CISK 347.115 – Summer 2014
Texas A&M University Central Texas
Data Communications
CISK 347.115
TR 2:30pm – 5:15pm
Location: FH 207
Instructor: Dr. Randy Brown
Office: FH – 323J
Phone: (254) 519- 5462
Preferred Classroom Communication Method: BlackBoard Messages
Email: rwbrown@ct.tamus.edu
Office Hours:
Location Mon Tues Wed Thurs Fri
FH 323J 16:00-18:00, and by appointment
12:00-14:00, and by appointment
16:00-18:00, and by appointment
12:00-14:00, and by appointment
By
Appointment
Virtual By
Appointment
By
Appointment
By
Appointment
By
Appointment
By
Appointment
Mode of instruction and course access:
TAMUCT Blackboard Learn System ( http://tamuct.blackboard.com
) will be our primary resource for the class information. You will use the Blackboard username and password communicated to you separately to logon to this system. The course syllabus, schedule, supplemental readings, class announcements, power point slides, learning modules, homework assignments, exams and other course related documents will be posted on blackboard. Each student is responsible for the posted material, and should check BlackBoard at least daily for updates. The course outline in this syllabus shows the basic schedule for the semester.
Student-instructor interaction:
Please send all course related correspondence through Blackboard messages. Please use
TAMUCT email only when Blackboard is not available (or for non-course related correspondence). I check email several times a day during the week and at least once during the weekends. I will attempt to respond within 24 hours and within 48 hours on Saturday through
Sunday. Please do not hesitate to stop by my office during the scheduled office hours or contact me via phone / blackboard email or TAMUCT email, if there are any personal problems or challenges that are hindering your regular progress in the course.
UNILERT
Emergency Warning System for Texas A&M University – Central Texas
UNILERT is an emergency notification service that gives Texas A&M University-Central Texas
CISK 347.115 – Summer 2014 the ability to communicate health and safety emergency information quickly via email and text message. By enrolling in UNILERT, university officials can quickly pass on safety-related information, regardless of your location. Please enroll today at TAMUCT.org/UNILERT
Course Information
1.0
Course Overview and description:
This course examines the management and utilization of data communication technologies including technical components, configurations, applications, protocols, legal issues, software and management issues, Local Area Network (LAN) technologies, and security issues. Prerequisite: CIS 501 or approval of department head. This is a cohort course with five mandatory class meetings as scheduled. Students missing any of the class meetings must consult with the professor.
1.1
Prerequisites: Significant experience with personal computers, word processing, spreadsheet, database, and presentation software.
1.2
Students are expected to read this document, and submit all coursework as required.
2.0
Course Objective:
2.1
Student Learning Outcomes
2.1.1
Demonstrate knowledge about a wide range of telecommunication technology and management
2.1.2
Evaluate work conditions and employment responsibilities in telecommunications.
2.1.3
Create material to demonstrate knowledge of telecommunications analysis tools
2.1.4
Develop an in depth detailed knowledge of the topic
2.1.5
Assess security trends and threats to telecommunications
3.0 Required Reading and Textbook(s):
Required Text: Applied Data Communications, James E. Goldman & Phillip T. Rawles
ISBN: 0471346403 4 th ed. Wiley
Note: A student of this institution is not under any obligation to purchase a textbook from a university-affiliated bookstore. The same textbook may also be available from an independent retailer, including an online retailer.
3.1
Supplementary Material: The course textbook may be supplemented with other materials including handouts, oral presentations, industry articles, videos, research paper readings, case studies, power point presentations etc.
3.2
On-Line References TBA
CISK 347.115 – Summer 2014
3.3
Students preferring to use their own computers are required to have products, data encodings, file names, system structure, and products equal to those provided in the computer lab and the server used in class.
3.4
Current publications: The campus library contains numerous books and periodicals relating to Computer Science. The student should take advantage of this resource by visiting the library.
.
4.0
Course Requirements:
4.1
Reading Assignments: All assigned chapters will be used as basis for class and/or blackboard discussions. Study the assigned readings before each class.
