A Quick Glance

The organisations need infrastructure skills for business. The CompTIA (Computing Technology Industry Association) is a unified voice in the IT community. It offers A+ Certification to confirm the essential infrastructure skills. Infrastructure skills are required to install, manage and configure the computing equipment. Without these IT skills, the business will not be able to get the productive output. So We, at Pentagon Training, provide necessary hardware and software skills to delegates.

Our CompTIA A+ course covers the understanding of Windows and its supporting networks. The delegates will learn about peripherals and adapters. CompTIA training enables candidates to get knowledge on virtualization and desktop imaging.

Who should take this course

The target audience for this course are:

  • Desktop Engineer
  • Support Engineer
  • Maintenance Engineer
  • Computer Administrator
  • PC Support Analyst


There are no prerequisites for this course but the knowledge of IT infrastructure elements and windows system are recommended.


What Will You Learn

After attending this training, the delegates will be able to:

  • Install, configure, and troubleshoot MS Windows
  • Understand Linux and Mac operating systems
  • Use Anti-virus tools
  • Recover from malware infections
  • Configuration of control measures such as authentication, security policy, encryption, and firewalls

What's included

  Course Overview

The A+ course imparts knowledge about installation, configuration and maintenance of the infrastructure system. They will know about the troubleshooting and problems that require troubleshooting. After completing this course, the candidates will achieve the CompTIA certificate.


  Course Content

Module 1:  An Overview of Windows

  • An Introduction to Windows Operating System
  • Defining Windows Vista, 7 and 8
  • Understanding system requirements and upgrade paths
  • Identifying Administration Tools
  • An Introduction to Control Panel and System Properties
  • Recognising Administrative Tools
  • What is Windows Registry?
  • Storage Management
  • Recognising Disk Partitions and File Systems
  • Defining Mount Points and Disk Images
  • Adding Arrays
  • File Management
  • Navigating Directories and File Management using a Command Prompt
  • Managing Applications, Software and Services

Module2: Supporting Windows

  • Device Management
  • Configuration of Hardware
  • Usage of Device Manager
  • Understanding Sound and Display Settings
  • Managing Performance and Viewing System Information
  • Observing Performance
  • Using Advanced System Properties
  • Troubleshooting Windows, Models, and Processes
  • Troubleshooting Windows and Application Errors
  • Handling Users and Group Accounts
  • Installing Windows and Boot Methods
  • Organising the Hard Disk and Implementation an Attended Installation
  • Troubleshooting Boot Problems
  • An Introduction to BIOS and UEFI
  • Restoring System
  • Using Advanced Boot Options Menu
  • Repairing System and Reinstallation
  • An Introduction to Maintenance and Backup
  • Understanding Disk Maintenance Utilities and Task Scheduler
  • Understanding Patch Management and Data Backup
  • Restoring User Profiles
  • An Introduction to Threats and Vulnerabilities
  • Understanding Security Fundamentals, Policies, and Engineering
  • Network Footprinting and fingerprinting
  • Approaches of Network Attack
  • Defining Viruses and Malware
  • Malware Types
  • Anti-virus software and symptoms
  • Understanding Quarantine and Remediation
  • Avoiding Malware Infections
  • Securing Workstations
  • Workstation, Digital, and Physical Security
  • Securing Data
  • Data and Corporate Security Policy
  • Data Encryption and Disposal Methods
  • Understanding Data Incident Response Policies

Module3: Supporting Windows Networks

  • Network Connections and IP Configuration
  • An Introduction to network card properties
  • Establishing Internet Connections and Remote Access Utilities
  • Obtaining Network Connections
  • Windows, Network and Host Firewalls
  • Getting SOHO Networks
  • Shared Resources Configuration
  • An overview of Domains, Workgroups, and Homegroups
  • File and Folder Sharing Configuration
  • Understanding NTFS File and Folder Permissions
  • An Introduction to Virtualization and Services
  • Security Requirements and Cloud Computing
  • Networked Host Services

Module4: An Overview of Linux, OS X, and Mobile OS

  • An Introduction to Linux Operating System
  • Identifying Linux Distros and Shells
  • Attaining Linux File System
  • Handling Linux User Accounts
  • An Introduction to OS X
  • OS X File systems, software management, networking, and troubleshooting
  • Cellular Data Networks and Wi-Fi and Bluetooth Networks
  • An Introduction to Mobile OS Security and Troubleshooting
  • Understanding Mobile OS Security, Access Control, and Policies
  • Troubleshooting Mobile OS, Wireless and Security Issues
  • An Introduction to Safety and Environmental Processes
  • Defining Local Government Regulations and Electrical Safety
  • Describing Cable Management and Lifting Methods
  • Defining Disposal and Recycling
  • An Introduction to Cable Management and Lifting Techniques
  • Understanding Customer Service and Communication Skills

Module5: An Introduction to Peripherals and Adapters

  • Defining motherboard components
  • Describing System Case Types and disassembling a PC
  • Understanding Motherboard Layout and Sizes
  • Defining Bus Architecture and Motherboard Components
  • An Introduction to connection interfaces
  • Describing various types of ports and devices
  • Installation and configuration of peripherals
  • An Overview of display devices and its types
  • Troubleshooting display problems
  • An Introduction to audio and multimedia device
  • Defining storage devices and adapters
  • An Overview of Flash and Tape drives

Module 6: System Components

  • Introducing various kinds of mass storage devices
  • An overview of many types of memories, Central Processing Unit
  • Architecture, Features and Packaging of CPU
  • An Introduction to BIOS and UEFI
  • Components, devices and BIOS security configuration
  • Defining electrical circuits and Power Supply Unit
  • PSU Installation

