This is an archived copy of the 2013 Catalog. To access the most recent version of the catalog, please visit http://catalog.jccc.edu.

Information Technology - Networking, A.A.S.

Information technology connects people, departments and companies for communication purposes. The technology of local area networks gives employees the ability to share and retrieve information at the group level. Combining local area networks with the Internet and telecommunications resources gives employees unlimited intranet access to information throughout the company and beyond. The associate of applied science degree in information technology provides students with a foundation in designing, installing and implementing computer networking resources. Course requirements include network operations and product-specific requirements for Windows, Linux and Cisco.

(Major Code 2330; State CIP Code 11.0901)

Associate of Applied Science Degree

First Semester

IT 140Networking Fundamentals4
IT 205Implementing Windows Client3
IT 230Linux Fundamentals3
ENGL 121Composition I*3
Social Science and/or Economics Elective ^3
Total Hours16

^

Social Science and/or Economics Elective

Second Semester

IT 221Windows Server*3
IT 209LAN Switching*4
IT 145Routing Protocols and Concepts*3
MATH 171College Algebra*3
ENGL 122Composition II*3
or ENGL 123 Technical Writing I*
Total Hours16

Third Semester

Technical Elective (see below)3
IT 225Windows Active Directory Services*3
IT 231Linux Administration*3
IT 247Accessing Wide Area Networks*3
Humanities Elective ^3
Health and/or Physical Education Elective ^^1
Total Hours16

^

Humanities Elective

^^

Health and/or Physical Education Elective

Fourth Semester

Technical Electives (see below)6
IT 245Network Infrastructure*3
IT 251Network Security Fundamentals*4
SPD 121Public Speaking3
or SPD 125 Personal Communication
Total Hours16

Technical Elective

CS 134Programming Fundamentals4
CPCA 121Introduction to Project Management*1
ELEC 126Microcomputer A+ Preparation4
ELEC 185LAN Cabling and Installation3
ELEC 250Microcomputer Maintenance*3
IT 203Voice Over IP Fundamentals*4
IT 228Exchange Server*3
IT 232Linux Networking*4
IT 233Linux Advanced Administration4
IT 249Advanced Routing*3
IT 250Networking Seminar*3
IT 253Advanced Switching*3
IT 256Windows Security*4
IT 271Information Technology Internship I*3
IT 272Information Technology Internship II*3
IT 292Special Topics:*1-3

Total Program Hours: 64

Courses

IT 140   Networking Fundamentals (4 Hours)

This course is a replacement for the IT 200 Networking Technologies course. It serves as the first module of four that are designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification. Cisco updated its curriculum for the first course and included VLSM and basic router configuration from the second course. This necessitated the need to expand this course. The basis for this course is still IT 200, Networking Technologies, with the addition of this new material. In that router configuration is a skill that is required in all of the other Cisco CCNA classes, it is imperative that the students learn the skill in this course. Therefore the increase in credit hours is associated with the need to learn this skill. 3 hrs. lecture 2 hrs. open lab/wk.

IT 145   Routing Protocols and Concepts (3 Hours)

Prerequisites: IT 200 or IT 140

This course is designed to provide students with a fundamental understanding of network routing and the operation of routers. It maps to the Cisco Academy Routing Protocols and Concepts course of the Cisco Certified Network Associate Exploration curriculum. Topics covered include router components, accessing routers, working with Cisco Internetworking Operating System (IOS), configuring static and dynamic routing. Students will configure common routing protocols such as Routing Information Protocol versions 1 and 2, Enhanced Interior Gateway Routing Protocol, and Open Shortest Path First. Students will design and implement IP addressing schemes using subnetting, Variable Length Subnet Mask, and Classless Inter Domain Routing. Laboratory exercises will accompany lectures. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 203   Voice Over IP Fundamentals (4 Hours)

Prerequisite: IT 145

This course is designed to provide students with the fundamentals of Voice over IP (VoIP) networking technology. Concepts covered include an explanation of the national voice and data network, telephony terminology, VoIP protocol analysis and telephony survey techniques. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 205   Implementing Windows Client (3 Hours)

The focus of this course is the use of Microsoft Windows as an operating system in a business environment. Planning a simple network system, installation and configuration of the software and hardware, resource management, connectivity, running application software under Windows, monitoring and optimizing system hardware, and troubleshooting all lead the student to a deeper understanding of local area network use and administration. 2 hrs. lecture, 3 hrs. lab/wk.

IT 209   LAN Switching (4 Hours)

Prerequisite: IT 140 or IT 200

This course is designed to provide students with the necessary knowledge and skills to interconnect and configure network switches. Students successfully completing this course should be able to perform basic switch administration tasks including installing, configuring and troubleshooting. Students will build Local Area Networks (LANs) based on the hierarchical design model supported by Virtual LANs (VLANs) and the Spanning Tree Protocol (STP). This course maps to one of four modules designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification.

IT 221   Windows Server (3 Hours)

Prerequisites: IT 205

This course is designed to provide students with the knowledge and skills to perform competently in the role of a network administrator utilizing the Windows network operating system. Students completing this course will be able to accomplish basic fundamental network management tasks, including planning server roles and subsequent requirements, planning the network file system, implementing user accounts and file system security, implementing network printing, and managing the network servers. 2 hrs. lecture, 3 hrs. lab/wk.

IT 225   Windows Active Directory Services (3 Hours)

Prerequisite: IT 221

The focus of this course is using Microsoft Windows Server or Advanced Server software to install, configure and troubleshoot Active Directory components, Domain Name Space (DNS) for Active Directory and Active Directory security solutions. The course also emphasizes the skills required to manage, monitor and optimize the desktop environment using Group Policy. 2 hrs. lecture, 3 hrs. lab/wk.

IT 228   Exchange Server (3 Hours)

Prerequisite: IT 225

This course is designed to provide network administrators with information that enhances their ability to manage an Exchange server network. Included are topics related to server and client mail management and server performance, e-mail concepts and advanced Internet networking. 3 hrs. lecture, 2 hrs. lab/wk.

IT 230   Linux Fundamentals (3 Hours)

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to execute common Linux commands and utilities; and accomplish system tasks such as navigating the file system, applying file system security, managing user accounts, using the printing environment, and utilizing the resources of a basic Linux system. 2 hrs. lecture, 3 hrs. lab/wk.

IT 231   Linux Administration (3 Hours)

Prerequisite: IT 230

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including installing, configuring and troubleshooting a basic Linux system, managing devices, implementing the printing environment, installing software packages, and configuring the graphical user interface. 2 hrs. lecture, 3 hrs. lab/wk.

IT 232   Linux Networking (4 Hours)

Prerequisite: IT 231

This course is designed to provide students with information that enhances their ability to manage Linux systems in a networked environment. Included are topics related to configuring and managing network connectivity, and the installation, configuration, and securing of network services. 3 hrs. lecture, 2 hr. lab/wk.

IT 233   Linux Advanced Administration (4 Hours)

rerequisite: IT 231

This course is designed to provide students with the skills and techniques to perform advanced administration tasks in a networked Linux environment. Topics will include compiling the Linux kernel, configuring advanced storage solutions, customizing system startup processes, and managing advanced network connections. 3 hrs. lecture, 2 hrs. lab/wk.

IT 245   Network Infrastructure (3 Hours)

Prerequisite: IT 221

This course is designed to provide an in-depth understanding of the ability to install, manage, monitor, configure and troubleshoot DNS, DHCP, Remote Access, Network Protocols, IP Routing and WINS in a Windows 2000 network infrastructure. In addition, it will provide an in-depth understanding of the ability to manage, monitor and troubleshoot Network Address Translation and Certificate Services. Laboratory exercises will accompany the lectures. 2 hrs. lecture, 3 hrs. lab/wk.

IT 247   Accessing Wide Area Networks (3 Hours)

Prerequisites: IT 209 and (IT 145 or IT 246)

This course is designed to provide students a fundamental understanding of internetworking. Topics include Local Area Network (LAN) segmentation using routers. Wide Area Network (WAN) physical technologies will be studied. Configuring WAN protocols using Point-to-Point Protocol (PPP), Integrated Services Digital Network (ISDN) and Frame Relay will be presented. Securing the network with standard and extended access lists will be performed. Programming and configuration will be conducted using Cisco routers and switches. Laboratory exercises will accompany lectures. 2 hrs. lecture, 3 hrs. lab/wk.

IT 249   Advanced Routing (3 Hours)

Prerequisite: IT 247

This course provides advanced instruction of Cisco routers found in medium to large networks. It is intended for students preparing for advanced Cisco certification. Upon completion of this course, the student will be able to select and implement the appropriate Cisco services required to build a scalable router network. Topics covered include extending IP addressing, implementing OSPF for a single area and multiple areas, configuring EIGRP, and implementing BGP. This course will follow semester five in the Cisco Networking Academy curriculum.

IT 250   Networking Seminar (3 Hours)

Prerequisite: IT 225 and IT 247

This course is designed to teach advanced concepts in information technology. Topics covered are section specific and include e-mail servers, Web servers, database servers, routing, switching and advanced LAN design concepts. Prerequisites are posted for each section. Students may use this course as a capstone for applying concepts and procedures developed in previous courses using realistic business scenarios. 2 hrs. lecture, 3 hrs. lab/wk.

IT 251   Network Security Fundamentals (4 Hours)

Prerequisite: IT 247

This course is designed to provide students with a fundamental understanding of network security principles and implementation. Topics covered include authentication, the types of attacks and malicious code that may be used against computer networks, the threats and countermeasures for e-mail, Web applications, remote access, and file and print services. A variety of security topologies will be discussed as well as technologies and concepts used for providing secure communication channels, secure internetworking devices, intrusion detection systems, and firewalls. Hands-on exercises will be used to reinforce the concepts. 3 hrs. lecture, 2 hrs. lab/wk.

IT 253   Advanced Switching (3 Hours)

Prerequisite: IT 247

This course provides advanced instruction of Cisco switches found in medium to large networks. It introduces students to the deployment of the state-of-the art campus Local Area Networks (LAN). The course focuses on the selection and implementation of the appropriate Cisco Internetworking Operating System (IOS) services to build reliable scalable multilayer-switches LANs. Students will develop skills with Virtual LANs (VLAN), Virtual Trunking Protocol (VTP), Spanning Tree Protocol (STP), inter-VLAN routing, redundancy, Quality of Service (QoS) issues, campus LAN security, and transparent LAN services.