4.2
Participation/Discussion Questions: Class attendance is required. The policy as officially stated by the University will be enforced. Students are expected to make arrangements with the instructor before missing a series of classes due to job requirements. Students are responsible for any material missed during an absence. In all cases, the responsibility remains with the students to meet/obtain all course requirements/changes. If you are not present the class period your presentation is scheduled, the presentation grade is zero. Regular course progress is expected. It is each student’s responsibility to review the blackboard and syllabus for the latest information, assignments and examinations. NOTE:
Attendance will be taken each class period. Attendance will count as 20% (200
Points) of your total grade. NOTE: Blackboard Discussion questions will count toward participation.
4.2
Research Paper: Each Student will be required to write a Research Paper. In the required paper, students will select and explore a current topic/trend in technology or a specific career field in technology. It will consist of at least five double spaced pages (not including title page, table of contents, bibliography, appendixes, etc.) in length with 1” margins formatted in APA style. This is a professional paper – do not use informal language. Do not over quote your references, instead summarize what they say in your own words, and provide reference to the article. Every claim you make in the paper should have a peerreviewed academic reference. Wikipedia is NOT academic and should not be used unless it is unavoidable. The paper must be submitted in MS Word format
(.rtf, .doc, .docx). More information about the paper will be distributed by the 4 th week of class. There will be three preliminary deliverables worth 20 points each.
The final paper will be worth the remaining 140. (total: 200pts or 20%).
NOTE: I take a hard line on plagiarism. Plagiarism will not be tolerated.
Any paper containing plagiarism will be given a score of 0 and the student will be referred to Student Affairs for Academic Integrity Violation.
CISK 347.115 – Summer 2014
A grading rubric for the paper can be found in Appendix A: Research Paper
Rubric
4.3
Examinations: There will be a midterm and a final exam worth 200 points
(20%) each. Makeup exams will be given ONLY when arrangements have been made PRIOR to the class meeting. NOTE: Late exams will NOT be accepted.
4.4
Homework: Homework will be assigned after each chapter and is intended to reinforce the concepts discussed in class. Each homework assignment will be worth 20 points, but only the top 10 will count (200 points total).
4.5
Late Submissions: Homework Assignments will be considered late if submitted after the due date/time. Since a Summer session is very short, a late penalty of
10% per DAY (including weekends!) will be applied. That means that NO submissions will be accepted if submitted more than 10 days after the due date.
Any submissions AFTER 10 days will be considered lack of participation and will result in a lower participation score. In addition, discussions (if assigned) MUST be completed within the week during which the discussion is assigned (i.e. late discussions will NOT be allowed). Late tests will NOT be accepted!
NOTE: NO work will be accepted after the last day of “class” (7/25/2014).
4.6
Other Notes about assignments:
4.7.1
All assignments will be zipped prior to submission to BlackBoard – any unzipped assignments will not be accepted.
4.7.2
If there are multiple parts, submit all parts in a SINGLE zip file. I would suggest you create a folder for each assignment, then you can zip that entire folder at once…
4.7.3
Make sure all programs are labelled in a logical manner that makes it easy for me to figure out which program is which.
4.7.4
All assignments will be posted in BB with a value of 100 points, regardless of how many “points” they actually count toward your final grade.
5.0
Grading Criteria Rubric and Conversion
Assignment Points Percent My Grade Percentage Points Grade
Mid-Term Exam
Final Exam
200
200
20%
20%
90.0-100%
80.0-89.9%
900-1000
800-899
A
B
Term Paper
Homework
Participation
Total
200
200
20%
20%
200 20%
1000 100%
70.0-79.9% 700-799
60.0-69.9% 600-699
0-59.9% 0-599
C
D
F
CISK 347.115 – Summer 2014
6.0
Posting of Grades:
All student grades will be posted on the Blackboard Grade book and students should monitor their grading status through this tool. Grades for weekly assignments, discussions, quizzes and exams should be posted (no guarantees) within 5 days following the due date.
7.0
Technology Requirements and Support
7.1
This course will use the TAMU-CT Blackboard Learn learning management system for class communications, content distribution, and assessments. Logon to http://tamuct.blackboard.com
to access the course.
