Use this syllabus as your source of truth for 220-1202. Work through each domain in order and drill targeted sets after every section.
What’s covered
Operating Systems (28%)
Practice this topic →
Windows Editions, Licensing & Setup Planning
- Differentiate Windows 10/11 editions (Home/Pro/Enterprise/Education) and 32-bit vs 64-bit limits.
- Select licensing/activation (Retail/OEM/Volume; MAK/KMS/AAD) and compliance implications.
- Plan clean/upgrade/repair installs, in-place vs wipe-and-load, and recovery partitions.
- Choose disk styles/partitions (MBR/GPT, basic/dynamic) and file systems (NTFS/exFAT).
- Harden first boot: account types, UAC, Defender defaults, firewall profiles.
Imaging, Deployment & Recovery
- Use Sysprep, DISM, and answer files (unattend.xml) to capture/apply images.
- Create and restore restore points/system images; leverage Windows RE tools.
- Repair boot issues (BCD, bootrec, startup repair) and driver rollbacks.
- Automate post-image configuration with PowerShell and package managers (winget/choco).
- Validate deployments: driver signing, device manager checks, event log review.
- Operate MMC consoles (Computer Management, Services, Local Users/Groups, Task Scheduler).
- Diagnose with Task Manager, Resource Monitor, Performance Monitor (counters/alerts).
- Apply policies: Local Security Policy, gpedit basics, BitLocker/EFS configuration.
- Use msconfig, systemproperties*, netplwiz, and control vs Settings app.
- Troubleshoot name/IP/DNS with ipconfig, ping, tracert, netstat, nslookup.
File Systems, Storage & Data Protection
- Compare NTFS permissions vs share permissions; inheritance, ownership, auditing.
- Manage disks/volumes, Storage Spaces, quotas, compression, and shadow copies.
- Configure BitLocker (TPM/PIN/USB) and EFS; backup keys and recovery agents.
- Resolve access denied, locked files, and corrupt file system issues (chkdsk, sfc).
- Implement backup/restore strategies and verify by test restores.
Networking, Remote Access & Printing
- Set IPv4/IPv6, DHCP/static, DNS, gateways; diagnose NIC/driver problems.
- Secure Windows Firewall rules/profiles and troubleshoot block/allow issues.
- Use RDP/Quick Assist/SSH/VPN (SSTP/L2TP/IKEv2); consent and logging best practices.
- Configure SMB shares/printers, spooler fixes, and driver isolation.
- Resolve proxy, captive portal, and name-resolution conflicts.
Updates, Maintenance & Performance
- Manage Windows Update rings/deferrals, optional drivers, and feature vs quality updates.
- Schedule maintenance tasks, disk cleanup, and startup optimization.
- Interpret common Event Viewer logs (System, Application, Setup, Security).
- Use Reliability Monitor and performance baselining for trending.
- Roll back updates/drivers safely and document post-fix validation.
macOS & Linux Support Essentials
- Navigate macOS System Settings, Activity Monitor, Disk Utility, and Time Machine.
- Enable FileVault, Gatekeeper/Notarization, and safe software sources.
- Execute Linux CLI basics: ls/cp/mv/rm, grep, chmod/chown, ps/top, sudo.
- Manage packages/services/logs (apt/dnf, systemctl, /var/log/*) and mounting.
- Troubleshoot permissions, shell profiles, network tools (ip, nmcli, dig).
Virtualization, Cloud Clients & Mobile OS
- Compare Type 1 vs Type 2 hypervisors; VM CPU/RAM/storage sizing and NAT/bridged networking.
- Use snapshots/clones and mitigate resource contention and time skew.
- Explain VDI/DaaS concepts and profile/data redirection.
- Configure iOS/Android: profiles, app permissions, updates, VPN, enterprise Wi-Fi.
- Enroll devices to MDM/EMM and apply passcode/FDE/remote-wipe policies.
Security (28%)
Practice this topic →
Threats, Malware & Attack Techniques
- Identify malware types (virus, worm, Trojan, ransomware, spyware, rootkit) and symptoms.
- Recognize social engineering (phishing, spear, vishing, smishing), watering hole, drive-by.
- Differentiate brute force, password spraying, credential stuffing, and MFA fatigue.
- Explain vulnerability categories: misconfig, unpatched, default creds, weak crypto.
