From the course: CompTIA A+ Core 2 (220-1102) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Understanding USB
From the course: CompTIA A+ Core 2 (220-1102) Cert Prep
Understanding USB
- For most of us, our experience with USB is simply grabbing some kind of USB device, plugging it into something and it just works. That's fantastic. But in this episode, I want to drill down a little bit so we can really understand how USB works. So to get started, let's consider for a moment this USB mouse. Very simple mouse, nothing fancy here. It's got a USB-A connector on the end. But when I plug this in, I'm plugging it into, for example, a system that has a motherboard with a built-in. You ready? USB controller. What's taking place is built into my motherboard is almost like a little network from which we connect all these different USB devices and built into the motherboard itself is this controller that simply makes all this other stuff work. So when we're talking about USB, we get into this concept of what I call upstream and downstream. Let me show you. So this is the back of some system. Here, I'm kind of…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Understanding partitioning4m 4s
-
(Locked)
MBR partitioning11m 49s
-
(Locked)
GPT partitioning8m 23s
-
(Locked)
Understanding file systems11m 21s
-
(Locked)
Popular file systems6m 24s
-
(Locked)
Formatting in action10m 57s
-
(Locked)
Dynamic disks8m 26s
-
(Locked)
New installation: First drive5m 12s
-
(Locked)
Software RAID in storage spaces9m 27s
-
(Locked)
Encrypting mass storage9m 16s
-
(Locked)
Maintaining storage disks5m 48s
-
(Locked)
-
-
(Locked)
Windows 10 editions and features6m 31s
-
(Locked)
Windows 11 editions and features4m 45s
-
(Locked)
Boot from everything11m 41s
-
(Locked)
Installing and upgrading Windows 105m 36s
-
(Locked)
Post-installation tasks11m 26s
-
(Locked)
Installing and updating Linux3m 24s
-
(Locked)
Upgrading macOS2m 15s
-
(Locked)
-
-
(Locked)
Understanding the CLI10m 50s
-
(Locked)
Navigating the CLI13m 30s
-
(Locked)
Working with folders6m 27s
-
(Locked)
Working with files10m 54s
-
(Locked)
Working with drives12m 52s
-
(Locked)
Super copy commands8m 21s
-
(Locked)
Command-line permissions7m 22s
-
(Locked)
Advanced Windows commands7m 41s
-
(Locked)
Advanced Linux commands11m 2s
-
(Locked)
Introduction to scripting9m 32s
-
(Locked)
Interpreted languages12m 12s
-
(Locked)
Scripting and the terminal9m 19s
-
(Locked)
-
-
(Locked)
Introduction to TCP/IP14m 10s
-
(Locked)
Network IDs and subnet masks4m 34s
-
(Locked)
Special IP addresses9m 14s
-
(Locked)
Network address translation (NAT)7m 11s
-
(Locked)
Dynamic IP addressing9m 39s
-
(Locked)
Working with connections9m 2s
-
(Locked)
Understanding DNS10m 56s
-
(Locked)
Working with DNS7m 3s
-
(Locked)
Windows naming6m 1s
-
(Locked)
Working with workgroups7m 26s
-
(Locked)
Working with active directory13m 38s
-
(Locked)
Windows sharing with macOS and Linux7m 6s
-
(Locked)
The net command4m 15s
-
(Locked)
Routers11m 24s
-
(Locked)
Basic router configuration11m 49s
-
(Locked)
Firewall configuration10m 38s
-
(Locked)
Windows firewall7m 44s
-
(Locked)
Port forwarding7m 12s
-
(Locked)
Advanced router configuration6m 6s
-
(Locked)
Virtual LANs (VLANs)8m 4s
-
(Locked)
-
-
(Locked)
Telnet and SSH6m 47s
-
(Locked)
Remote desktop connections7m 49s
-
(Locked)
The World Wide Web8m 55s
-
(Locked)
File Transfer Protocol (FTP)8m 18s
-
(Locked)
Proxy servers6m 12s
-
(Locked)
Virtual private networks (VPNs)7m 49s
-
(Locked)
Internet of Things (IoT)3m 36s
-
(Locked)
Troubleshooting internet connections: Part 16m 47s
-
(Locked)
Browser security9m 15s
-
(Locked)
-
-
(Locked)
Threats9m 37s
-
(Locked)
Dealing with threats7m 57s
-
(Locked)
Physical security8m 1s
-
(Locked)
Passwords and authentication13m 39s
-
(Locked)
Multifactor authentication (MFA)5m 2s
-
(Locked)
Malware13m 14s
-
(Locked)
Anti-malware11m 19s
-
(Locked)
Social engineering5m 40s
-
(Locked)
Licensing9m 25s
-
(Locked)
Incident response4m 54s
-
(Locked)
Environmental controls5m 36s
-
(Locked)
Malware in action7m 48s
-
(Locked)