Username: Your Tarleton email address (the complete email address, e.g. john.doe@go.tarleton.edu)
Initial password: Your DuckTrax ID (UID)
For this course, you will need reliable and frequent access to a computer and to the Internet. You will also need a headset with a microphone or speakers and a microphone to be able to listen to online resources and conduct other activities in the course. If you do not have frequent and reliable access to a computer with
Internet connection, please consider dropping this course or contact me at rwbrown@ct.tamus.edu to discuss your situation.
Blackboard supports the most common operating systems:
PC: Windows 8, Windows 7, Windows Vista
Mac: Mac OS X 10.9 (Mavericks), 10.8 (Mountain Lion), and 10.7 (Lion)
NOTE: Computers using Windows XP, Windows 8 RT and OS X 10.6 or lower are NO longer supported!
Check browser and computer compatibility by following the “Browser Check” link on the TAMUCT Blackboard logon page. ( http://tamuct.blackboard.com
) This is a
CRITICAL step as these settings are important for when you take an exam or submit an assignment.
Upon logging on to Blackboard Learn, you will see a link to Blackboard Student
Orientation under My Courses tab. Click on that link and study the materials in this orientation course. The new Blackboard is a brand-new interface and you will have to come up to speed with it really quickly. This orientation course will help you get there. There is also a link to Blackboard Help from inside the course on the left-hand menu bar. The first week of the course includes activities and assignments that will help you get up to speed with navigation, sending and receiving messages and discussion posts, and submitting an assignment. Your ability to function within the Blackboard system will facilitate your success in this course.
CISK 347.115 – Summer 2014
Technology issues are not an excuse for missing a course requirement – make sure your computer is configured correctly and address issues well in advance of deadlines.
For technological or computer issues, students should contact the TAMU-CT
Blackboard Support Services 24 hours a day, 7 days a week:
Email: helpdesk@tamu.edu
Support Portal: http://www.ct.tamus.edu/bbsupport
Online chat:
Phone: (254)-519-5466
8.0
Complete Course Calendar (Subject to Change)
Class Date Chapter(s) Assignment(s) Due!
1
2
3-Jun
Syllabus/Introductions
Chapter 1
5-Jun Chapter 2
10-Jun Chapter 3
12-Jun Chapter 4
CISK 347.115 – Summer 2014
Syllabus Acknowledgement
Introduction Discussion
Chapter 1 Odd End of Chapter Review Questions
Chapter 2 Even End of Chapter Review Questions
Paper Topic Due
3
4
5
6
7
8
17-Jun Chapter 5
19-Jun Chapter 7
24-Jun Mid-Term "Review"
26-Jun
Mid-Term Exam
(Covers Chapters 1-5, 7)
1-Jul Chapter 6
3-Jul Chapter 8
8-Jul Chapter 9
10-Jul Chapter 10
15-Jul Chapter 11
17-Jul Chapter 12
22-Jul Final Exam "Review"
24-Jul
Chapter 3 Odd End of Chapter Review Questions
Chapter 4 Even End of Chapter Review Questions
Chapter 5 Odd End of Chapter Review Questions
Chapter 7 Odd End of Chapter Review Questions
Mid-Term Due
Paper Outline Due
Chapter 6 Even End of Chapter Review Questions
Chapter 8 Even End of Chapter Review Questions
Paper Rough Draft Due
Chapter 9 Odd End of Chapter Review Questions
Chapter 10 Even End of Chapter Review Questions
Chapter 11 Odd End of Chapter Review Questions
Final Paper Due
Chapter 12 Even End of Chapter Review Questions
Final Exam Due
Final Exam
(Covers Chapters 6, 8-12)
CISK 347.115 – Summer 2014
9.0
Drop Policy
If you discover that you need to drop this class, you must go to the Records Office and ask for the necessary paperwork. Professors cannot drop students; this is always the responsibility of the student. The record’s office will provide a deadline for which the form must be returned, completed and signed. Once you return the signed form to the records office and wait 24 hours, you must go into Duck Trax and confirm that you are no longer enrolled. Should you still be enrolled, FOLLOW-UP with the records office immediately? You are to attend class until the procedure is complete to avoid penalty for absence. Should you miss the deadline or fail to follow the procedure, you will receive an
F in the course.