Module7: Troubleshooting and Mobile Devices

  • An Introduction to Troubleshooting System Components
  • Troubleshooting power and hardware problems
  • Troubleshooting Post and motherboard components
  • Describing Laptop types and features
  • Kinds of mobile devices
  • Defining Mobile Accessories and Ports
  • Troubleshooting mobile displays

Module8: Printer and Network Hardware

  • Various types of printers
  • Installing, Configuring, Sharing and Networking printers
  • Maintaining various kinds of printers
  • Troubleshooting print types and errors
  • An overview of network architecture
  • Network topologies, OSI Model and Types of network
  • An overview of Ethernet networks
  • Describing cablings
  • An overview of Hubs, Bridges and Switches

CompTIA Training

What is CompTIA Certification?

The full form of CompTIA is Computing Technology Industry Association. It issues certifications to the persons who complete the training provided by accredited training providers and pass the respective exam. CompTIA was created in 1982. It delivers the professional certification in over 120 countries and provided certifications to 2.2 million people. 

The CompTIA’s expansion results into the increased membership from 2050 members to more than 50,000 in 2015. It launched the Dream IT program in 2014 for girls and women in the United States who are the aspirants for the IT industry. It launched the online resource for schools in June 2015. 

Steps for achieving CompTIA certification:

  • The first step is to enrol into the levels of CompTIA Certification. These levels are:
    • A+ Level: The candidates who want to start a career by recognising the IT infrastructure should attend Foundation course.
    • Security+ Level: This level provides the skills about risk identification and resolution.
    • Network+ Level: Get the expertise level networking skills in this level.
  • After selecting one of the levels, the delegates can enrol into courses by one of the delivery methods such as online training, instructor-led and self-study training.
  • The candidates have to book for the required exam.

What is IT Security?

The Information Technology’s security is the protection of digital information and IT resources from Internal, external and malicious threats. The protection mechanism includes threat detection and prevention by using the security policies, software tools and IT services. There are two types of security. One is data information security and second is computer security.

The need of Security:

  • The security is needed to defend against the attackers and hackers.
  • The essential information should not be accessed by the unauthorised persons.

Various kinds of attacks:

Without the proper security, the network may subject to attack. There are two types of attacks:

  • Passive attacks: These attacks are executed just to monitor the information.
  • Active attacks: These attacks alter the data intentionally to destroy the data of a system or network.

The software and network system is vulnerable to the following types of attacks:

  • Denial-of-Service attack: It hinders the system performance by not permitting the authorised users to use the assets.
  • Sniffer attack: These attacks can attack the system by using the sniffer software which helps them to read the information and analyse the network.
  • Brute-Force attack: The intruders try passwords with the hope of guessing them. They can also use keys which are generated from the passwords to guess the password.


CompTIA A+ Certification Schedules

Course Name Duration Dates Price
CompTIA A+ Certification 5 days Reading
CompTIA A+ Certification 5 days Reading
CompTIA A+ Certification 5 days Reading

About Reading

Located in Berkshire, Reading is a large and historically significant town. It was an important center of trade as well as religion in the medieval period. The Reading Abbey, still has its  12th century abbey gateway and significant ruins intact. Due to the English Civil War the town was damaged severely, causing a significant loss in trade. Reading also played an important role in the Revolution of 1688. It is where the revolution's only significant military action was took place. The Great Western Railway , the brewing business, baking and seed growing all happened in 19th century. Now,Reading boasts of being a  major commercial centre, that involves information technology and insurance. Reading   has, despite its nearness to London, a net inward traveler flow.


Reading came up as a settlement way  back in the 8th century. It had become the largest town in Berkshire by 1525 and had a population of around 5000 in the early 17th Century. It was in the 18th century that major iron works in the town came up and the city saw the growth of the brewing business for which Reading is known till date. It was in the 19th century that Reading saw the growth of manufacturing business also.


Reading is a vital commercial centre in the Thames Valley and Southern England. It is home to the headquarters of many British companies and UK offices of foreign multinationals. It is also a  major retail centre. Daily Reading has an inflow of 30,000 commuters as compared to 24,000 departures. Large companies such as  Microsoft and Oracle  have their headquarters in Reading. Other businesses in Reading are Prudential, PepsiCo and Wrigley. In 2007, an independent poll placed Reading 16th in a league table of best performing retail centres in the UK.


Reading is known for its Reading Beer Festival which was first held in 1994 and is now known to be one of the largest beer festivals in the UK. It takes place at King's Meadow for the five days immediately preceding the May Day bank holiday every year.  Reading Pride also takes place at Reading, an annual LGBTA festival in Kings Meadow.



The Museum of Reading  contains galleries that showcase the history of Reading . The museum is also home to the excavations of Calleva Atrebatum. It also houses a full-size replica of the Bayeux Tapestry, an art collection, and galleries relating to Huntley and Palmers.

Located in East Reading, The Museum of English Rural Life,is dedicated to the changing face of rural England. It also has collections of public value. It is not only owned but also managed by the University of Reading. The Ure Museum of Greek Archaeology, the Cole Musum of Zoology and the Harris Botanic Gardens are also under the same management. All these museums can be found on the university's Whiteknights Campus.

There is also a small Riverside Museum at Blake's Lock which tells one about Reading's two rivers, the Thames and the Kennet. The Museum of Berkshire Aviation  houses a collection of aircraft and other aviation accessories.