IT 256   Windows Security (4 Hours)

Prerequisites: IT 225 and IT 245

This course is designed to provide students with the skills and techniques to properly secure a Windows network. The topics will include building a Windows Active Directory infrastructure, securing the Windows Active Directory infrastructure and penetrating the infrastructure with current hacking tool kits. This course serves as a capstone course in the Windows track of the Information Technology Department. It is the last course in a series of six Windows classes. It takes concepts and skills learned in the pre-requisite Windows courses and ties them together focusing on securing a Windows network. 3 hrs. lecture, 2 hrs. lab/wk.

IT 271   Information Technology Internship I (3 Hours)

Prerequisites: IT 210 or IT 221 or IT 230 and department approval

This course affords the student the opportunity to apply classroom knowledge to an actual work environment. It will provide advanced information technology students with appropriate on-the-job experience with area employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours a semester at an approved job site.

IT 272   Information Technology Internship II (3 Hours)

Prerequisites: IT 271 and department approval

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

IT 292   Special Topics: (1-3 Hour)

Prerequisite: Department approval

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit; but only on different topics.

IT 140

  • Title: Networking Fundamentals
  • Number: IT-140
  • Effective Term: Spring 2013
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Lab Hours: 2

Description:

This course is a replacement for the IT 200 Networking Technologies course. It serves as the first module of four that are designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification. Cisco updated its curriculum for the first course and included VLSM and basic router configuration from the second course. This necessitated the need to expand this course. The basis for this course is still IT 200, Networking Technologies, with the addition of this new material. In that router configuration is a skill that is required in all of the other Cisco CCNA classes, it is imperative that the students learn the skill in this course. Therefore the increase in credit hours is associated with the need to learn this skill. 3 hrs. lecture 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe, identify, and implement basic networking functions.
  2. Compare and contrast the setup of different pieces of network hardware.
  3. Identify and describe the application protocols in the upper three layers of the OSI model.
  4. Compare and contrast the TCP (Transmission Control Protocol) and the UDP (User Datagram Protocol) protocols of the OSI transport layer.
  5. Identify and describe the OSI network layer protocols.
  6. Explain the structure of IP addressing and demonstrate the ability to convert between the different numbering schemes used in computing.
  7. Identify and describe the OSI data link layer protocols and the process of encapsulation.
  8. Explain the functioning of the physical layer protocols and services and compare and contrast the different physical layer media.
  9. Describe and identify the components of Ethernet.
  10. Compare and contrast the different network types and identify the different cabling types.
  11. Use the Cisco IOS (Internetwork Operating System) to configure, test, and view information on routers on a network. 

Content Outline and Competencies:

   I. Basic Networking
      A. Describe how networks impact our daily lives.
      B. Describe the role of data networking in the human network.
      C. Identify the key components of any data network.
      D. Identify the opportunities and challenges posed by converged
networks.
      E. Describe the characteristics of network architectures: fault
tolerance, scalability, quality of service and security.
      F. Configure hosts and services.
      G. Add, configure, and connect hosts and servers.
      H. Explore how DNS Domain Name System) and HTTP (HyperText Tranfer
Protocol) work together.
      I. View the details of packets generated by DNS and HTTP using the
emulation software provided.

  II. Network Hardware and Components
      A. Identify the devices that make up the network.
      B. Describe the media that connect the devices.
      C. Explain the messages that are carried across the network.
      D. Compare and contrast the rules and processes that govern network
communications.
      E. Identify the tools and commands for constructing and maintaining
networks.
      F. Connect and configure hosts and services on the model of the lab
network.
      G. Explore how DNS, UDP, HTTP, and TCP work together.
      H. View the operation of DNS, UDP, HTTP, and TCP on the model of the
lab network using a common utility.

 III. Upper Three Layers of the OSI Model
      A. Describe how the functions of the three upper OSI model layers
provide network services to end user applications.
      B. Describe how the TCP/IP application layer protocols provide the
services specified by the upper layers of the OSI model.
      C. Define how people use the application layer to communicate across
the information network.
      D. Describe the function of well-known TCP/IP applications, such as
the World Wide Web and email, and their related services (HTTP, DNS, SMB
(Server Message Block), DHCP (Dynamic Host Configuration Protocol), SMTP
(Simple Mail Transfer Protocol)/POP (Post Office Protocol), and Telnet).
      E. Describe file-sharing processes that use peer-to-peer
applications.
      F. Explain how protocols ensure services running on one kind of
device can send to and receive data from many different network devices.
      G. Use network analysis tools to examine and explain how common user
applications work.
      H. Use the route command to modify a Windows computer routing
table.
      I. Use the Windows client command telnet to connect to a Cisco
router.
      J. Examine router routes using basic Cisco IOS commands.

  IV. OSI Transport Layer
      A. Explain the need for the Transport layer.
      B. Identify the role of the Transport layer as it provides the
end-to-end transfer of data between applications.
      C. Describe the role of two TCP/IP Transport layer protocols: TCP
and UDP.
      D. Explain the key functions of the Transport layer, including
reliability, port addressing, and segmentation.
      E. Explain how TCP and UDP each handle key functions.
      F. Identify when it is appropriate to use TCP or UDP and provide
examples of applications that use each protocol.
      G. Configure a router interface using a GUI (Graphical User
Interface). 
      H. Explore a routing table. 
      I. Configure a static route using a GUI. 
      J. Explore the routing of IP packets.

   V. OSI Network Layer
      A. Identify the role of the Network layer as it describes
communication from one end device to another end device.
      B. Explain the most common Network layer protocol, Internet Protocol
(IP), and its features for providing connectionless and best-effort
service.
      C. Identify the principles used to guide the division, or grouping,
of devices into networks.
      D. Explain the hierarchical addressing of devices and how this
allows communication between networks.
      E. Describe the fundamentals of routes, next-hop addresses, and
packet forwarding to a destination network.

  VI. IP Addressing and Computer Numbering Schemes
      A. Explain the structure IP addressing and demonstrate the ability
to convert between 8-bit binary and decimal numbers.
      B. Classify by type a given IPv4 address and describe how it is used
in the network.
      C. Explain how addresses are assigned to networks by ISPs (Internet
Service Provider) and within networks by administrators.
      D. Determine the network portion of the host address and explain the
role of the subnet mask in dividing networks.
      E. Given IPv4 addressing information and design criteria, calculate
the appropriate addressing components.
      F. Use common testing utilities to verify and test network
connectivity and operational status of the IP protocol stack on a host or
network.
      G. Subnet an address space given requirements.
      H. Assign appropriate addresses to interfaces and document.
      I. Configure and activate Serial and FastEthernet interfaces.
      J. Test and verify configurations.
      K. Document the network implementation.

 VII. OSI Data Link Layer
      A. Explain the role of Data Link layer protocols in data
transmission. 
      B. Describe how the Data Link layer prepares data for transmission
on network media. 
      C. Describe the different types of media access control methods. 
      D. Identify several common logical network topologies and describe
how the logical topology determines the media access control method for
that network. 
      E. Explain the purpose of encapsulating packets into frames to
facilitate media access. 
      F. Describe the Layer 2 frame structure and identify generic
fields.
      G. Explain the role of key frame header and trailer fields,
including addressing, QoS (Quality of Service), type of protocol, and
Frame Check Sequence.
      H. Plan the IP Subnet scheme.
      I. Build the Network from your plan. 
      J. Connect devices with Ethernet and serial cables.
      K. Configure the network.
      L. Apply your subnetting scheme to server, PCs, and router
interfaces; configure services and static routing.
      M. Test the network using common utilities.

VIII. OSI Physical Layer
      A. Explain the role of Physical layer protocols and services in
supporting communication across data networks.
      B. Describe the purpose of Physical layer signaling and encoding as
they are used in networks.
      C. Describe the role of signals used to represent bits as a frame is
transported across the local media.
      D. Identify the basic characteristics of copper, fiber, and wireless
network media.
      E. Describe common uses of copper, fiber, and wireless network
media.
      F. Build, test, and configure the entire lab network. 
      G. Analzye the events involved in requesting a web page (DNS, ARP
(Address Resolution Protocol), HTTP, TCP, IP, Ethernet, HDLC (High-Level
Data Link Control)). 
      H. Trace the route to the  web server (DNS, UDP, ARP, ICMP (Internet
Control Message Protocol), IP, Ethernet, HDLC).

  IX. Ethernet
      A. Describe the evolution of Ethernet.
      B. Explain the fields of the Ethernet Frame.
      C. Describe the function and characteristics of the media access
control method used by the Ethernet protocol.
      D. Describe the Physical and Data Link layer features of Ethernet.
      E. Compare and contrast Ethernet hubs and switches.
      F. Explain the Address Resolution Protocol (ARP).
      G. Plan the IP Subnet scheme.
      H. Build the Network from your plan. 
      I. Connect devices with Ethernet and serial cables. 
      J. Configure the network.
      K. Apply your subnetting scheme to server, PCs, and router
interfaces; configure services and static routing.
      L. Test the network using common utilities.

   X. Different  Network and Cabling Types
      A. Identify the basic network media required to make a LAN
connection.
      B. Identify the types of connections for intermediate and end device
connections in a LAN.
      C. Identify the pinout configurations for straight-through and
crossover cables.
      D. Identify the different cabling types, standards, and ports used
for WAN connections.
      E. Define the role of device management connections when using Cisco
equipment.
      F. Design an addressing scheme for an internetwork and assign ranges
for hosts, network devices, and the router interface. 
      G. Compare and contrast the importance of network designs.
      H. Plan the IP subnet scheme.
      I. Repair Ethernet-related network issues.
      J. Test the network using common utilities.

  XI. The Cisco IOS
      A. Define the role of the Internetwork Operating System (IOS).
      B. Define the purpose of a configuration file.
      C. Identify several classes of devices that have the IOS embedded.
      D. Identify the factors contributing to the set of IOS commands
available to a device.
      E. Identify the IOS modes of operation.
      F. Identify the basic IOS commands.
      G. Compare and contrast the basic show commands.
      H. Plan the IP Subnet scheme.
      I. Build the Network from your plan. 
      J. Connect devices with Ethernet and serial cables. 
      K. Configure the network.
      L. Apply your subnetting scheme to server, PCs, and router
interfaces; configure services and static routing.
      M. Test the network using common utilities.

Method of Evaluation and Competencies:

Hands on labs = 25 - 35% 
Quizzes = 25 - 35% 
Performance Tests = 25 - 35% 
Final  =  10 - 15% 
   
90 - 100%  =  A
80 - 89% = B
70 - 79% = C
60 - 69% = D
Below 60% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 145

  • Title: Routing Protocols and Concepts*
  • Number: IT-145
  • Effective Term: Spring 2010
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 3
  • Lab Hours: 2

Description:

Prerequisites: IT 200 or IT 140

This course is designed to provide students with a fundamental understanding of network routing and the operation of routers. It maps to the Cisco Academy Routing Protocols and Concepts course of the Cisco Certified Network Associate Exploration curriculum. Topics covered include router components, accessing routers, working with Cisco Internetworking Operating System (IOS), configuring static and dynamic routing. Students will configure common routing protocols such as Routing Information Protocol versions 1 and 2, Enhanced Interior Gateway Routing Protocol, and Open Shortest Path First. Students will design and implement IP addressing schemes using subnetting, Variable Length Subnet Mask, and Classless Inter Domain Routing. Laboratory exercises will accompany lectures. 3 hrs. lecture, 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the functions and features of a router.
  2. Explain the route lookup process and determine the path packets will take in the network.
  3. Evaluate the characteristics of routing protocols.
  4. Perform, save and test an initial configuration on a Cisco IOS (Internetwork Operating System) based router.
  5. Describe, configure and verify static and default routing.
  6. Implement an addressing scheme in a network.
  7. Describe, configure, verify, analyze and troubleshoot single area RIPv2 (Routing Information Protocol) on a Cisco router.
  8. Describe, configure, verify, analyze and troubleshoot EIGRP (Enhanced Interior Gateway Routing Protocol) on a Cisco router.
  9. Describe, configure, verify, analyze and troubleshoot single area OSPF (Open Shortest Path First) on a Cisco router. 

Content Outline and Competencies:

   I. Introduction to Routing and Packet Forwarding
      A. Describe the functions and features of a router.
      B. Describe how a router determines a path and switches packets.
      C. Use CLI (Command Line Interface) to perform and verify initial
configuration tasks for a small routed network.

  II. Static Routing
      A. Configure and verify basic router operation.
      B. Describe, configure and verify static routing.
      C. Describe, configure and verify summary routes and default
routing.

 III. Dynamic Routing Protocols
      A. Describe the role of dynamic routing protocols and place these
protocols in the context of modern network design.
      B. Compare and contrast distance-vector and link-state routing
protocol operation.
      C. Describe the basic structure of the routing table.
  IV. Distance Vector Routing Protocols
      A. Describe the operation of distance-vector routing protocols and
their role in network operations.
      B. Describe the network discovery process of distance-vector routing
protocols using Routing Information Protocol (RIP).
      C. Describe the processes for maintaining accurate routing tables
that are used by distance-vector routing protocols.
      D. Identify the conditions leading to a routing loop and explain the
implications for router performance.

   V. RIPv1
      A. Describe the basic characteristics and operation of RIPv1.
      B. Configure RIPv1 in a small network.
      C. Modify the default configuration of RIPv1.
      D. Verify and troubleshoot RIPv1.

  VI. VLSM (Variable Length Subnet Mask) and CIDR (Classless Inter Domain
Routing)
      A. Compare and contrast classful and classless IPv4 addressing.
      B. Design and implement a classless IPv4 addressing scheme for a
given network.
      C. Troubleshoot and correct common IPv4 address issues.

 VII. RIPv2
      A. Compare and contrast the basic characteristics and operation of
RIPv1 and RIPv2.
      B. Configure and modify the default behavior of RIPv2 in a small
network.
      C. Verify and troubleshoot RIPv2.

VIII. Routing Tables
      A. Describe the various route types found in the routing table
structure.
      B. Describe the route lookup process.
      C. Interpret routing table output to determine the types of routes.

  IX. EIGRP
      A. Describe the basic characteristics and operation of EIGRP.
      B. Configure EIGRP.
      C. Modify the default configuration of EIGRP.
      D. Verify and troubleshoot EIGRP.

   X. Link-State Routing Protocols
      A. Describe the features and basic operation of link-state routing
protocols.
      B. Compare and contrast link-state routing protocol operation to
distance-vector routing protocol operation.
  
  XI. OSPF
      A. Describe the basic characteristics and operation of single area
OSPF.
      B. Configure single area OSPF.
      C. Modify the default configuration of single area OSPF.
      D. Verify and troubleshoot single area OSPF.

Method of Evaluation and Competencies:

Hands on labs = 40 - 55%
Quizzes = 30 - 45%
Final = 10 - 20%
  
90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
Below 60% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 203

  • Title: Voice Over IP Fundamentals*
  • Number: IT-203
  • Effective Term: Fall 2010
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 145

This course is designed to provide students with the fundamentals of Voice over IP (VoIP) networking technology. Concepts covered include an explanation of the national voice and data network, telephony terminology, VoIP protocol analysis and telephony survey techniques. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the history and advent of telephony.
  2. Define specialized VoIP, PBX and Public Voice and Data network terminology.
  3. Explain the basics of internal telephone systems environment and peripherals.
  4. Identify and explain network service providers and local competition.
  5. Explain the public voice and data network infrastructure.
  6. Define specialized network services.
  7. Outline the basics of analog, cable TV, digital modems and set-top boxes.
  8. Define and analyze VoIP protocols.
  9. Explain telephony corporate user applications.
  10. Learn how to define user applications by telephony survey methods.
  11. Demonstrate VoIP programming fundamentals. 

Content Outline and Competencies:

I. History and Advent of Voice and Data Telephony
   A. Review Public Switch Telephone Network history and key events
   B. Review PBX System vendors, history and key events
   C. Review Internet history and key events
   D. Review VoIP vendors, history and key events

II. VoIP, PBX and Public Voice and Data Network Terminology
   A. Identify system wide features, capabilities and components
   B. Identify Attendant features, capabilities and components
   C. Identify user features, capabilities and component
   D. Identify special features, capabilities and component

III. Basics of Internal Telephone Systems Environment and Peripherals
   A. Define parameters of an internal telephone system for small to
mid-size companies
   B. Define parameters of an internal telephone system a large company
   C. Define parameters of an internal telephone system a enterprise
company environment

IV. Network Service Providers and Local Competition
   A. Identify and define the national public switch telephone network
   B. Identify and define the national public data network
   C. Identify and define the local voice and data network

V. Public Voice and Data Network Infrastructure
   A. Identify the parameters, boundaries and infrastructure of the public
switch network  
   B. Identify the parameters, boundaries and infrastructure of the
Internet
   C. Identify the parameters, boundaries and infrastructure of the local
telecos

VI. Specialized Network Services
   A. Review and define special voice telephone applications
   B. Review and define special VoIP applications

VII. Basics of Analog, Cable TV, Digital Modems and Set-top Boxes
   A. Explain analog to digital transmission
   B. Review peripherals NT1s, CSUs and cable modems
   C. Review cable voice and data networks.

VIII. Define and Analyze VoIP Protocols
   A. Define and explain VoIP public network protocols
   B. Define and explain VoIP LAN network protocols
   C. Define and explain VoIP user protocols

IX. Telephony Corporate User Applications
   A. Review corporate user telephony internal applications Automatic Call
Distribution, Unified Messaging, Voice Mail and other applications
   B. Review corporate user telephony external applications enterprise
networks, ISDN, T-1s and other applications

X. User Applications by Telephony Survey Methods and Implementation of a
VoIP Network
   A. Develop a plan to survey corporate users, attendants and executive
staff
   B. Learn to assemble survey results
   C. Present survey results and cost justifications to management

XI. VoIP Programming Fundamentals
   A. Demonstrate programming a VoIP Call Manager to the Public Switch
Telephone Network
   B. Demonstrate programming a VoIP Voice Mail Manager and associated
telephone extension

Method of Evaluation and Competencies:

Assessment Test      50%
Quizzes              25%
Projects/Assignments 25%
  Total:            100%

Grade Criteria:
  A =  90 to 100%
  B =  80 to  89%
  C =  70 to  79%
  D =  60 to  69%
  F =   0 to  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 205

  • Title: Implementing Windows Client
  • Number: IT-205
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

The focus of this course is the use of Microsoft Windows as an operating system in a business environment. Planning a simple network system, installation and configuration of the software and hardware, resource management, connectivity, running application software under Windows, monitoring and optimizing system hardware, and troubleshooting all lead the student to a deeper understanding of local area network use and administration. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basics of the Windows operating system.
  2. Install Windows operating system.
  3. Add/remove hardware components in Windows.
  4. Use control panel for basic operating system setup.
  5. Upgrade to Windows in a given situation.
  6. Configure server-based installation for wide-scale deployment in a given situation.
  7. Create and manage local user and group accounts; set up and modify user profiles; create shared folders and permissions. Install and configure printers in a shared environment.
  8. Use multiple methods of connecting a workstation to the network and its resources. Set up a TCP/IP connection to the Internet. Install and configure dial-up networking.
  9. Start and run applications in various operations system environments.
  10. Monitor, identify and resolve a performance problem. Optimize system performance.
  11. Identify and implement solutions for the following problems: boot process failure, printer failure, installation process failure, application failure, and resource access failure.
  12. Modify the registry using the appropriate tools in a specific situation.  

Content Outline and Competencies:

I. Planning Network Installation
   A. Choose an appropriate operating system for a specific situation.
   B. Differentiate between Windows server and other server operating
systems.
   C. Create unattended installation files.
   D. Choose the appropriate file structure for a specific situation.
   E. Create a dual-boot system.
   F. Differentiate between Windows Server and Windows Client OS.

II. Installing Windows Client Operating System
   A. Prepare a hard drive for Windows installation.
   B. Demonstrate partitioning the drives.
   C. Explain the major differences between installing and upgrading
Windows.
   D. Remove Windows from a hard drive.

III. Installing, Configuring and Removing Hardware Components
   A. Explain the hardware compatibility list.
   B. Choose the required hardware for a specified situation.
   C. Explain how various pieces of hardware are installed.
   D. Find and install the appropriate drivers.
   E. Explain how to best avoid hardware conflicts.
   F. Remove hardware and drivers from a Windows installation.
   G. Demonstrate updating drivers.

IV. Using Control Panel Applications
   A. Describe the control panel and its various options.
   B. Explain how system settings affect Windows.
   C. Configure the telephone feature.
   D. Install applications.
   E. Set user-specific variables.

V. Upgrading Windows
   A. Explain the ramification of upgrading to Windows from another
system.
   B. Determine the best upgrade path for a specific situation.
   C. Explain upgrading to Windows from other operating systems.

VI. Installing Windows from a Server-Based Computer
   A. Contrast the advantages and disadvantages of wide-scale deployment.
   B. Demonstrate how to create a network share.
   C. Install files on the client computer.
   D. Set permissions on the client computer.

VII. Establishing Users, Groups, Policies and Resources
   A. Explain the advantages and disadvantages of multiple-user systems.
   B. Create and configure users and user accounts.
   C. Demonstrate how to modify local and global groups.
   D. Develop security policies for the system.
   E. Assign permissions to network resources.

VIII. Connections Using the TCP/IP Protocol
   A. Explain the basics of TCP/IP architecture.
   B. Configure TCP/IP on an NT Workstation.
   C. Configure Windows NT for use with the Internet.
   D. Install peer web services.

IX. Running Applications
   A. Explain the advantages and disadvantages associated with running 16
and 32 bit applications under Windows Operating System.
   B. Demonstrate how to run DOS-based applications under Windows.
   C. Show how to run OS/2 applications under Windows.
   D. Explain the problems of running applications designed for the POSIX
environment.

X. Monitoring, Identifying and Resolving Performance Problems
   A. Find and eliminate operational bottlenecks.
   B. Demonstrate the use of Windows self-tuning features.
   C. Explain the need and process for continual monitoring of system
performance.

XI. Implementing Troubleshooting Procedures
   A. Demonstrate an understanding of basic troubleshooting procedures.
   B. Troubleshoot computer hardware to determine specific problems.
   C. Explain the steps for troubleshooting the Windows boot process.
   D. Demonstrate the use of troubleshooting applications.
   E. Identify troubleshooting resources.

XII. Modify the Registry
   A. Demonstrate a basic understanding of the registry and its
structure.
   B. Explain the importance of backing up the registry.
   C. Find specific settings by searching the registry.
   D. Use Windows registry diagnostic tools to identify registry
problems.
   E. Demonstrate the search features of the registry.
   F. Comment on warnings about the registry.

Method of Evaluation and Competencies:

Unit Quizzes      40%
Projects          30%
Midterm (Written) 15%
Final (Written)   15%
 Total           100%

Grading Scale (percentage of total points):
  90 - 100% = A
  80 -  89% = B
  70 -  79% = C
  60 -  69% = D
  Below 60% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 209

  • Title: LAN Switching*
  • Number: IT-209
  • Effective Term: Fall 2009
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 140 or IT 200

This course is designed to provide students with the necessary knowledge and skills to interconnect and configure network switches. Students successfully completing this course should be able to perform basic switch administration tasks including installing, configuring and troubleshooting. Students will build Local Area Networks (LANs) based on the hierarchical design model supported by Virtual LANs (VLANs) and the Spanning Tree Protocol (STP). This course maps to one of four modules designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the principles of designing hierarchical networks.
  2. Perform basic switch configuration.
  3. Configure, manage, and troubleshoot virtual LANs (VLANs).
  4. Implement VLAN Trunking Protocol (VTP) to simplify management of the VLAN database across multiple switches.
  5. Configure Spanning Tree Protocol (STP) to prevent loops in a switched network.
  6. Install and configure Inter-VLAN routing to facilitate communication between devices on separate VLANs.
  7. Install and connect wireless access points to switched networks. 

Content Outline and Competencies:

I. The Process of Designing Hierarchical Networks
   A. Explain how a hierarchical network supports voice, video, and data
applications.
   B. Provide examples of how voice and video over IP (Internet Protocol)
affect network design.
   C. Explain the concept of a converged network.
   D. Identify the voice and video components in a hierarchical network.
   E. Match the appropriate Cisco Switch to each layer in the hierarchical
network.
   F. Contrast the function of Layer 2 and Layer 3 switches.

II. Switch Configuration 
   A. Explain the functions that enable a switch to forward Ethernet
frames.
   B. Configure a switch for operation in a network designed to support
voice, video, and data transmissions.
   C. Configure basic security on a switch.

III. VLANs in a Switched Network
   A. Explain the role of VLANs in a network.
   B. Explain the role of trunking VLANs in a network.
   C. Configure VLANs on the switches in a network topology.
   D. Troubleshoot common software and hardware configuration problems
associated with VLANs.

IV.  VTP Configuration
   A. Explain the role of VTP in a converged switched network.
   B. Describe the operation of VTP including domains, modes,
advertisements, and pruning.
   C. Configure VTP on the switches in a converged network.

V. Basic STP Configuration
   A. Explain the role of redundancy in a switched network.
   B. Summarize how STP works to eliminate Layer 2 loops in a switched
network.
   C. Explain how the STP algorithm uses three steps to converge on a
loop-free topology.
   D. Implement STP to prevent loops between redundant switches.

VI. Inter-VLANs Routing
   A. Explain how network traffic is routed between VLANs in a converged
network.
   B. Configure inter-VLAN routing on router to enable communication
between devices on separate VLANs.
   C. Troubleshoot common inter-VLAN connectivity issues.

 VII. Wireless LANs Configuration
   A. Describe the components and basic operation of wireless LANs
(WLANs).
   B. Describe the components and operations of basic WLANs security.
   C. Configure and verify basic WLAN access.
   D. Troubleshoot wireless client access.

Method of Evaluation and Competencies:

Grading Criteria: 
Minimum of three regular exams         40% 
Minimum of three lab projects          40%
Final Exam                             20%
Total                                 100% 
 
Grading Scale:
  A = 90 - 100%
  B = 80 -  89%
  C = 70 -  79%
  D = 60 -  69%
  F =  0 -  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 221

  • Title: Windows Server*
  • Number: IT-221
  • Effective Term: Spring 2012
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisites: IT 205

This course is designed to provide students with the knowledge and skills to perform competently in the role of a network administrator utilizing the Windows network operating system. Students completing this course will be able to accomplish basic fundamental network management tasks, including planning server roles and subsequent requirements, planning the network file system, implementing user accounts and file system security, implementing network printing, and managing the network servers. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe, compare and contrast various modern network operating systems.
  2. Plan Windows server roles, including various network protocols.
  3. Install and configure Windows servers.
  4. Describe, compare, contrast and configure various network protocols.
  5. Explain Windows networking services.
  6. Establish and manage user accounts.
  7. Implement network and file level security.
  8. Manage Windows servers and their clients.
  9. Implement remote connectivity into the network and with other networks, including the Internet.
  10. Establish print services in the network environment.
  11. Support multiple clients on the Windows network. 

Content Outline and Competencies:

I. Network Operating Systems
   A. Define network models.
   B. Identify operating system features.
   C. Compare file systems.
   D. Describe networking services features.
   E. Contrast common modern network operating systems.

II. Planning Network Technologies
   A. Define network foundations and options.
   B. Identify Windows security models.
   C. Distinguish among Windows server roles.
   D. Define special purpose servers.
   E. Select supporting hardware.

III. Installing Windows Server
   A. Prepare hardware components.
   B. Boot with multiple operating systems.
   C. Perform the installation process.
   D. Perform the upgrade process.

IV. Network Protocols
   A. Define OSI model.
   B. Describe Windows networking components.
   C. Compare network protocols.
   D. Install and configure network protocols.

V. Configuring Windows
   A. Install drivers.
   B. Configure Windows using control panel.
   C. Configure Windows using the registry.

VI. Utilizing Windows Networking Services
   A. Explain the service architecture.
   B. Explain the security architecture.

VII. Implementing Security in the User Environment
   A. Plan user account policies, groups, sharing and security.
   B. Define and manage groups.
   C. Define and manage user accounts.
   D. Plan and define user environments.

VIII. Perform Server Management
   A. Utilize file services.
   B. Manage the distributed file systems.
   C. Implement remote server administration.
   D. Implement directory replication.

IX. Planning and Implementing Connectivity
   A. Implement and manage remote access service.
   B. Implement internet connectivity.
   C. Define and implement an intranet.
   D. Coexist with NetWare.

X. Printing with Windows
   A. Explain Windows print components.
   B. Define the print model.
   C. Implement local printers.
   D. Implement remote printers.

XI. Supporting Network Clients
   A. Define client operating systems supported by Windows.
   B. Install client connectivity software.
   C. Implement home directories.
   D. Implement roaming profiles.

Method of Evaluation and Competencies:

Quizzes       20%
Tests         30%
Lab Exercises 50%
 Total       100%

Grading Scale:
  A = 90% - 100% 
  B = 80% -  89% 
  C = 70% -  79% 
  D = 60% -  69% 
  F =  0% -  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 225

  • Title: Windows Active Directory Services*
  • Number: IT-225
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 221

The focus of this course is using Microsoft Windows Server or Advanced Server software to install, configure and troubleshoot Active Directory components, Domain Name Space (DNS) for Active Directory and Active Directory security solutions. The course also emphasizes the skills required to manage, monitor and optimize the desktop environment using Group Policy. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install, configure, and troubleshoot Active Directory.
  2. Install, configure, manage, monitor, and troubleshoot Directory Name System (DNS) for Active Directory.
  3. Install, configure, manage, monitor, optimize and troubleshoot Change and Configuration Management.
  4. Manage, monitor, and optimize the components of Active Directory.
  5. Configure, manage, monitor, and troubleshoot Active Directory security solutions. 

Content Outline and Competencies:

I. Install, configure, and troubleshoot Active Directory.
   A. Install sites.
   B. Create subnets.
   C. Create site links.
   D. Create site link bridges.
   E. Create connection objects.
   F. Create global catalog servers.
   G. Move server objects between sites.
   H. Transfer Operations Master roles.
   I. Verify Active Directory installation.
   J. Implement an Organizational Unit (OU) structure.
   K. Perform an authoritative restore of Active Directory.
   L. Recover from a system failure.

II. Install, configure, manage, monitor, and troubleshoot Domain Name
System (DNS) for Active Directory.
   A. Integrate an Active Directory (AD) Domain Name System (DNS) with a
non-active DNS. 
   B. Configure zones for dynamic updates.
   C. Manage, monitor, and troubleshoot DNS.
   D. Manage replication of DNS data.

III. Install, configure, manage, monitor, optimize and troubleshoot Change
and Configuration Management.
   A. Create a Group Policy Object (GPO).
   B. Link an existing GPO.
   C. Delegate administrative control of Group Policy.
   D. Modify Group Policy inheritance.
   E. Filter Group Policy settings by associating security groups to
GPOs.
   F. Modify Group Policy.
   G. Control user environments by using Administrative Templates.
   H. Assign script policies to users and computers.
   I. Deploy software by using Group Policy.
   J. Maintain software by using Group Policy.
   K. Configure deployment options.
   L. Troubleshoot common problems that occur during software deployment.
   M. Manage network configuration by using Group Policy.
   N. Install an image on a Remote Installation Services (RIS) client
computer.
   O. Create a RIS boot disk.
   P. Configure remote installation options.
   Q. Troubleshoot RIS problems.
   R. Manage images for performing remote installations.
   S. Authorize a RIS server.
   T. Grant computer account creation rights.
   U. Prepare RIS client computers for added security and load balancing.
 
IV. Manage, monitor, and optimize the components of Active Directory.
   A. Move Active Directory (AD) objects.
   B. Publish resources in AD.
   C. Locate objects in AD.
   D. Create and manage accounts manually and by scripting.
   E. Control access to AD objects.
   F. Delegate administrative control of objects in AD.
   G. Monitor, maintain, and troubleshoot domain controller performance.
   H. Monitor, maintain, and troubleshoot AD components.
   I. Manage intersite replication.
   J. Manage intrasite replication.

V. Configure, manage, monitor, and troubleshoot Active Directory security
solutions.
   A. Configure and troubleshoot security in a directory services
infrastructure.
   B. Apply security policies by using Group Policy.
   C. Create, analyze, and modify security configurations by using
security configuration and analysis and security templates.
   D. Implement an audit policy.
   E. Monitor and analyze security events.

Method of Evaluation and Competencies:

 Examinations           60 % of grade
 Projects/Assignments   40  % of grade
    Total              100  %

Grade Criteria:
A =  90 to 100% 
B =  80 to  89% 
C =  70 to  79% 
D =  60 to  69% 
F =   0 to  59% 

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 228

  • Title: Exchange Server*
  • Number: IT-228
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 225

This course is designed to provide network administrators with information that enhances their ability to manage an Exchange server network. Included are topics related to server and client mail management and server performance, e-mail concepts and advanced Internet networking. 3 hrs. lecture, 2 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basic concepts of e-mail
  2. Describe architecture of Active Directory for Exchange
  3. Install Windows Exchange Server
  4. Install recipients and manage public and private folders
  5. Install and configure client access
  6. Install and configure the information store
  7. Administer routing groups and maintenance
  8. Troubleshoot access to resources
  9. Manage, monitor, and optimize system performance
  10. Configure and troubleshoot Exchange network connections
  11. Secure Exchange Server
  12. Manage backup and recovery 

Content Outline and Competencies:

I. Identify and test the basic concepts of email
   A. List the characteristics of shared-file and client/server message
systems
   B. List the email computer models
   C. List the enterprise-quality features of e-mail
   D. List the industry standards

II. Define the architecture of Active Directory for Exchange
   A. Define the components of Exchange Active Directory
   B. Define information stores
   C. Define the different types of message flow

III. Install Windows Exchange Server
   A. Develop a pre-installations configuration
   B. Install and set up an Exchange server
   C. Document the post installation configurations
   D. Troubleshoot the Exchange installation

IV. Create and manage recipients
   A. Create and manage users
   B. Create and manage groups
   C. Create and manage contracts
   D. Create and manage public folder recipients

V. Install and manage public and private folders
   A. Manage folders with Outlook
   B. Manage folders with System Manager
   C. Create new public folders and trees
   D. Create new dedicated folders
   E. Set up custom folders

VI. Install and configure client access
   A. Load and access email with Microsoft Outlook with a MAPI or IMAPI4
architecture
   B. Load and access email with Outlook Web Access
   C. Load and access email with POP
   D. Load the Network News Transfer Protocol

VII. Install and configure the information stores
   A. Install and manage storage groups
   B. Manage the stores

VIII. Administer routing groups and maintenance
   A. Install and manage administrative groups
   B. Install and manage routing groups

IX. Manage, monitor, and optimize system performance
   A. Monitor the Exchange server with Event Viewer
   B. Use policies to track users
   C. Troubleshoot client access problems

X. Configure and troubleshoot Exchange network connections
   A. Replicate between an operational master and domain controller
   B. Install the Active Directory connector
   C. Manage and troubleshoot a mixed mode environment

XI. Install and manage auxiliary services
   A. Install and manage Instant Messaging
   B. Install and manage chat services

XII. Disaster recovery of Exchange Server
   A. Set up a back-up and restore plan
   B. Back-up and restore data
   C. Set up a server for disaster recovery
   D. Troubleshoot the back-up and restore

Method of Evaluation and Competencies:

 Examinations          50 % of grade
 Projects/Assignments  50 % of grade
   Total              100 %

Grade Criteria:
A =  90 to 100%
B =  80 to 89%
C =  70 to 79%
D =  60 to 69%
F =   0 to 59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 230

  • Title: Linux Fundamentals
  • Number: IT-230
  • Effective Term: Fall 2013
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to execute common Linux commands and utilities; and accomplish system tasks such as navigating the file system, applying file system security, managing user accounts, using the printing environment, and utilizing the resources of a basic Linux system. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1.  
    1. Describe the Linux network operating system.
    2. Install and configure the Linux operating system.
    3. Execute common Linux commands and utilities.
    4. Describe, and configure the network interface.
    5. Establish and manage user accounts.
    6. Implement file level security.
    7. Establish print services in the network environment.
    8. Plan and implement archiving strategies.
    9. Utilize common Help utilities. 

Content Outline and Competencies:

I. The Linux Operating System
   A. List operating system features.
   B. Describe file systems.
   C. Define networking services features.
   D. Identify system processes.

II. Operating System Installation and Configuration
   A. Describe hardware preparation.
   B. Define and implement the Linux installation process.
   C. Describe and configure the Linux boot process.
   D. Create and maintain filesystems.

III. Commands and Utilities
   A. Use navigation and reading commands.
   B. Use searching and manipulating commands.
   C. Switch between common shells.
   D. Use redirection and pipes.
   E. Utilize a command-line text editor.

IV. The Network Interface
   A. Describe the Linux network environment.
   B. Implement network connectivity.
   C. Utilize network commands.

V. User Accounts
   A. Define and create user accounts.
   B. Discuss and utilize switch user utilities.

VI. File Level Security
   A. Describe file level security features.
   B. Interpret and assign file ownership.
   C. Interpret and apply file permissions.

VII. Print Services
   A. Describe printing components.
   B. Implement local printers.
   C. Implement remote printers.
   D. Utilize print commands.

VIII. Archiving Utilities
   A. Describe the uses of archiving.
   B. Utilize common archiving utilities.

IX. Help Utilities
   A. Describe and utilize command-line help utilities.
   B. Access and interpret on-line help resources.

Method of Evaluation and Competencies:

20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests
Total 100%

Grading Scale:
  A = 90 - 100%
  B = 80 -  89%
  C = 70 -  79%
  D = 60 -  69%
  F = Below 60%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 231

  • Title: Linux Administration*
  • Number: IT-231
  • Effective Term: Fall 2013
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 230

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including installing, configuring and troubleshooting a basic Linux system, managing devices, implementing the printing environment, installing software packages, and configuring the graphical user interface. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Perform advanced Linux installations.
  2. Implement advanced systems configuration techniques.
  3. Implement and configure client network connections.
  4. Install and manage software.
  5. Apply advanced Linux troubleshooting techniques.
  6. Automate system processes. 
  7. Describe and configure system security features.

Content Outline and Competencies:

I. Advanced Installations
   A. Plan an installation.
   B. Define client and server roles.
   C. Perform the installation process using a variety of methods.

II. Advanced Systems Configuration
   A. Configure and maintain network time synchronization.
   B. Perform system maintenance.
   C. Review problem solving logs.
   D. Perform advanced user account management and customization.
   E. Install and configure the graphical user environment.

III. Client Network Connections
   A. Configure the network interface.
   B. Implement and configure name resolution on a client.
   C. Implement and configure network addressing.
   D. Utilize network-related commands and utilities.
   E. Utilize remote connectivity methods.

IV. Software Management
   A. Install and configure software.
   B. Manage software components.

V. Troubleshooting Techniques
   A. Describe and use troubleshooting strategies.
   B. Utilize troubleshooting commands and utilities.
   C. Access and utilize recovery environments.
   D. Explain and resolve common problems.

VI. System Automation
   A. Utilize system task schedulers.
   B. Read and write simple shell scripts.

VII. System Security Features
   A. Describe and configure system access restrictions.
   B. Describe and utilize methods of limiting root access.
   C. Configure limitations on system resource usage.
   D. Describe and utilize secure shell technologies.

Method of Evaluation and Competencies:

Grading Criteria: 
20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests
Total 100% 

Grading Scale:
A = 90 - 100%
B = 80 -  89%
C = 70 -  79%
D = 60 -  69%
F =  0 -  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 232

  • Title: Linux Networking*
  • Number: IT-232
  • Effective Term: Fall 2013
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 231

This course is designed to provide students with information that enhances their ability to manage Linux systems in a networked environment. Included are topics related to configuring and managing network connectivity, and the installation, configuration, and securing of network services. 3 hrs. lecture, 2 hr. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure and manage the network connection on a Linux server.
  2. Install and configure file sharing services.
  3. Configure and manage web services.
  4. Configure and manage network address services.
  5. Configure and manage mail services.
  6. Configure and manage firewall services.
  7. Configure and manage security. 

Content Outline and Competencies:

I. The Network Connection
   A. List the network settings on a Linux server. 
   B. Locate and setup or modify network settings on a Linux server.
   C. Troubleshoot network connectivity problems.

II. File Sharing Services
   A. Identify and list common file sharing technologies.
   B. Develop a plan to institute file sharing on a Linux server.
   C. Configure file sharing security on a Linux server.

III. Web Services
   A. Identify and list Linux web server parameters and settings.
   B. Install web services on a Linux server.
   C. Test web server capabilities.

IV. Network Address Services
   A. Identify and list Linux address server parameters and settings.
   B. Install address services on a Linux server.
   C. Test address server capabilities.

V. Mail Services
   A. Identify various Linux mail systems
   B. Implement and configure a mail system on a Linux server.
   C. Configure Linux clients to utilize a mail system.

VI. Firewall Services
   A. Describe the capabilities of the Linux firewall.
   B. Configure the Linux firewall on a Linux server.
   C. Write firewall rules.

VII. Security Configuration
   A. Identify Linux security components.
   B. Develop a plan to secure the Linux servers.
   C. Implement the security plan.
   D. Test security implementation.

Method of Evaluation and Competencies:

20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests

Grade Criteria:
  A =  90 to 100%
  B =  80 to  89%
  C =  70 to  79%
  D =  60 to  69%
  F =   0 to  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 233

  • Title: Linux Advanced Administration
  • Number: IT-233
  • Effective Term: Spring 2013
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

rerequisite: IT 231

This course is designed to provide students with the skills and techniques to perform advanced administration tasks in a networked Linux environment. Topics will include compiling the Linux kernel, configuring advanced storage solutions, customizing system startup processes, and managing advanced network connections. 3 hrs. lecture, 2 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure the Linux kernel.
  2. Customize system startup and boot processes.
  3. Configure and utilize advanced filesystem features.
  4. Configure and administer advanced storage devices.
  5. Implement advanced network configurations.
  6. Perform advanced system maintenance.
  7. Implement name services.

Content Outline and Competencies:

I. Linux Kernel
   A. Describe the kernel.
   B. Obtain and install a kernel.
   C. Apply kernel patches.
   D. Build a custom kernel.
   E. Manage kernel modules.

II. System Startup
   A. Install and configure the bootloader.
   B. Configure startup scripts.
   C. Utilize startup recovery and repair strategies.

III. Filesystems
   A. Configure and mount various types of filesystems.
   B. Troubleshoot and repair filesystems.
   C. Tune filesystem parameters.
   D. Configure automount filesystems using AutoFS.
   E. Manage devices with udev.

IV. Storage Devices
   A. Configure storage device access.
   B. Configure and implement software RAID (Redundant Array of Independent Disks)..
   C. Configure and utilize LVM (Logical Volume Management).
   D. Tune disk access.

V. Network Configuration
   A. Configure a network device to connect to varioustypes of networks.
   B. Configure a network device to implement various network authentication schemes.
   C. Monitor network traffic.
   D. Troubleshoot network issues.

VI. System Maintenance
   A. Build and install programs from source.
   B. Plan and implement network backups.

VII. Name Services
   A. Describe the role of name services on the network.
   B. Configure a basic name server.
   C. Create and maintain zone files.
   D. Secure the name server.

Method of Evaluation and Competencies:

Quizzes/Projects/Assignments 20% - 40%
Performance Tests 60% - 80%
Total 100%

90 to 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 245

  • Title: Network Infrastructure*
  • Number: IT-245
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 221

This course is designed to provide an in-depth understanding of the ability to install, manage, monitor, configure and troubleshoot DNS, DHCP, Remote Access, Network Protocols, IP Routing and WINS in a Windows 2000 network infrastructure. In addition, it will provide an in-depth understanding of the ability to manage, monitor and troubleshoot Network Address Translation and Certificate Services. Laboratory exercises will accompany the lectures. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install and configure TCP/IP on a client machine.
  2. Define IP addressing and its network classes.
  3. Calculate IP address subnet mask.
  4. Describe the IP address resolution process.
  5. Install, configure and troubleshoot IP routing protocols.
  6. Manage and monitor IP routing.
  7. Install, configure, manage, monitor and troubleshoot DHCP server.
  8. Explain NetBIOS name resolution methods.
  9. Install, manage, monitor, troubleshoot and configure WINS server and WINS replication.
  10. Install, configure, manage, monitor and troubleshoot DNS (Domain Name Service).
  11. Install, configure, manage, monitor and troubleshoot Remote Access.
  12. Install, configure, manage, monitor and troubleshoot Network Address Translation (NAT).
  13. Install, configure, manage, monitor and troubleshoot IPSec.
  14. Install, configure, manage, monitor and troubleshoot Certificate Authority.
  15. Document Server installation. 

Content Outline and Competencies:

I. Installing and Configuring TCP/IP
   A. Prepare the client machine for installing TCP/IP.
   B. Install the TCP/IP protocol suite.
   C. Configure TCP/IP for network communication.
   D. Describe TCP/IP utilities.

II. Defining IP Addressing and Its Network Classes
   A. Identify node address.
   B. Identify network address.
   C. Define network classes.
   D. Describe special addresses.

III. Subneting and Subnet Masking
   A. Define IP address subnets.
   B. Analyze subnets benefits.
   C. Calculate subnets masks.
   D. Contrast subneting and superneting.

IV. IP Address Resolution Process
   A. Explain IP address resolution.
   B. Outline the role of ARP.
   C. Compare MAC addressing to IP addressing.

V. IP Routing
   A. Configure static IP routers.
   B. Build a routing table.
   C. Configure dynamic IP routing.
   D. Describe routing internet protocol.
   E. Contrast static and dynamic IP routing.

VI. The Dynamic Host Configuration Protocol
   A. Distinguish between manual and automatic configuration.
   B. Outline how DHCP works.
   C. Describe IP lease request and offer.
   D. Install and configure a DHCP server.

VII. NetBIOS Name Resolution
   A. Explain NetBIOS naming.
   B. Describe resolving local NetBIOS names using a broadcast.
   C. Describe resolving names with a NetBIOS name server.
   D. NetBIOS over TCP/IP name resolution nodes.
   E. Create a HOSTS file to resolve NetBIOS names.

VIII. Implementing Windows Internet Name Service
   A. Define WINS role in name resolution.
   B. Install WINS server.
   C. Configure static entries for non-WINS clients.
   D. Configure a WINS proxy agent.
   E. Configure a DHCP server for WINS.

IX. Domain Name System (DNS)
   A. Outline DNS operation.
   B. Explain name resolution using DNS server.
   C. Create the DNS files.
   D. Install a DNS server.

X. Remote Access
   A. Explain Remote Access.
   B. Configure inbound connections.
   C. Create a remote access policy.
   D. Configure a remote access profile, a virtual private network (VPN),
multilink connections, and routing and remote access for DHCP
integration.
   E. Configure authentication and encryption protocols.

XI. Network Address Translation (NAT)
   A. Install Internet Connection Sharing.
   B. Install NAT.
   C. Configure NAT properties and interfaces.
   D. Troubleshoot NAT.

XII. IPSec
   A. Enable IPSec.
   B. Configure IPSec for transport or tunnel mode.
   C. Customize IPSec policies and rules.
   D. Manage and monitor IPSec.

XIII. Certificate Authority
   A. Install and configure Certificate Authority.
   B. Issue and revoke certificates.
   C. Remove the Encrypting File System (EFS) recovery keys.

XIV. Server Documentation
   A. Create screen captures.
   B. Save captured graphics in files.
   C. Create and print documents containing server documentation.

Method of Evaluation and Competencies:

Tests    40% of grade
Lab      30% of grade
Projects 30% of grade
Total   100%
Grading Scale:

90 - 100% = A
80 -  89% = B
70 -  79% = C
60 -  69% = D
Below 60% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 247

  • Title: Accessing Wide Area Networks*
  • Number: IT-247
  • Effective Term: Fall 2010
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisites: IT 209 and (IT 145 or IT 246)

This course is designed to provide students a fundamental understanding of internetworking. Topics include Local Area Network (LAN) segmentation using routers. Wide Area Network (WAN) physical technologies will be studied. Configuring WAN protocols using Point-to-Point Protocol (PPP), Integrated Services Digital Network (ISDN) and Frame Relay will be presented. Securing the network with standard and extended access lists will be performed. Programming and configuration will be conducted using Cisco routers and switches. Laboratory exercises will accompany lectures. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe LAN switching.
  2. Segment LANs using switches.
  3. Program IGRP routing protocol.
  4. Set up standard and extended access lists to secure the network.
  5. Configure routing of Novell PIX protocol.
  6. Describe WAN technologies using PPP, ISDN and frame relay.
  7. Configure PPP authentication using PAP and CHAP.
  8. Describe the operation of basic rate ISDN.
  9. Describe the operation of frame relay.
  10. Develop a WAN specification portfolio. 

Content Outline and Competencies:

I. Configuring Novell IPX
   A. Describe IPX routing.
   B. Define the Novell NetWare protocol suite.
   C. Describe IPX addressing.
   D. List Novell encapsulation.
   E. Configure IPX routing.

II. Managing Traffic With Access Lists
   A. Explain the purpose of access lists.
   B. Explain how access lists work.
   C. Define standard and extended access lists.
   D. List access lists commands.

III. TCP/IP Access Lists
   A. Test packets with IP access lists.
   B. Use wildcard mask bits.
   C. Configure an IP standard access list.
   D. Describe IP named lists.

IV. Novell IPX Access Lists
   A. Test packets using Novell access lists.
   B. Control IPX overhead with access lists.
   C. Configure a Novell standard access list.
   D. Describe IPX SAP filters.

V. Wide Area Network Connections
   A. List common WAN services.
   B. Describe PPP LCP configuration options.
   C. Configure PPP authentication.
   D. Verify PPP operation.

VI. ISDN
   A. Define ISDN terminals and reference points.
   B. Describe ISDN protocols.
   C. Configure ISDN basic rate interface.
   D. Contrast basic rate and primary rate ISDN.

VII. Frame Relay
   A. List and describe frame relay terms.
   B. Describe frame relay operation.
   C. Select frame relay topology.
   D. Configure frame relay.
   E. Configure subinterfaces.

Method of Evaluation and Competencies:

Grading Criteria:
Tests  40%
Lab    60% 
Total 100% 

Grading Scale:
90 - 100% = A
80 -  90% = B
70 -  79% = C
60 -  69% = D
 0 -  59% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 249

  • Title: Advanced Routing*
  • Number: IT-249
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 247

This course provides advanced instruction of Cisco routers found in medium to large networks. It is intended for students preparing for advanced Cisco certification. Upon completion of this course, the student will be able to select and implement the appropriate Cisco services required to build a scalable router network. Topics covered include extending IP addressing, implementing OSPF for a single area and multiple areas, configuring EIGRP, and implementing BGP. This course will follow semester five in the Cisco Networking Academy curriculum.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain routing principles.
  2. Given an IP address range, use VLSM to extend the use of IP addresses.
  3. Configure OSPF for proper operation in a single area.
  4. Configure a multiarea OSPF network.
  5. Configure Enhanced IGRP.
  6. Describe BGP features, operation and configuration.
  7. Implement BGP in scalable networks.
  8. Explain optimizing routing update operation. 

Content Outline and Competencies:

I. Explain Routing Principles
   A. Key information routers need to route data
   B. Classful and classless routing protocols
   C. Distance vector and link state protocol operation
   D. Routing tables

II. Apply VLSM to Extend the Use of IP Addresses
   A. Variable length subnetting
   B. Route summarization
   C. IP helper broadcast management

III. Configure OSPF in a Single Area
   A. OSPF versus RIP in a large Internetwork
   B. OSPF in a single area
   C. OSPF configuration
   D. OSPF in an NBMA environment

IV. Configure a Multiarea OSPF Network
   A. Interconnecting multiple OSPF areas
   B. LSAs types
   C. Multiple areas configuration
   D. Verifying OSPF operation

V. Configure EIGRP
   A. Enhanced IGRP features and operation
   B. EIGRP operation in an NBMA environment
   C. EIGRP support of large networks
   D. Configuring EIGRP operation

VI. Configure Basic Border Gateway Protocol
   A. BGP features and operation
   B. Connecting autonomous systems
   C. BGP policy-based routing functions
   D. Configuring external and internal BGP

VII. Implement BGP in Scalable Networks
   A. Scalability problems associated with internal BGP
   B. Configuring BGP route reflectors
   C. Configuring policy control in BGP using prefix lists
   D. Connecting to multiple ISPs using BGP

VIII. Apply Techniques to Optimize Routing Update Operation
   A. Route redistribution in networks with redundant paths
   B. Policy-based routing using route maps
   C. Controlling routing update traffic
   D. Verifying route redistribution

Method of Evaluation and Competencies:

Two or more written examinations 20%-30% of course total requirement.
Eight or more laboratory exercises 30%-60% of course total requirement.
Final Exam 20%-30% of course total requirement.

Grading Criteria:
A = 90 – 100%
B = 80 – 89%
C = 70 – 79%
D = 60 – 69%
F =  0 – 59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 250

  • Title: Networking Seminar*
  • Number: IT-250
  • Effective Term: Spring 2010
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2

Description:

Prerequisite: IT 225 and IT 247

This course is designed to teach advanced concepts in information technology. Topics covered are section specific and include e-mail servers, Web servers, database servers, routing, switching and advanced LAN design concepts. Prerequisites are posted for each section. Students may use this course as a capstone for applying concepts and procedures developed in previous courses using realistic business scenarios. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Work as a team member toward implementing a new local area network installation.
  2. Plan the steps in a decision-making process and design a solution for a new LAN.
  3. Describe the effective implementation of networking in business processes.
  4. Explain characteristics of successful computer network and information technology management.

Content Outline and Competencies:

I. Teamwork
   A. Establish team goals for implementing a network solution.
   B. Build group consensus around the solution.
   C. Develop plan of action for network design and implementation.

II. Project Management
   A. Identify common hardware, software and peripheral equipment found in
a computer network.
   B. Select materials, tools and equipment needed to set up a small local
area network.
   C. Determine cost, time and resources needed to set up a local area
network.
   D. Apply benefit/cost analysis to a typical LAN project.
   E. Create a timeline for implementing the LAN solution.
   F. Use gantt chart to show project tasks, durations overtime and task
priorities.

III. Computer Networking in Business Processes
   A. Explain the role of networking and information transfer in product
development.
   B. Describe the impact of local area networks on marketing, sales, and
service operations.
   C. Discuss how to selectively integrate information technology in
processing orders across the company.
   D. Explain how to use networking strategies to improve business
planning and development.

IV. Successful Information Technology Management
   A. Discuss the role of top level management in implementing a
successful information technology strategy.
   B. Describe how information technology can be used to create a
customer-orientated service network.
   C. Discuss the pitfalls of incorporating network technology without
changes to corporate culture.

Method of Evaluation and Competencies:

Team project           50% of grade
Graded labs & homework 20% of grade
Quizzes & exams        30% of grade
Total                 100%

Grading Scale:
A = 90 - 100%
B = 80 -  89%
C = 70 -  79%
D = 60 -  69%
F = below 60%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 251

  • Title: Network Security Fundamentals*
  • Number: IT-251
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Lab Hours: 2

Description:

Prerequisite: IT 247

This course is designed to provide students with a fundamental understanding of network security principles and implementation. Topics covered include authentication, the types of attacks and malicious code that may be used against computer networks, the threats and countermeasures for e-mail, Web applications, remote access, and file and print services. A variety of security topologies will be discussed as well as technologies and concepts used for providing secure communication channels, secure internetworking devices, intrusion detection systems, and firewalls. Hands-on exercises will be used to reinforce the concepts. 3 hrs. lecture, 2 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe authentication methods.
  2. Identify common network attacks and malicious code.
  3. Describe remote access network security technologies.
  4. Identify e-mail security vulnerabilities and implement protection measures.
  5. Identify vulnerabilities of Web Tools such as JavaScript and ActiveX.
  6. List common directory and file transfer protection services.
  7. Describe security threats against wireless data and instant messaging.
  8. Explain common security features of network devices such as firewalls, routers, and switches.
  9. Explain common methods used to secure transmission media.
  10. Compare and contrast main network security topologies.
  11. Identify common intrusion detection mechanisms.
  12. List common cryptography algorithms.
  13. Develop a basic security policy and a disaster recovery plan.

Content Outline and Competencies:

I. Describe Authentication Methods
   A. List common methods of access control. 
   B. Contrast authentication procedures for UNIX, and Windows operating
systems.
   C. Configure PAP (Password Authentication Protocol) and CHAP (Challenge
Authentication Protocol) authentications.
   D. Configure basic AAA (Authentication-Authorization-Accounting)
authentication using TACACS+ (Terminal Access Controller Access Plus) and
RADIUS (Remote Authentication Dial In User Service) servers.
   E. Describe biometric authentication.

II. Identify Common Network Attacks and Malicious Code
   A. Analyze port Scanning, and password sniffing techniques.
   B. Describe Trojan Horse attacks. 
   C. Identify computer viruses and worms.
   D. Identify denial of service attacks.
   E. Evaluate executable content in web pages and e-mail.

III. Describe Remote Access Network Security Technologies
   A. Describe the operation of VPNs (Virtual Private Networks).
   B. Compare and contrast the roles of RADIUS and TACACS servers in
securing remote access.
   C. Identify telecommuting vulnerabilities. 
   D. Describe IP (Internet Protocol) security protocol.  

IV. Identify E-mail Security Vulnerabilities and Implement Protection
Measures
   A. Identify e-mail vulnerabilities.
   B. Identify common e-mail encryption methods.
   C . Compare and contrast PGP (Pretty Good Privacy) and S/MIME
(Secure/Multipurpose Internet Mail Extensions)protocols. 
   D. Identify email Spam, hoaxes, and chain letters.

V. Identify Vulnerabilities of Web Tools Such as JavaScript and ActiveX
   A. List web tools vulnerabilities including JavaScript, ActiveX,
cookies, and CGI (Common Gateway Interface).  
   B. Describe the operation of SSL (Secure Socket Layer) and HTTPS (Hyper
Text Transport Protocol Secure).
   C. Outline Instant messaging security issues.

VI. List Common Directory and File Transfer Protection Services
   A. Describe LDAP (Lightweight Directory Access Protocol) operation. 
   B. Identify LDAP security benefits.
   C. Implement file shares protection measures.

VII. Describe Security Threats to Wireless Data and Instant Messaging
   A. Describe packet analysis and spoofing techniques.
   B. Identify RF jamming and data flooding.
   C. Describe the use of SSID (Service Set Identifier) in wireless
security.
   D. Analyze the operation of WEP (Wired Equivalent Privacy) protocols.
 
VIII. Explain Common Security Features of Network Devices Such as
Firewalls, Routers, and Switches
   A. Describe the operation of firewalls. 
   B. Describe the operation of routers.
   C. Describe the operation of switches.
   D. Implement a basic security policy on firewalls, routers, and
switches.

IX.  Explain Common Methods Used to Secure Transmission Media
   A. Compare and contrast common transmission media.
   B. Define measures used to secure transmission media.

X. Compare and Contrast Main Network Security Topologies
   A. Explain the concept of perimeter security topologies.
   B. Develop a secure topology design.
   C. Implement network address translation scheme.

XI. Identify Common Intrusion Detection Mechanisms
   A. Compare network-based and host-based IDS.
   B. List common IDS products.
   C. Explain the concept of Honeypots.

XII. List Common Cryptography Algorithms
   A. Encrypt and decrypt a file, and explore the details of a sample
encryption algorithm. 
   B. Contrast public key versus symmetric encryption.
   C. Describe message digests encryption.
   D. Describe public key infrastructure.
  
XIII. Develop a Basic Security Policy and a Disaster Recovery Plan
   A. Analyze internal and external security risks.
   B. Define disaster recovery procedures. 
   C. Develop an action plan.
   D. Write a formal security plan.

Method of Evaluation and Competencies:

Examinations          50% 
Projects/Assignments  50% 
Total                100%

Grade Criteria:
 A = 90 – 100%
 B = 80 –  89% 
 C = 70 –  79%
 D = 60 –  69%
 F =  0 –  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 253

  • Title: Advanced Switching*
  • Number: IT-253
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 3
  • Lab Hours: 2

Description:

Prerequisite: IT 247

This course provides advanced instruction of Cisco switches found in medium to large networks. It introduces students to the deployment of the state-of-the art campus Local Area Networks (LAN). The course focuses on the selection and implementation of the appropriate Cisco Internetworking Operating System (IOS) services to build reliable scalable multilayer-switches LANs. Students will develop skills with Virtual LANs (VLAN), Virtual Trunking Protocol (VTP), Spanning Tree Protocol (STP), inter-VLAN routing, redundancy, Quality of Service (QoS) issues, campus LAN security, and transparent LAN services.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the Enterprise Composite Model used for designing networks.
  2. Describe the features and operation of VLANs on a switched network.
  3. Describe the features of the VLAN trunking protocols including 802.1Q, ISL and dynamic trunking protocol.
  4. Explain the operation and purpose of the Spanning-Tree Protocol (STP) on a switched network.
  5. Implement common techniques to optimize STP including PortFast and UplinkFast.
  6. Explain the operation and purpose of EtherChannel technology.
  7. List and describe the operation of the key components required to implement interVLAN routing.
  8. Explain the operation of Multilayer Switching (MLS) in the network.
  9. Explain the types of redundancy in a multilayer switched network including hardware and software redundancy.
  10. Describe the QoS solutions that address voice quality issues.
  11. Describe network monitoring using SPAN.
  12. Implement common security techniques to protect a switched network.
  13. Describe Transparent LAN Services and how they are implemented in a service provider network. 

Content Outline and Competencies:

I. Describe the Enterprise Composite Model Used for Designing
Networks
   A. Describe the elements of a switched campus network. 
   B. List common switching technologies.
   C. Identify the building blocks of hierarchical network design.

II. Describe the Features and Operation of VLANs on a Switched Network
   A. Describe the operation of VLANs. 
   B. Identify types of VLANs.
   C. Configure VLAN in a switched network.

III. Describe the Features of the VLAN Trunking Protocols Including
802.1Q, ISL and Dynamic Trunking Protocol
   A. Describe the operation of VTP.
   B. Compare methods of VLAN identification.
   C. Configure VTP in a multiple switches domain. 

IV. Explain the Operation and Purpose of the Spanning-Tree Protocol (STP)
on a Switched Network
   A. Describe the operation of STP.
   B. List the steps of the STP process.
   C. Configure STP in a multiple switches domain. 

V. Implement Common Techniques to Optimize STP Including PortFast and
UplinkFast. 
   A. Configure PortFast.
   B. Configure UplinkFast.
   C. Configure BackboneFast.

VI. Explain the Operation and Purpose of EtherChannel Technology 
   A. Describe the operation of EtherChannel Technology.
   B. Describe the operation of Port Aggregation Protocol.
   C. Configure EtherChannel between two switches. 

VII. List and Describe the Operation of the Key Components Required to
Implement InterVLAN Routing
   A. Compare common methods of Inter-VLAN Routing.
   B. Configure Inter-VLAN Routing using trunking.
   C. Configure Inter-VLAN Routing using subinterfaces. 

VIII. Explain the Operation of Multilayer Switching (MLS) in the Network
   A. Describe the operation of MLS. 
   B. Contrast MLS and CEF.
   C. Configure MLS.

IX. Explain the Types of Redundancy in a Multilayer Switched Network
Including Hardware and Software Redundancy
   A. Explain the operation of HSRP.
   B. Configure HSRP to improve redundancy in the distribution layer. 

X. Describe the QoS Solutions that Address Voice Quality Issues
   A. List the requirements for QoS.
   B. Describe the benefits of QoS.
   C. Configure QoS classifications at the access layer.

XI. Describe Network Monitoring Using SPAN
   A. List the limitations of monitoring switched networks.
   B. Apply SPAN to monitor network frames. 
   
XII. Implement Common Security Techniques to Protect a Switched Network
   A. Explain the operation of AAA security. 
   B. List common techniques used to secure remote management.
   C. Apply common procedures to secure user access.

XIII. Describe Transparent LAN Services and How They are Implemented in a
Service Provider Network
   A. Identify Transparent LAN Services architecture.
   B. Explain fiber optic transports.

Method of Evaluation and Competencies:

Examinations         50% 
Projects/Assignments 50% 
  Total             100%

Grade Criteria:
  A = 90 – 100%
  B = 80 –  89% 
  C = 70 –  79%
  D = 60 –  69%
  F =  0 –  59%

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 256

  • Title: Windows Security*
  • Number: IT-256
  • Effective Term: Fall 2012
  • Course Type: Career
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Lab Hours: 2

Description:

Prerequisites: IT 225 and IT 245

This course is designed to provide students with the skills and techniques to properly secure a Windows network. The topics will include building a Windows Active Directory infrastructure, securing the Windows Active Directory infrastructure and penetrating the infrastructure with current hacking tool kits. This course serves as a capstone course in the Windows track of the Information Technology Department. It is the last course in a series of six Windows classes. It takes concepts and skills learned in the pre-requisite Windows courses and ties them together focusing on securing a Windows network. 3 hrs. lecture, 2 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Plan and implement a firewall strategy.
  2. Create and install an Active Directory infrastructure.
  3. Design and implement a user and computer authorization strategy.
  4. Secure remote access.
  5. Implement a user and computer security strategy.
  6. Install, configure and manage Software Update Services (SUS).
  7. Install, configure and manage Certificate Services.
  8. Implement a user and computer authentication strategy.
  9. Plan and configure Internet Protocol Security (IPSec).
  10. Implement hacking tool kits to identify and analyze network security vulnerabilities.

Content Outline and Competencies:

I. Firewall Strategy
  A. Describe the basic framework for designing network security. 
  B. Plan and design the firewall. 
  C. Install and configure the firewall. 
  D. Test the firewall. 
 
II. Active Directory Infrastructure
  A. Identify key concepts used throughout the Windows security.  
  B. Plan and design an Active Directory infrastructure. 
  C. Install and configure the Active Directory infrastructure. 
  D. Harden installed servers and computers for specific roles. 

III. Authorization Strategy 
  A. Create user and group accounts. 
  B. Create share permissions. 
  C. Test share permissions. 
  D. Identify New Technology File System (NTFS) permissions. 
  E. Create and nest group resources. 

IV. Remote Access
  A. Create a remote user. 
  B. Configure Routing and Remote Access Services (RRAS) and create a policy.
  C. Configure and establish a Virtual Private Network (VPN) connection.

V. Security Policies and Strategy  
  A. Create a Windows security templates console. 
  B. Configure default domain policies and software restriction policies. 
  C. Deploy the security policies using group policies. 
  D. Test policies. 
  E. Create Results of Policy (RSoP) console. 

VI. Software Update Services 
  A. Install and configure SUS.
  B. Configure the automatic update client. 
  C. Secure automatic updates and clients. 

VII. Certificate Services
  A. Install and configure certificate authorities. 
  B. Configure the certificate template. 
  C. Request a certificate through web enrollment. 

VIII. Authentication Strategy 
  A. Install and configure network monitoring. 
  B. Capture network traffic. 
  C. Capture Kerberos traffic. 
  D. Configure packet filtering. 

IX. IPSec 
  A. Create an IP filter list. 
  B. Create IP filter actions. 
  C. Create an IP security policy. 
  D. Implement and test the IP security policy. 
 
X. Hacking Tool Kits 
  A. Install and configure network hacking tools. 
  B. Hack student firewall and servers. 
  C. Review and analyze hacks on firewalls and servers.

Method of Evaluation and Competencies:

Hands in lab = 25-40% 
Learning Modules = 15%-30% 
Performance Tests = 45%-60%  
 
  Grade Criteria:
  90 - 100% = A      
  80 -  89% = B          
  70 -  79% = C    
  60 -  69% = D  
  Below 60% = F

Caveats:

None

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 271

  • Title: Information Technology Internship I*
  • Number: IT-271
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Lab Hours:

Description:

Prerequisites: IT 210 or IT 221 or IT 230 and department approval

This course affords the student the opportunity to apply classroom knowledge to an actual work environment. It will provide advanced information technology students with appropriate on-the-job experience with area employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours a semester at an approved job site.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable level of preparedness, personally and professionally, for a career. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the
workplace.
   B. Keep a log book of weekly activities or tasks performed while at the
workplace.
   C. Furnish activity log compiled for each week of work to the
instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties
were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company
produces.
   D. Provide a detailed description of products and services the student
was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area
network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business
environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business
environment.

Method of Evaluation and Competencies:

Percent not to exceed:
Instructor's on-site visits and evaluations       20%
Weekly work log                                   20%
Evaluation of the student by the work supervisor  60%
Total                                            100%

Grading Scale (percentage of total points):
90 - 100 = A
80 -  89 = B
70 -  79 = C
60 -  69 = D
Below 60 = F

Caveats:

  1. Transportation to work site is the responsibility of the student. 

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 272

  • Title: Information Technology Internship II*
  • Number: IT-272
  • Effective Term: Spring 2009
  • Course Type: Career
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Lab Hours:

Description:

Prerequisites: IT 271 and department approval

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable preparedness, personally and professionally, for a career position. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the
workplace.
   B. Keep a log book of weekly activities or tasks performed while at the
workplace.
   C. Furnish activity log compiled for each week of work to the
instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties
were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company
produces.
   D. Provide a detailed description of products and services the student
was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area
network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business
environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business
environment.

Method of Evaluation and Competencies:

Percent not to exceed:
Instructor's on-site visits and evaluations 20%
Weekly work log 20%
Evaluation of the student by the work supervisor 60%

Grading Scale (Percentage of Total Points):
90 - 100 = A
80 -  89 = B
70 -  79 = C
60 -  69 = D
Below 60 = F

Caveats:

  1. Transportation to work site is the responsibility of the student. 

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 292

  • Title: Special Topics:*
  • Number: IT-292
  • Effective Term: Spring 2013
  • Course Type: Career
  • Credit Hours: 1
  • Contact Hours: 1
  • Lecture Hours: 1
  • Lab Hours:

Description:

Prerequisite: Department approval

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit; but only on different topics.

Course Fees:

Varies

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Appropriately use terminology related to the special topic. 
  2. Solve problems by using content related to the special topic.
  3. Demonstrate conceptual understanding of the special topic.
  4. Use software and hardware related to the special topic.

Content Outline and Competencies:

Will vary within the guidelines of the educational affairs committee.

Method of Evaluation and Competencies:

Will vary within the guidelines of the educational affairs committee.

Caveats:

Student Responsibilites:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.