10.0
Academic Integrity
Texas A&M University - Central Texas expects all students to maintain high standards of honor in personal and scholarly conduct. Any deviation from this expectation may result in a minimum of a failing grade for the assignment and potentially a failing grade for the course. All academic dishonesty concerns will be reported to the university's Office of Student Conduct. Academic dishonesty includes, but is not limited to, cheating on an examination or other academic work, plagiarism and improper citation of sources, using another student's work, collusion, and the abuse of resource materials. When in doubt on collaboration, citation, or any issue, please contact me before taking a course of action. More information can be found at
.
11.0
Disability Support Services
If you have or believe you have a disability and wish to self-identify, you can do so by providing documentation to the Disability Support Coordinator. Students are encouraged to seek information about accommodations to help assure success in their courses. Please cIf you have or believe you have a disability and wish to selfidentify, you can do so by providing documentation to the Disability Support
Coordinator. Students are encouraged to seek information about accommodations to help assure success in their courses. Please call (254) 501-5831 or visit Founder's
Hall 114, Suite 114. Additional information can be found at
.
12.0
Tutoring
CISK 347.115 – Summer 2014
Tutoring is available to all TAMUCT students, both on-campus and online. Subjects tutored include Accounting, Finance, Statistics, Mathematics, and Writing. Tutors are available at the Tutoring Center in Warrior Hall, Room 111. Visit www.ct.tamus.edu/AcademicSupport and click "Tutoring Support" for tutor schedules and contact info. If you have questions, need to schedule a tutoring session, or if you're interested in becoming a tutor, contact Academic Support Programs at 254-501-5830 or by emailing tutoring@ct.tamus.edu.
Chat live with a tutor 24/7 for almost any subject on your computer! Tutor.com is an online tutoring platform that enables TAMUCT students to log-in and receive FREE online tutoring and writing support. This tool provides tutoring in Mathematics, Writing,
Career Writing, Chemistry, Physics, Biology, Spanish, Calculus, and Statistics. To access
Tutor.com, log into your Blackboard account and click "Online Tutoring.”
Library Services
A&M-Central Texas students seeking information sources remotely by providing digital reference, online information literacy tutorials, and digital research materials.
Much of the TAMUCT collection is available instantly from home. This includes over half of the library's book collection, as well as approximately 25,000 electronic journals and 200 online databases. Library Distance Education Services are outlined and accessed at:
.
work in an information-centered society. Librarians will work with students in the development of critical reasoning, ethical use of information, and the appropriate use of secondary research techniques. Help may include, but is not limited to: the
14.0
exploration of information resources such as library collections, the identification of appropriate materials, and the execution of effective search strategies. Library
Resources are outlined and accessed at:
Grading. Grades are not given; the student earns them. Rubrics are employed whenever possible to assure that the grading of an individual assignment is consistent. There are always disagreements about the grade given to a work product and a student’s expectation; students are encouraged to make sound well-reasoned arguments as to why they should receive more points. Arguments that are not well-reasoned include:
1.
I need a better grade because I am on probation.
2.
I come from a good family.
3.
I will be deported.
4.
I will lose my scholarship.
5.
I think it is an A paper
CISK 347.115 – Summer 2014
15.0
Instructor’s Personal Statement:
1.
Instructor reserves the right to modify the syllabus during the course of the semester for the benefit of the students.
2.
Instructor reserves the right to supplement the material presented in the text with addition material that may benefit the students by either providing additional information or a different point of view.
3.
Instructor expects that the students will act in a curious and professional manner in all interactions with other students and the instructor.
4.
Instructor reserves the right to modify grading rubrics. Changes to grading rubrics are only made to current and/or future assignments.
5.
Any changes made will be announced in class and posted on BlackBoard.
CISK 347.115 – Summer 2014
Appendix A
Research Paper Rubric
NOTE: The total points will be adjusted to 140 (70%), so a 200 (max) will result in 70% of the paper grade – the remaining 30% comes from the preliminary deliverables as described in the assignments section of the syllabus.