- Prioritize mitigations using impact/likelihood and user education.
Authentication, Authorization & Account Management
- Implement MFA factors, SSO/federation basics, and conditional access concepts.
- Apply least privilege, role-based access, UAC, and privilege escalation prevention.
- Configure password policies, lockouts, and password manager guidance.
- Manage account lifecycle: provisioning, disable vs delete, recovery, offboarding.
- Audit access with local security policy and event logs.
Endpoint Hardening & Application Security
- Configure host firewalls, Defender AV/ASR, and application allow/deny lists.
- Harden browsers: scripts/plugins, pop-up control, safe downloads, certificate warnings.
- Implement patch management for OS/drivers/firmware/apps and verify installs.
- Secure PowerShell/scripting (execution policy, signed scripts) and macro controls.
- Limit lateral movement: disable SMBv1, restrict admin shares, enforce strong RDP settings.
SOHO & Network Security
- Harden SOHO routers: change defaults, firmware updates, disable remote admin.
- Segment networks (guest/IoT), apply ACLs and basic QoS safely.
- Configure WPA3/WPA2 PSK/Enterprise and 802.1X concepts at a high level.
- Understand NAT/PAT, UPnP risks, and DNS security hygiene.
- Monitor with basic logs and alerts; respond to anomalous traffic.
Wireless & Mobile Security
- Mitigate rogue AP/evil twin and deauth/jamming symptoms.
- Evaluate WPS risks and MAC filtering limitations.
- Apply MDM policies: encryption, containerization, geofencing, remote wipe.
- Secure mobile communications: VPN profiles, cert-based email, secure messaging.
- Respond to lost/stolen events: lock/wipe, credential resets, incident record.
Data Protection, Privacy & Disposal
- Classify data (public/internal/confidential) and apply handling rules.
- Use DLP concepts, secure file sharing, and link permissions.
- Encrypt data at rest/in transit; manage keys/recovery keys safely.
- Perform media sanitization: shred, degauss, crypto-erase; record chain-of-custody.
- Follow retention policies and right-to-erasure requests per guidance.
Incident Response Basics
- Follow IR phases: identify, contain, eradicate, recover, lessons learned.
- Collect basic artifacts (logs, screenshots, hashes) while preserving evidence.
- Execute malware removal workflow and validate cleanup with multiple scanners.
- Communicate through proper channels; avoid scope creep and data leakage.
- Document timelines, root cause, and prevention steps.
Security Awareness & Policy Enforcement
- Deliver phishing and safe-browsing training; simulate and measure improvement.
- Enforce acceptable-use, clean-desk, and screen-lock policies.
- Promote secure authentication habits (unique passwords, MFA, password managers).
- Standardize reporting procedures for suspected incidents.
- Track policy exceptions and periodic reviews.
Software Troubleshooting (23%)
Practice this topic →
Boot & Startup Failures (Windows)
- Diagnose missing OS/boot loops, BSODs, and corrupt BCD/boot loaders.
- Use WinRE: Startup Repair, Command Prompt, System Restore, Reset this PC.
- Repair boot (bootrec, bcdedit), fix partition flags, and driver problems.
- Recover from failed updates/rollbacks and failed feature upgrades.
- Verify with Event Viewer and reliability history.
OS Services, Drivers & Resource Conflicts
- Resolve service dependency/startup failures and permission issues.
- Roll back/block problematic drivers; check driver signing and versions.
- Identify memory/handle leaks and high CPU/disk I/O culprits.
- Use msconfig/Task Manager to isolate startup conflicts.
- Stabilize with proper updates, firmware, and BIOS/UEFI settings.
Applications, Compatibility & Installs
- Fix installer failures (elevated permissions, disk space, temp/cache).
- Address runtime errors, missing DLLs, and sandbox/security blocks.
- Apply compatibility modes, app registrations, and repair installs.
- Troubleshoot printing subsystem/spooler crashes and drivers.
- Document root cause and rollback plans.
Network, Browser & Email Issues
- Resolve DNS/proxy/captive portal problems and intermittent connectivity.
- Fix browser crashes, extension conflicts, cache/cookie/cert warnings.
- Configure email clients (IMAP/POP/SMTP), OST/PST growth issues.
- Handle spam/quarantine, blocked attachments, and SPF/DMARC warnings (user level).
