CompTIA's A+ exam 2009 (220-701 and 220-702) consists of two exams. The first focuses on fundamentals in computer technology, networks and security, as communication and professional skills. The second exam focuses on taking the information of the first exam and applying it to solve problems; troubleshooting and tools are a major component of this second exam. Our study guide layout follows that of the exam, helping the reader to understand not only the material but what to expect from the exam and how to expect it. We have hundreds of questions for self-testing along with several worked examples that are especially useful for the second part of the exam which focuses on application of principles. After reading this book not only will you be able to pass each component of the exam but you will have all the technology fundamentals and troubleshooting experience needed to give you the edge at your current job or your next position as a computer support technician. A DVD will be included with 3 practice exams for each exam, podcasts detailing select examples, and open source tools. Book layout adheres to exam objectives allowing for ease of learning and use of information on test day.
Over 500 questions help the reader get ready for the exam and check progress while studying. Worked examples show rather than tell how concepts are applied.
Sprache
Verlagsort
Zielgruppe
Für Beruf und Forschung
Computer Support Technicians, IT Professionals
Illustrationen
Approx. 125 illustrations
Maße
Höhe: 235 mm
Breite: 191 mm
ISBN-13
978-1-59749-600-1 (9781597496001)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Andrew Whitaker (MCT, A+, CEI, CISSP, LPT, ECSA, CEH, CCNP, CCSP, CCVP, CCDP, CCDA, CCNA:Security, MCSE, MCTS, CNE, Network+, Security+, Convergence+, CTP, EMCPA, CHFI, CICP) is the Director of Enterprise InfoSec and Networking and a senior networking instructor for Training Camp. As an award winning instructor his courses have garnished media attention from several news organizations. Andrew is also contributing author to several best selling networking and security books. Keatron Evans (MCT, MCITP, MCSE 2003, MCSA, CISSP, LPT, CEH, CHFI, CEPT, CCFE, CCSP, CCNA, Network+, Security+, A+) Keatron Evans, is one of the lead authors of Chained Exploits:Advanced Hacking Attacks from Start to Finsish, which is a best selling information security book which has been translated to several languages including French and Spanish. Keatron is also Principal of Blink Digital Security, a penetration testing and forensics firm. He is a Senior Instructor and Director of Training Services at InfoSec Institute, a provider of advanced ethical hacking training. He is regularly requested as a trainer, consultant, and penetration tester by various intelligencecommunity entities, as well as the law enforcement community. Keatron has an obvious professional and personal passion for penetration testing and computer forensics. Additionally, Keatron provides training and consulting for many of the world's most dynamic and recognizedcompanies, including Microsoft, Oracle, Chase, and many others. Keatron has appeared in The Wall Street Journal, The San Francisco Chronicle, and several other national media outlets and publications. Keatron is an Author/Expert for Network World and contributes regularly to articles and blogs there.
Part 1: PC Architecture and Hardware
Chapter 1: Storage Devices and Backup Media
Chapter 2: Motherboards
Chapter 3: Power Supplies Types and Characteristics
Chapter 4: CPUs, Cooling Methods and Devices
Chapter 5: Memory
Chapter 6: Display Devices
Chapter 7: Peripherals and Input Devices
Chapter 8: Function and Types of Adapter Cards
Chapter 9: Laptop Components and Features
Chapter 10: Printers
Part 2: Operating systems and software
Chapter 11: Windows Operating Systems and Features
Chapter 12: Windows Installation and Configuration
Chapter 13: User Interfaces
Chapter 14: Boot Sequences, Methods, and Startup Utilities
Part 3: Networking
Chapter 15: Network Topologies, Devices, and Protocols
Chapter 16: Network Cables and Connectors and Their Implementations
Chapter 17: Network Types
Part 4: Security
Chapter 18: Principles, Concepts and Technologies
Chapter 19: Security Features
Part 5: Operational procedures
Chapter 20: Environmental Procedures
Chapter 21: Communication Skills and Professionalism
Appendix A: Other Operating Systems
Appendix B: Contents of the Live CD