Criteria
Focus on topic
Citations and
References
Spelling &
Grammar
Writing
Style
Points Exceeds Criteria Met Criteria
100
50
25
25
Papers that go above and beyond can receive up to
25 additional points
N/A
N/A
N/A
Paper clearly addresses the assigned topic =
100 points
Peer reviewed journals, APA format citations and references, unavoidable
URLs = 50 points
Active voice used, no spelling and no grammar problems. = 25 points
Writing is clear and academic.
No first person, no contractions, no informal language = 25 points
Partially Met
Criteria
Paper does not clearly address topic
= 80
Peer reviewed journals, but not APA format citations and references =
25 points
Less than ten spelling or grammar issues
(including use of passive voice) = 12 points
Less than three uses of informal language = 12 points
Did Not meet
Criteria
Paper does not meet the objectives of the assignment = 0 points
Not peer reviewed journals, or no citations, or
URLs used as references, or other problem =
0 points
More than ten spelling or grammar issues
(including use of passive voice) =
0 points
Use of first person or more than three uses of informal language = 0 points
CISK 347.115 – Summer 2014
Appendix A
Module Objectives
Module 0: Introduction
Objectives:
1.
Ensure students have access to all materials necessary for the class
2.
Ensure students have a clear understanding of what they can expect during the class
3.
Ensure students know what the instructor expects from them
4.
Introduce students and instructor to each other
Module 1: Introduction to Data Communications
Goldman/Rawles, Chapter 1
Objectives:
At the end of this module, students should be able to:
1.
Understand today's data communications industry as a system of interacting components
2.
Describe the current state of the data communications industry, as well as the major issues facing each of the industry's constituent components
3.
Discuss the challenges and solutions to business-oriented data communications analysis
4.
Understand the importance of structured models to successful business-oriented data communications analysis
5.
Describe the relationship of network analysis and design to information systems analysis and design
6.
Discuss career opportunities in data communications and the job skills required to succeed in this field
SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.3 Demonstrate knowledge about careers in networking
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 2: Data Comm Concepts
Goldman/Rawles, Chapter 2
Objectives:
At the end of this module, students should be able to:
1.
Identify organizations that set standards for networking
2.
Describe the purpose of the OSI model and each of its layers
3.
Explain specific functions belonging to each OSI model layer
4.
Understand how two network nodes communicate through the OSI model
CISK 347.115 – Summer 2014
5.
Discuss the structure and purpose of data packets and frames
6.
Describe the two types of addressing covered by the OSI model
SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.2 Describe the OSI Model Layers and Protocols.
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 3: The Physical Layer
Goldman/Rawles, Chapter 3
Objectives:
At the end of this module, the student should be able to:
1.
Explain basic data transmission concepts, including full duplexing, attenuation, latency, and noise
2.
Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media
3.
Compare the benefits and limitations of different networking media
4.
Explain the principles behind and uses for serial cables
5.
Identify wiring standards and the best practices for cabling buildings and work areas
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 4: The DataLink Layer
Goldman/Rawles, Chapter 4
Objectives:
At the end of this module, the student should be able to:
1.
Identify and explain the functions of the core TCP/IP protocols
2.
Explain the TCP/IP model and how it corresponds to the OSI model
3.
Discuss addressing schemes for TCP/IP in IPv4 and IPv6 and explain how addresses are assigned automatically using DHCP (Dynamic Host Configuration Protocol)
4.
Describe the purpose and implementation of DNS (Domain Name System)
5.
Identify the well-known ports for key TCP/IP services
6.
Describe how common Application layer TCP/IP protocols are used
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
CISK 347.115 – Summer 2014
2.1.2 Describe the Application Layers and Protocols.
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 5: Voice Communications
Goldman/Rawles, Chapter 5
Objectives:
At the end of this module, the student should be able to:
1.
Describe the underlying technical concepts for voice transmission, voice digitization, voice compression, and data/voice integration (convergence)
2.
Define and compare available voice-related technology including PBXs, voice digitizers, and voice/data multiplexers and modems
3.
