial, and parallel and describe the maximum data transfer rates and use cases for each.
Printers and Multifunction Devices
- Describe printer technologies including laser, inkjet, thermal, and impact and explain the printing process, maintenance requirements, and consumables for each type.
- Configure printer connectivity including USB direct, Ethernet, Wi-Fi, and Bluetooth connections and install printer drivers on Windows, macOS, and Linux systems.
- Explain the six steps of the laser printing process (processing, charging, exposing, developing, transferring, fusing) and identify the component responsible for each step.
4
Core 1 Domain 4: Virtualization and Cloud Computing
2 topics
Virtualization Technologies
- Differentiate between Type 1 (bare-metal) and Type 2 (hosted) hypervisors and identify common examples of each including VMware ESXi, Hyper-V, VirtualBox, and VMware Workstation.
- Configure virtual machine settings including CPU allocation, memory assignment, virtual hard disk creation, network adapter configuration, and snapshot management.
- Evaluate virtual machine resource allocation for a given workload scenario to determine whether CPU, memory, and storage assignments are sufficient and appropriately balanced.
Cloud Computing Concepts
- Describe cloud service models (IaaS, PaaS, SaaS) and classify common cloud offerings such as virtual machines, managed databases, and productivity suites into the correct model.
- Identify cloud deployment models including public, private, hybrid, and community clouds and describe the ownership, management, and access characteristics of each.
- Explain the shared responsibility model in cloud computing and describe which security controls are managed by the provider versus the customer for each service model.
5
Core 1 Domain 5: Hardware and Network Troubleshooting
4 topics
Troubleshooting Methodology
- Apply the CompTIA troubleshooting methodology steps: identify the problem, establish a theory, test the theory, establish a plan of action, implement the solution, verify full functionality, and document findings.
Hardware Troubleshooting
- Troubleshoot common hardware symptoms including POST beep codes, blue screen of death (BSOD), boot failures, overheating, intermittent shutdowns, and grinding noises to identify the failing component.
- Troubleshoot power supply issues including no power, random shutdowns, burning smell, and voltage irregularities using a multimeter and PSU tester to determine the root cause.
- Troubleshoot display problems including no image, dim display, flickering, dead pixels, and incorrect resolution by isolating whether the issue is in the GPU, cable, monitor, or display settings.
Network Troubleshooting
- Troubleshoot wired network connectivity issues including no link light, limited connectivity, slow transfer speeds, and intermittent drops using ping, ipconfig/ifconfig, tracert/traceroute, and nslookup.
- Troubleshoot wireless connectivity issues including inability to connect, low signal strength, frequent disconnections, and SSID not visible by checking adapter settings, driver status, and AP configuration.
Printer Troubleshooting
- Troubleshoot common printer problems including paper jams, faded prints, streaking, ghost images, toner issues, and spooler errors by identifying the root cause and recommending the correct maintenance procedure.
6
Core 2 Domain 1: Operating Systems
4 topics
Windows Operating System
- Identify Windows editions (Home, Pro, Enterprise, Education) and describe feature differences including BitLocker, Remote Desktop, Group Policy, domain join capability, and Hyper-V support.
- Configure Windows system settings using Control Panel and Settings app including display, network, power, user accounts, devices, and system restore points.
- Describe Windows administrative tools including Task Manager, Event Viewer, Disk Management, Device Manager, Computer Management, Registry Editor, and Group Policy Editor and explain the purpose of each.
macOS and Linux Fundamentals
- Describe macOS features including Finder, Spotlight, Mission Control, Time Machine, FileVault, Keychain, and System Preferences and explain their equivalents in Windows.
- Demonstrate basic Linux command-line operations including navigation (ls, cd, pwd), file management (cp, mv, rm, mkdir), permissions (chmod, chown), and package management (apt, yum).
OS Installation, Upgrades, and File Systems
- Implement OS installation procedures including boot media creation, BIOS/UEFI configuration, partition schemes (MBR, GPT), clean install versus upgrade, and post-installation driver and update deployment.
- Describe file system types including NTFS, FAT32, exFAT, ext4, and APFS and explain the features, limitations, and appropriate use cases of each (maximum file size, journaling, permissions support).
- Compare clean installation and in-place upgrade strategies and evaluate which approach is more appropriate based on existing data, application compatibility, and downtime constraints.
Command-Line Tools
- Demonstrate Windows command-line operations using cmd and PowerShell including ipconfig, ping, tracert, netstat, nslookup, sfc, chkdsk, gpupdate, gpresult, and shutdown commands.
- Analyze command output from ipconfig, ping, tracert, netstat, and nslookup to diagnose network connectivity and name resolution issues on Windows systems.
7
Core 2 Domain 2: Security
4 topics
Security Fundamentals and Physical Security
- Identify physical security controls (cable locks, badge readers, cameras, mantraps) and logical security concepts (least privilege, ACLs, UAC, NTFS/share permissions) and describe how each limits unauthorized access to IT resources.
Malware and Social Engineering
- Identify malware types including viruses, worms, trojans, rootkits, ransomware, spyware, keyloggers, crypto miners, and fileless malware and describe the behavior and infection method of each.
- Describe social engineering attack types including phishing, spear phishing, whaling, vishing, smishing, pretexting, tailgating, dumpster diving, and evil twin attacks and explain the human vulnerability each exploits.
- Implement the malware removal process including identifying symptoms, quarantining the system, disabling System Restore, scanning and removing malware, scheduling follow-up scans, and re-enabling restore.
Authentication and Wireless Security
- Describe authentication protocols and services including RADIUS, TACACS+, Kerberos, and LDAP and explain the role each plays in centralized authentication for enterprise networks.
- Configure wireless security settings including WPA2-Personal, WPA2-Enterprise, WPA3, MAC filtering, and disabling SSID broadcast to secure a SOHO wireless network.
Mobile Security and Data Destruction
- Describe mobile device security measures including screen locks, remote wipe, locator services, OS updates, full-device encryption, and mobile device management (MDM) policies.
- Identify data destruction methods including software wiping, degaussing, physical shredding, drilling, and incineration and explain the appropriate method based on media type and data sensitivity.
- Analyze a security incident scenario to identify the attack vector, assess the scope of compromise, and recommend the appropriate incident response steps including containment, eradication, and recovery.
8
Core 2 Domain 3: Software Troubleshooting
3 topics
OS and Application Troubleshooting
- Troubleshoot Windows boot issues including boot loop, BSOD, startup repair, safe mode, WinRE, and last known good configuration to restore a non-booting system to operational status.
- Troubleshoot application crashes, freezes, and slow performance using Task Manager, Resource Monitor, and Event Viewer to identify resource bottlenecks and conflicting processes.
- Troubleshoot common browser issues including certificate errors, redirection, unresponsive scripts, pop-ups, and plugin failures and implement appropriate fixes for each symptom.
Malware Symptoms and Removal
- Recognize malware symptoms including slow performance, unexpected pop-ups, browser redirection, unauthorized remote access, file encryption, and disabled security software and map each symptom to the likely malware category.
- Evaluate a malware infection scenario to determine the correct sequence of remediation steps and assess whether the system can be cleaned or requires a full OS reinstallation.
Mobile Device Troubleshooting
- Troubleshoot mobile device issues including short battery life, overheating, unresponsive touchscreen, app crashes, connectivity failures, and inability to update the operating system.
9
Core 2 Domain 4: Operational Procedures
4 topics
Documentation and Change Management
- Describe IT documentation practices including ticketing systems, knowledge base articles, network topology diagrams, standard operating procedures, and asset inventory management.
- Explain change management processes including request for change, risk assessment, approval workflows, implementation planning, rollback procedures, and post-implementation review.
Backup, Recovery, and Data Management
- Describe backup types including full, incremental, differential, and synthetic full and explain how backup rotation schemes (GFS) meet recovery point and recovery time objectives.
- Evaluate a disaster recovery scenario to select the appropriate backup and restore strategy that meets the stated RPO and RTO requirements with minimal data loss and downtime.
Safety and Environmental Procedures
- Describe electrostatic discharge (ESD) prevention measures including grounding straps, anti-static mats, proper component handling, and humidity control alongside electrical safety practices for power strips, UPS devices, and laser printers.
- Identify environmental controls for IT equipment rooms including HVAC requirements, humidity monitoring, fire suppression systems (wet, dry, clean agent), and proper equipment disposal and recycling procedures.
Professionalism and Remote Access
- Describe professional communication practices for IT support including active listening, setting expectations, avoiding jargon, maintaining confidentiality, and following up with end users after issue resolution.
- Configure remote access technologies including RDP, VPN, SSH, screen-sharing tools, and remote monitoring and management (RMM) platforms for remote IT support scenarios.
- Assess a remote support scenario to determine the most secure and effective remote access method based on organizational security policies, user technical ability, and network configuration.
10
Core 2 Domain 5: Networking
2 topics
Windows Networking and Shared Resources
- Configure Windows network settings including workgroup and domain membership, network discovery, file and printer sharing, mapped network drives, and HomeGroup/Share permissions.
- Configure Windows Firewall rules including inbound and outbound rules, program exceptions, port-based rules, and connection security rules for both domain and standard profiles.
Network Troubleshooting Tools and VPN
- Demonstrate the use of command-line networking tools including ping, ipconfig, tracert, pathping, netstat, nslookup, net use, net user, and arp to diagnose connectivity and configuration issues.
- Configure VPN client connections including full tunnel and split tunnel modes and explain how VPN protocols (IPSec, SSL/TLS, L2TP) secure remote network access.
- Analyze network troubleshooting output from multiple diagnostic tools to isolate whether a connectivity failure is caused by a physical layer, IP configuration, DNS resolution, or firewall blocking issue.
Scope
Included Topics
- All domains in the CompTIA A+ Core 1 (220-1201) exam: Mobile Devices (15%), Networking (20%), Hardware (25%), Virtualization and Cloud Computing (11%), and Hardware and Network Troubleshooting (29%).
- All domains in the CompTIA A+ Core 2 (220-1202) exam: Operating Systems (22%), Security (24%), Software Troubleshooting (22%), Operational Procedures (18%), and Networking (14%).
- Core 1 hardware topics including motherboards, CPUs, RAM types (DDR4, DDR5), storage devices (SSD, HDD, NVMe, M.2), power supplies, printers (laser, inkjet, thermal, impact), display technologies, cables and connectors (USB, HDMI, DisplayPort, Thunderbolt, SATA, PCIe), laptop-specific hardware, and mobile device accessories.
- Core 1 networking topics including TCP/IP fundamentals, common ports and protocols (HTTP, HTTPS, FTP, SSH, RDP, DNS, DHCP, SMTP, POP3, IMAP, LDAP, SMB, SNMP), network hardware (switches, routers, access points, firewalls, patch panels), wireless standards (802.11a/b/g/n/ac/ax), network configurations (SOHO, VPN, VLAN), and DNS/DHCP services.
- Core 1 virtualization and cloud topics including Type 1 and Type 2 hypervisors, virtual machines, containers, cloud service models (IaaS, PaaS, SaaS), cloud deployment models (public, private, hybrid, community), and cloud-based storage and networking concepts.
- Core 1 troubleshooting topics including structured troubleshooting methodology, hardware failure symptoms (POST codes, beep codes, blue screens, overheating), network connectivity issues (no connectivity, slow speeds, intermittent drops), and printer problems (paper jams, print quality, spooler issues).
- Core 2 operating system topics including Windows editions and features, macOS features, Linux command line, OS installation and upgrade procedures, command-line tools (cmd, PowerShell, Terminal), file systems (NTFS, FAT32, ext4, APFS), and disk management.
- Core 2 security topics including malware types and removal procedures, social engineering attacks, physical security (locks, badges, cameras, mantraps), authentication methods (RADIUS, TACACS+, Kerberos), mobile device security (MDM, remote wipe, screen locks), incident response procedures, and data destruction methods (degaussing, shredding, wiping).
- Core 2 software troubleshooting topics including OS boot failures, application crashes, browser issues, malware symptoms, and mobile device application problems.
- Core 2 operational procedures including documentation practices (ticketing systems, knowledge bases), change management processes, backup and recovery procedures (full, incremental, differential, cloud backup), safety procedures (ESD prevention, proper component handling, electrical safety), environmental controls (HVAC, humidity, fire suppression), communication and professionalism skills, and remote access technologies.
Not Covered
- Advanced networking topics including subnetting beyond basic CIDR notation, dynamic routing protocol configuration (OSPF, BGP), and enterprise firewall rule management covered by Network+ or higher certifications.
- Server administration, Active Directory domain controller configuration, Group Policy management beyond basic awareness, and enterprise deployment covered by Server+ or MCSA certifications.
- Advanced scripting and automation including Python, Bash, or PowerShell script authoring beyond basic command usage.
- Current hardware pricing, vendor-specific model numbers, and product availability that change with market conditions.
- Enterprise-scale virtualization management (vCenter, Hyper-V Manager clusters), container orchestration (Kubernetes), and advanced cloud architecture design covered by cloud certifications.
Official Exam Page
Learn more at CompTIA
220-1201 / 220-1202 is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified