Apr 18, 2024  
2023-2024 College Catalog 
    
2023-2024 College Catalog [ARCHIVED CATALOG]

Networking/Cyber Defense, AAS


Return to {$returnto_text} Return to: All programs by Department

Department: Computer Information Systems  

Program/Major Code: AASCOMPSYSAD/CSN2

CIP Code: 11.0901


Programs Learning Outcomes

Upon successful completion of the program, the learner will be able to:

  1. List the 7 layers of the OSI Reference Model and provide specific examples of protocols/concepts used at each layer. List 4 layers of the TCP/IP Protocol Suite and compare the two Models.

  2. Troubleshoot software and hardware problems on a personal computer (PC), install new PC component; develop skills required to research hardware components and their associated software drivers.
  3. Design a class A, B, or C  IPv4 networking scheme and be able to subnet the network based upon requirements for number of networks and number of hosts required.
  4. Based upon requirements, design a logical network(s), including IP networking scheme and placement of network services (e.g., DNS, DHCP, and Printing).
  5. Install, configure, and troubleshoot a Linux Operating System on a PC.
  6. Configure routers and switches to perform routing and maintain virtual LANs (VLANs) in a logical network.
  7. Configure and maintain Active Directory (AD) in a networked environment.
  8. Install, configure, and maintain a Windows OS (Operating System) on a PC.
  9. Configure & troubleshoot services (e.g., DNS, DHCP, routing, printing) in a networked environment.
  10. Given a network problem, develop a plan, use internet research, define options, and provide options for further study, leading to a problem solution.
  11. Explain the architecture for computer file storage systems (e.g., FAT), the process of how data is stored on a computer as binary code, and how the operating system or other programs locate files/information and interpret binary data.
  12. Discuss the need for data encryption, compare and contrast general encryption methods (e.g., Private vs. Public Key Encryption), and explain how hashing algorithms work in storing & protecting passwords & how the hashing process relates to the strength of a password.
  13. Compare and contrast malware types and anti-malware software used in the protection of computers and smart devices.

Semester Pathway

This pathway is a suggested sequence of courses for your program of study. Work with an advisor to develop a unique pathway for you based on your placement recommendations, any prior college courses, and your specific situation. The courses listed reflect the minimum requirements for this program. Designed for students who have completed prerequisites and have met college preparatory requirements in math, writing and reading.

General Education Note: Ensure that one general education CTE course fulfills one of the awareness categories:

Return to {$returnto_text} Return to: All programs by Department