Level: Foundation

CompTIA A+

5 Day | Instructor Led

CompTIA's A+ certification is the industry standard for validating the foundational skills needed by today's computer support technicians and is included in the approved list of certifications to meet DoD Directive 8570.1 requirements. This international vendor-neutral certification requires that you pass two exams: CompTIA A+ Essentials Exam 220-901 and Practical Application Exam 220-902.

In this course with a particular focus on CompTIA A+ certification exam preparation, you'll gain the needed knowledge of basic computer hardware and operating systems. You will cover the essential principles of installing, building, upgrading, repairing, configuring, troubleshooting, optimizing, and preventative maintenance on desktop and laptop computers. You will also learn elements of customer service and communication skills necessary to work with clients. Instructor-led practice exams and quizzes help reinforce course concepts and exam readiness.

Inquire About
CompTIA A+

Ideal Candidates for CompTIA A+ Class

Individuals seeking CompTIA A+ certification (220-901 and 220-902)

CompTIA A+ Prerequisites

Individuals seeking CompTIA A+ certification (220-901/220-902)

What You'll Get in CompTIA A+

Expert Level Instruction

Official CompTIA A+ Curriculum

Michael Meyers CompTIA A+ All-In-One Book

Award Winning Ultimate Knowledge Student Workbook

Daily Homework Assignments to Reinforce Classroom Lecture

Daily Quizzes to Ensure Knowledge Retention

Handy Reference Charts and Tables

Flash Cards

Course Related Readings (Reinforcement)

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in CompTIA A+

Prepare for the latest A+ certification exams

Fundamentals of computer technology

Install and configure PC operating systems

Configure common features for Android and Apple iOS mobile operating systems

PC components

Preventative maintenance

Operating system technologies

Communicate with customers in a professional manner

Computer hardware and peripherals

Network connections

Laptop and portable computing device components

Support printers and scanners

Secure PCs

CompTIA A+ Certification

CompTIA A+ certification (220-901/220-902)

CompTIA A+ Outline


1. Motherboards and Expansion Cards

  • Safety procedures
  • Motherboards
  • BIOS settings
  • Expansion cards

2. CPUs and Power Supplies

  • CPUs
  • Power supplies

3. Memory and Physical Storage

  • RAM types and features
  • Storage devices and media

4. Connections

  • Connection interfaces
  • Connectors and cables

5. Peripheral Devices

  • Display devices
  • Other devices


6. Printers

  • Imaging processes
  • Printer installation
  • Printer maintenance

7. Notebooks

  • Notebook hardware components
  • Notebook displays
  • Laptop features

8. Networking Basics

  • Networks
  • Internet connection types
  • Network devices
  • Networking basics

9. The Physical Network

  • Network cable and connector types
  • Cable and connector properties
  • Networking tools

10. Networking Protocols

  • TCP/IP
  • Ports and protocols

11. Wireless Networking

  • Wireless networking standards
  • Wireless SOHO networking

12. Professional Conduct

  • Communication and professionalism
  • Environmental issues
  • Incident response

13. Troubleshooting Basics

  • Troubleshooting methodology
  • The troubleshooting toolkit

CompTIA A+ 220-801 Certification Exam


14. Client Operating Systems

  • Comparing Windows editions
  • Configuring Windows Explorer
  • Command line utility
  • Virtualization

15. Configuring the Operating System

  • System configuration tools
  • System information and monitoring
  • Task management
  • Configuration files

16. Configuring Hardware Settings

  • Device and hardware settings
  • Disks and partitions

17. Networking PCs

  • Creating network connections
  • Sharing files and printers
  • Remote connections


18. Authentication and User Security

  • Users and authentication
  • Windows security policies
  • File system security

19. Securing Systems and Data

  • Identifying common threats
  • Physical security
  • Digital security
  • Data destruction and disposal
  • Malware detection and removal

20. Preventative Maintenance

  • Performing backups
  • Disk maintenance
  • Updating software

21. Securing Networks

  • Securing wired networks
  • Securing wireless networks


22. Troubleshooting System Hardware

  • Troubleshooting core system elements
  • Troubleshooting storage devices
  • Troubleshooting laptop computers

23. Display and Printer Troubleshooting

  • Troubleshooting display issues
  • Printer troubleshooting

24. Network Troubleshooting

  • Troubleshooting the physical network
  • Troubleshooting the logical network

25. Operating System Troubleshooting

  • Startup and recovery tools
  • Troubleshooting Windows and application issues

26. Mobile Devices

  • Comparing tablets and laptops
  • Basic features of mobile operating systems
  • Mobile networks and e-mail
  • Securing mobile devices
  • Synchronizing data

27. Operating System Installation and Upgrades

  • Preparing to install Windows
  • Windows installation
  • Windows upgrades and compatibility

CompTIA A+ 220-802 Certification Exam



A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

Business Email Compromise (BEC) XML Entity Injection (XXE) Exercise

The BEC XXE exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s Advanced Cyber Range Environment (ACRE). Lead by expert cyber security engineers, the exercise can be executed in a classroom and remotely. In this exercise, BEC-based attacks are simulated. Participants will be introduced to variations of the BEC attack (both external and internal) and will capture, preserve and recover network and host-based artifacts from the attacks. They will also determine the origin of the attacks, the extent of the compromise, and any on-going activity related to it. Discussion focuses on blue team threat hunter tasks. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are engaged via an Incident Response "Observe/Engage" Model and are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.

Cyber Vanguard Series- Cyber Storm Assault Tactics

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

Cyber Vanguard Series-Cyber Strike

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W