CompTIA A+ Core 2 (220-1202) Syllabus — Objectives by Domain

Blueprint-aligned learning objectives for CompTIA A+ Core 2 (220-1202), organized by domain with quick links to targeted practice.

Use this syllabus as your source of truth for 220-1202. Work through each domain in order and drill targeted sets after every section.

What’s covered

Operating Systems (28%)

Practice this topic →

Windows Editions, Licensing & Setup Planning

  • Differentiate Windows 10/11 editions (Home/Pro/Enterprise/Education) and 32-bit vs 64-bit limits.
  • Select licensing/activation (Retail/OEM/Volume; MAK/KMS/AAD) and compliance implications.
  • Plan clean/upgrade/repair installs, in-place vs wipe-and-load, and recovery partitions.
  • Choose disk styles/partitions (MBR/GPT, basic/dynamic) and file systems (NTFS/exFAT).
  • Harden first boot: account types, UAC, Defender defaults, firewall profiles.

Imaging, Deployment & Recovery

  • Use Sysprep, DISM, and answer files (unattend.xml) to capture/apply images.
  • Create and restore restore points/system images; leverage Windows RE tools.
  • Repair boot issues (BCD, bootrec, startup repair) and driver rollbacks.
  • Automate post-image configuration with PowerShell and package managers (winget/choco).
  • Validate deployments: driver signing, device manager checks, event log review.

Administration Tools & Configuration

  • Operate MMC consoles (Computer Management, Services, Local Users/Groups, Task Scheduler).
  • Diagnose with Task Manager, Resource Monitor, Performance Monitor (counters/alerts).
  • Apply policies: Local Security Policy, gpedit basics, BitLocker/EFS configuration.
  • Use msconfig, systemproperties*, netplwiz, and control vs Settings app.
  • Troubleshoot name/IP/DNS with ipconfig, ping, tracert, netstat, nslookup.

File Systems, Storage & Data Protection

  • Compare NTFS permissions vs share permissions; inheritance, ownership, auditing.
  • Manage disks/volumes, Storage Spaces, quotas, compression, and shadow copies.
  • Configure BitLocker (TPM/PIN/USB) and EFS; backup keys and recovery agents.
  • Resolve access denied, locked files, and corrupt file system issues (chkdsk, sfc).
  • Implement backup/restore strategies and verify by test restores.

Networking, Remote Access & Printing

  • Set IPv4/IPv6, DHCP/static, DNS, gateways; diagnose NIC/driver problems.
  • Secure Windows Firewall rules/profiles and troubleshoot block/allow issues.
  • Use RDP/Quick Assist/SSH/VPN (SSTP/L2TP/IKEv2); consent and logging best practices.
  • Configure SMB shares/printers, spooler fixes, and driver isolation.
  • Resolve proxy, captive portal, and name-resolution conflicts.

Updates, Maintenance & Performance

  • Manage Windows Update rings/deferrals, optional drivers, and feature vs quality updates.
  • Schedule maintenance tasks, disk cleanup, and startup optimization.
  • Interpret common Event Viewer logs (System, Application, Setup, Security).
  • Use Reliability Monitor and performance baselining for trending.
  • Roll back updates/drivers safely and document post-fix validation.

macOS & Linux Support Essentials

  • Navigate macOS System Settings, Activity Monitor, Disk Utility, and Time Machine.
  • Enable FileVault, Gatekeeper/Notarization, and safe software sources.
  • Execute Linux CLI basics: ls/cp/mv/rm, grep, chmod/chown, ps/top, sudo.
  • Manage packages/services/logs (apt/dnf, systemctl, /var/log/*) and mounting.
  • Troubleshoot permissions, shell profiles, network tools (ip, nmcli, dig).

Virtualization, Cloud Clients & Mobile OS

  • Compare Type 1 vs Type 2 hypervisors; VM CPU/RAM/storage sizing and NAT/bridged networking.
  • Use snapshots/clones and mitigate resource contention and time skew.
  • Explain VDI/DaaS concepts and profile/data redirection.
  • Configure iOS/Android: profiles, app permissions, updates, VPN, enterprise Wi-Fi.
  • Enroll devices to MDM/EMM and apply passcode/FDE/remote-wipe policies.

Security (28%)

Practice this topic →

Threats, Malware & Attack Techniques

  • Identify malware types (virus, worm, Trojan, ransomware, spyware, rootkit) and symptoms.
  • Recognize social engineering (phishing, spear, vishing, smishing), watering hole, drive-by.
  • Differentiate brute force, password spraying, credential stuffing, and MFA fatigue.
  • Explain vulnerability categories: misconfig, unpatched, default creds, weak crypto.
  • Prioritize mitigations using impact/likelihood and user education.

Authentication, Authorization & Account Management

  • Implement MFA factors, SSO/federation basics, and conditional access concepts.
  • Apply least privilege, role-based access, UAC, and privilege escalation prevention.
  • Configure password policies, lockouts, and password manager guidance.
  • Manage account lifecycle: provisioning, disable vs delete, recovery, offboarding.
  • Audit access with local security policy and event logs.

Endpoint Hardening & Application Security

  • Configure host firewalls, Defender AV/ASR, and application allow/deny lists.
  • Harden browsers: scripts/plugins, pop-up control, safe downloads, certificate warnings.
  • Implement patch management for OS/drivers/firmware/apps and verify installs.
  • Secure PowerShell/scripting (execution policy, signed scripts) and macro controls.
  • Limit lateral movement: disable SMBv1, restrict admin shares, enforce strong RDP settings.

SOHO & Network Security

  • Harden SOHO routers: change defaults, firmware updates, disable remote admin.
  • Segment networks (guest/IoT), apply ACLs and basic QoS safely.
  • Configure WPA3/WPA2 PSK/Enterprise and 802.1X concepts at a high level.
  • Understand NAT/PAT, UPnP risks, and DNS security hygiene.
  • Monitor with basic logs and alerts; respond to anomalous traffic.

Wireless & Mobile Security

  • Mitigate rogue AP/evil twin and deauth/jamming symptoms.
  • Evaluate WPS risks and MAC filtering limitations.
  • Apply MDM policies: encryption, containerization, geofencing, remote wipe.
  • Secure mobile communications: VPN profiles, cert-based email, secure messaging.
  • Respond to lost/stolen events: lock/wipe, credential resets, incident record.

Data Protection, Privacy & Disposal

  • Classify data (public/internal/confidential) and apply handling rules.
  • Use DLP concepts, secure file sharing, and link permissions.
  • Encrypt data at rest/in transit; manage keys/recovery keys safely.
  • Perform media sanitization: shred, degauss, crypto-erase; record chain-of-custody.
  • Follow retention policies and right-to-erasure requests per guidance.

Incident Response Basics

  • Follow IR phases: identify, contain, eradicate, recover, lessons learned.
  • Collect basic artifacts (logs, screenshots, hashes) while preserving evidence.
  • Execute malware removal workflow and validate cleanup with multiple scanners.
  • Communicate through proper channels; avoid scope creep and data leakage.
  • Document timelines, root cause, and prevention steps.

Security Awareness & Policy Enforcement

  • Deliver phishing and safe-browsing training; simulate and measure improvement.
  • Enforce acceptable-use, clean-desk, and screen-lock policies.
  • Promote secure authentication habits (unique passwords, MFA, password managers).
  • Standardize reporting procedures for suspected incidents.
  • Track policy exceptions and periodic reviews.

Software Troubleshooting (23%)

Practice this topic →

Boot & Startup Failures (Windows)

  • Diagnose missing OS/boot loops, BSODs, and corrupt BCD/boot loaders.
  • Use WinRE: Startup Repair, Command Prompt, System Restore, Reset this PC.
  • Repair boot (bootrec, bcdedit), fix partition flags, and driver problems.
  • Recover from failed updates/rollbacks and failed feature upgrades.
  • Verify with Event Viewer and reliability history.

OS Services, Drivers & Resource Conflicts

  • Resolve service dependency/startup failures and permission issues.
  • Roll back/block problematic drivers; check driver signing and versions.
  • Identify memory/handle leaks and high CPU/disk I/O culprits.
  • Use msconfig/Task Manager to isolate startup conflicts.
  • Stabilize with proper updates, firmware, and BIOS/UEFI settings.

Applications, Compatibility & Installs

  • Fix installer failures (elevated permissions, disk space, temp/cache).
  • Address runtime errors, missing DLLs, and sandbox/security blocks.
  • Apply compatibility modes, app registrations, and repair installs.
  • Troubleshoot printing subsystem/spooler crashes and drivers.
  • Document root cause and rollback plans.

Network, Browser & Email Issues

  • Resolve DNS/proxy/captive portal problems and intermittent connectivity.
  • Fix browser crashes, extension conflicts, cache/cookie/cert warnings.
  • Configure email clients (IMAP/POP/SMTP), OST/PST growth issues.
  • Handle spam/quarantine, blocked attachments, and SPF/DMARC warnings (user level).
  • Validate with test messages and protocol logs where available.

Malware Symptoms & Removal Workflow

  • Identify pop-ups, redirects, encryption notes, and unusual processes/services.
  • Isolate host from the network; capture indicators for IR.
  • Run updated scans (Safe Mode), use specialized removal tools, and re-scan.
  • Repair network/registry/proxy settings and re-enable services.
  • Patch and harden post-incident; educate the user.

Performance, Logs & Root-Cause Analysis

  • Baseline with PerfMon counters and Resource Monitor for CPU/RAM/disk/network.
  • Correlate Event Viewer errors/warnings with user reports.
  • Differentiate software vs hardware symptoms using diagnostics.
  • Apply the structured troubleshooting model; verify and document fixes.
  • Automate recurring fixes via scripts and scheduled tasks.

Mobile OS & App Troubleshooting

  • Address install/update failures, permission denials, and app crashes.
  • Resolve Wi-Fi/cellular/Bluetooth pairing and captive portal issues.
  • Fix battery drain/overheating, storage exhaustion, and background abuse.
  • Reset network settings, clear app caches/data, re-enroll with MDM.
  • Handle account lockouts and MFA/app token resets.

Virtual Apps, Cloud Clients & Sync

  • Diagnose VDI latency, profile/FSLogix issues, and printer redirection.
  • Troubleshoot OneDrive/Drive/Box sync errors and conflicts.
  • Resolve SaaS client sign-in (SSO/MFA) and permission-related access issues.
  • Check local cache, throttling, and offline file policies.
  • Escalate platform outages with proper evidence and user comms.

Operational Procedures (21%)

Practice this topic →

Ticketing, Documentation & Knowledge Management

  • Capture accurate symptoms, business impact, steps taken, and outcomes.
  • Use categorization, priorities, SLAs/OLAs, and escalation paths.
  • Create/update knowledge base articles and runbooks from resolved tickets.
  • Apply change notations to tickets when fixes require approvals.
  • Measure MTTR, first-contact resolution, and CSAT for improvement.

Change, Release & Configuration Management

  • Submit changes with risk/impact, rollback plans, maintenance windows.
  • Coordinate CAB approvals and stakeholder communications.
  • Version and label images/scripts; maintain standard builds (golden images).
  • Track CIs in a CMDB and update after changes.
  • Perform post-implementation reviews and close changes cleanly.

Safety, Tools & ESD

  • Use ESD protection (wrist straps, mats) and proper tool handling.
  • Follow electrical safety, lifting, and ladder best practices.
  • Identify thermal, liquid, and sharp-edge hazards in the workspace.
  • Apply PPE and workspace organization to reduce incidents.
  • Report incidents/near-misses for corrective action.

Environmental & Disposal Practices

  • Dispose/recycle e-waste, batteries, toner, and media per local guidance.
  • Perform secure media destruction (shred, degauss, crypto-erase).
  • Handle spills/leaks using SDS/MSDS and escalation steps.
  • Label and inventory hazardous materials appropriately.
  • Maintain records for audits and regulatory requirements.

Professionalism & Communication

  • Demonstrate empathy, active listening, and nonjudgmental language.
  • Set expectations, confirm understanding, and obtain consent before actions.
  • Adapt explanations for non-technical users; avoid jargon and blame.
  • Protect confidentiality; handle sensitive data appropriately.
  • Deliver clear post-resolution summaries and next steps.

Backups, Recovery, BCDR & Testing

  • Differentiate full/differential/incremental and image vs file backups.
  • Implement 3-2-1 strategy and offsite/immutable copies; encrypt backups.
  • Define RPO/RTO and map systems to recovery tiers.
  • Test restores regularly and document results.
  • Maintain DR runbooks, contacts, and communication trees.

Privacy, Compliance & Licensing

  • Identify PII/PHI/company confidential data and handling rules.
  • Apply acceptable use, clean-desk, and screen-lock policies.
  • Track software licenses (OEM/Retail/Volume) and activation audits.
  • Follow data retention and legal hold instructions.
  • Report suspected policy violations via proper channels.

Asset Management, Remote Support & Escalation

  • Maintain inventory/CMDB: lifecycle from procurement to disposal.
  • Secure remote tools (RDP/Quick Assist/screen share) with consent and logging.
  • Standardize deployment scripts and post-deployment validation checklists.
  • Define when to dispatch onsite vs remote resolution.
  • Escalate effectively with reproducible steps, logs, and impact statements.

Tip: After finishing a domain, take a 20–25 question drill focused on that domain, then revisit weak objectives before moving on.