- Validate with test messages and protocol logs where available.
Malware Symptoms & Removal Workflow
- Identify pop-ups, redirects, encryption notes, and unusual processes/services.
- Isolate host from the network; capture indicators for IR.
- Run updated scans (Safe Mode), use specialized removal tools, and re-scan.
- Repair network/registry/proxy settings and re-enable services.
- Patch and harden post-incident; educate the user.
- Baseline with PerfMon counters and Resource Monitor for CPU/RAM/disk/network.
- Correlate Event Viewer errors/warnings with user reports.
- Differentiate software vs hardware symptoms using diagnostics.
- Apply the structured troubleshooting model; verify and document fixes.
- Automate recurring fixes via scripts and scheduled tasks.
Mobile OS & App Troubleshooting
- Address install/update failures, permission denials, and app crashes.
- Resolve Wi-Fi/cellular/Bluetooth pairing and captive portal issues.
- Fix battery drain/overheating, storage exhaustion, and background abuse.
- Reset network settings, clear app caches/data, re-enroll with MDM.
- Handle account lockouts and MFA/app token resets.
Virtual Apps, Cloud Clients & Sync
- Diagnose VDI latency, profile/FSLogix issues, and printer redirection.
- Troubleshoot OneDrive/Drive/Box sync errors and conflicts.
- Resolve SaaS client sign-in (SSO/MFA) and permission-related access issues.
- Check local cache, throttling, and offline file policies.
- Escalate platform outages with proper evidence and user comms.
Operational Procedures (21%)
Practice this topic →
Ticketing, Documentation & Knowledge Management
- Capture accurate symptoms, business impact, steps taken, and outcomes.
- Use categorization, priorities, SLAs/OLAs, and escalation paths.
- Create/update knowledge base articles and runbooks from resolved tickets.
- Apply change notations to tickets when fixes require approvals.
- Measure MTTR, first-contact resolution, and CSAT for improvement.
Change, Release & Configuration Management
- Submit changes with risk/impact, rollback plans, maintenance windows.
- Coordinate CAB approvals and stakeholder communications.
- Version and label images/scripts; maintain standard builds (golden images).
- Track CIs in a CMDB and update after changes.
- Perform post-implementation reviews and close changes cleanly.
- Use ESD protection (wrist straps, mats) and proper tool handling.
- Follow electrical safety, lifting, and ladder best practices.
- Identify thermal, liquid, and sharp-edge hazards in the workspace.
- Apply PPE and workspace organization to reduce incidents.
- Report incidents/near-misses for corrective action.
Environmental & Disposal Practices
- Dispose/recycle e-waste, batteries, toner, and media per local guidance.
- Perform secure media destruction (shred, degauss, crypto-erase).
- Handle spills/leaks using SDS/MSDS and escalation steps.
- Label and inventory hazardous materials appropriately.
- Maintain records for audits and regulatory requirements.
Professionalism & Communication
- Demonstrate empathy, active listening, and nonjudgmental language.
- Set expectations, confirm understanding, and obtain consent before actions.
- Adapt explanations for non-technical users; avoid jargon and blame.
- Protect confidentiality; handle sensitive data appropriately.
- Deliver clear post-resolution summaries and next steps.
Backups, Recovery, BCDR & Testing
- Differentiate full/differential/incremental and image vs file backups.
- Implement 3-2-1 strategy and offsite/immutable copies; encrypt backups.
- Define RPO/RTO and map systems to recovery tiers.
- Test restores regularly and document results.
- Maintain DR runbooks, contacts, and communication trees.
Privacy, Compliance & Licensing
- Identify PII/PHI/company confidential data and handling rules.
- Apply acceptable use, clean-desk, and screen-lock policies.
- Track software licenses (OEM/Retail/Volume) and activation audits.
- Follow data retention and legal hold instructions.
- Report suspected policy violations via proper channels.
Asset Management, Remote Support & Escalation
- Maintain inventory/CMDB: lifecycle from procurement to disposal.
- Secure remote tools (RDP/Quick Assist/screen share) with consent and logging.
- Standardize deployment scripts and post-deployment validation checklists.
- Define when to dispatch onsite vs remote resolution.
- Escalate effectively with reproducible steps, logs, and impact statements.
Tip: After finishing a domain, take a 20–25 question drill focused on that domain, then revisit weak objectives before moving on.