Please enable JavaScript to use CodeHS

Standards Mapping

for CompTIA A+ 1002

33

Standards in this Framework

16

Standards Mapped

48%

Mapped to Course

Standard Lessons
1.1
Compare and contrast common operating system types and their purposes.
1.2
Compare and contrast features of Microsoft Windows versions
1.3
Summarize general OS installation considerations and upgrade methods.
1.4
Given a scenario, use appropriate Microsoft command line tools.
1.5
Given a scenario, use Microsoft operating system features and tools.
1.6
Given a scenario, use Microsoft Windows Control Panel utilities
1.7
Summarize application installation and configuration concepts.
1.8
Given a scenario, configure Microsoft Windows networking on a client/desktop.
1.9
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
2.1
Summarize the importance of physical security measures.
  1. 3.2 Environmental Controls
2.2
Explain logical security concepts.
  1. 3.4 Private Networks
  2. 3.5 Mobile Devices
  3. 3.6 Access Control
  4. 5.6 Internal Threats
2.3
Compare and contrast wireless security protocols and authentication methods.
  1. 3.6 Access Control
2.4
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
  1. 5.2 Malware Types and Prevention
2.5
Compare and contrast social engineering, threats, and vulnerabilities.
  1. 5.4 Additional Attacks
2.6
Compare and contrast the differences of basic Microsoft Windows OS security settings.
2.7
Given a scenario, implement security best practices to secure a workstation.
  1. 3.5 Mobile Devices
  2. 5.6 Internal Threats
2.8
Given a scenario, implement methods for securing mobile devices.
  1. 3.5 Mobile Devices
2.9
Given a scenario, implement appropriate data destruction and disposal methods.
2.10
Given a scenario, configure security on SOHO wireless and wired networks.
3.1
Given a scenario, troubleshoot Microsoft Windows OS problems.
3.2
Given a scenario, troubleshoot and resolve PC security issues.
3.3
Given a scenario, use best practice procedures for malware removal.
3.4
Given a scenario, troubleshoot mobile OS and application issues.
  1. 4.3 Star in a Video!
3.5
Given a scenario, troubleshoot mobile OS and application security issues.
  1. 4.1 Communication is Key!
4.1
Compare and contrast best practices associated with types of documentation.
  1. 7.1 Level 1: Entry Event
  2. 7.2 Level 2: User Training
  3. 7.3 Level 3: Incident Response
  4. 7.4 Level 4: Data and Licenses
4.2
Given a scenario, implement basic change management best practices.
  1. 7.1 Level 1: Entry Event
  2. 7.5 Level 5: Change Management
4.3
Given a scenario, implement basic disaster prevention and recovery methods.
  1. 3.2 Environmental Controls
  2. 7.3 Level 3: Incident Response
4.4
Explain common safety procedures.
  1. 3.2 Environmental Controls
4.5
Explain environmental impacts and appropriate controls
  1. 3.2 Environmental Controls
4.6
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.
  1. 7.1 Level 1: Entry Event
  2. 7.2 Level 2: User Training
  3. 7.3 Level 3: Incident Response
  4. 7.4 Level 4: Data and Licenses
4.7
Given a scenario, use proper communication techniques and professionalism
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
4.8
Identify the basics of scripting.
4.9
Given a scenario, use remote access technologies.