Know and describe the functionality, standards, business impact, and technology involved with computer telephony integration
4.
Discuss the functionality, concepts, standards, business impact, and technology involved with voice network services, voice transmission alternatives, and voice/data integration
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.2 Describe the OSI Layers and Protocols
2.1.3 Demonstrate knowledge about careers in networking
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 6: Network, Transport, & Session Layers; LANs
Goldman/Rawles, Chapter 7
Objectives
At the end of this module, the student should be able to:
1.
Describe protocol encapsulation
2.
Discuss address resolution and its role in the delivery of data
3.
Compare and contrast frames and packets
4.
Describe the network, transport and session layers of the OSI Model
5.
Differentiate between connectionless and connection-oriented protocols
6.
Compare and contrast the IPX/SPX protocols and TCP/IP protocols
7.
Describe the applications and limitations of the NetBEUI and DLC communications protocols
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.2 Describe the OSI Layers and Protocols
CISK 347.115 – Summer 2014
2.1.3 Demonstrate knowledge about careers in networking
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 7: WANs
Goldman/Rawles, Chapter 6
Objectives:
At the end of this module, the student should be able to:
1.
Discuss drivers and issues surrounding WAN design and network convergence
2.
Describe the advantages and limitations of WAN technologies
3.
Demonstrate and understanding of WAN standards
4.
Describe interrelationships and dependencies of WAN architecture components
5.
Compare and contrast x.25, frame relay, cell relay, ATM, MPLS, SONET and other WAN concepts
6.
Discuss the digital services hierarchy
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.2 Describe the OSI Layers and Protocols
2.1.3 Demonstrate knowledge about careers in networking
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 8: Network Design
Goldman/Rawles, Chapter 8
Objectives:
At the end of this module, the student should be able to:
1.
Describe the IP routing process and the difference between routing and layer 3 switching
2.
Define proper classful and variable length subnet masks for a given IP address that will meet network design requirements
CISK 347.115 – Summer 2014
3.
Describe the advantages and proper use of variable length subnet masking and classless inter-domain routing addresses
4.
Describe IPv6 protocols and methods of transitioning to IPv6
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.2 Describe the OSI Layers and Protocols
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 9: LAN Operating Systems and Remote Access
Goldman/Rawles, Chapter 9
Objectives:
At the end of this module, the student should be able to:
1.
Describe the basics of network operating systems functionality and the implementation of
LAN software
2.
Compare peer-to-peer and client/server, operating systems architectures
3.
Describe the roles of client network operating systems and the universal client
4.
Describe how to analyze functional networking requirements and match those requirements to available technology
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 10: The Network Development Life Cycle
Goldman/Rawles, Chapter 10
Objectives:
At the end of this module, the student should be able to:
1.
Compare the network development life cycle (NDLC) to other systems development architectures and life cycles
2.
Explain the NDLC including: overall issues, process structure, detailed activates of each step, coping with multiprotocol/multivendor environments
3.
Describe the advantages, disadvantages, and costs of NDLC tools available
4.
Explain the stages of the NDLC and the role of vendors at each stage
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.2 Describe the OSI Layers and Protocols
CISK 347.115 – Summer 2014
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 11: Network Management
Goldman/Rawles, Chapter 11
Objectives:
At the end of this module, the student should be able to:
1.
Describe the business motivations and forces at work in the current systems administration and network management arena
2.
Contrast the differences between systems administration and network management processes and where/how they may be implemented effectively
3.
Describe the protocols and technology associated with each area of systems administration and network management
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.4 Demonstrate knowledge of security as it applies to networks
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts
Module 12: Network Security
Goldman/Rawles, Chapter 12
Objectives:
At the end of this module, the student should be able to:
1.
Describe the concepts, protocols, standards, and technology related to Network Security, such as: virus protection, firewalls, authentication, encryption, etc.
4.
Discuss the processes involved with developing and implementing a comprehensive security policy and architecture management
Course SLO(s) Targeted:
2.1.1 Define fundamental Network terms, and protocols
2.1.4 Demonstrate knowledge of security as it applies to networks
CISK 347.115 – Summer 2014
2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts