Information Technology (IT)

This is an archived copy of the 2015-16 Catalog. To access the most recent version of the catalog, please visit http://catalog.jccc.edu/.

Courses

IT 120   CompTIA A+ Practical Applications (3 Hours)

Students will gain knowledge required to install, configure and maintain software for end users. This course will also cover the basics of networking as well as networking security/forensics. Students will apply troubleshooting skills to properly and safely diagnose, resolve and document common software issues. Students will also apply appropriate customer support and soft skills, understand the basics of virtualization and examine desktop imaging and deployment. 2 hrs. lecture/wk, 2 hrs. lab/wk, 1 hr. open lab/wk.

IT 140   Networking Fundamentals (4 Hours)

This course serves as the first module of four that are designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification. The course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the CCNA curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. 3 hrs. lecture 2 hrs. open lab/wk.

IT 145   Routing and Switching Essentials* (3 Hours)

Prerequisites: IT 140

This course is designed to provide students with a fundamental understanding of network routing and switching. Students successfully completing this course will be able to configure and troubleshoot routers and switches and resolve common issues with RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) in IPv4 and IPv6 (Internet Protocol version 4 and 6) networks. Laboratory exercises will accompany lectures. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 201   Network Security Fundamentals* (4 Hours)

Prerequisites: IT 145

This course is designed to provide an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality and availability of data and devices. Topics covered include network threats, mitigation techniques, securing network devices, implementing firewall technologies, implementing intrusion prevention, securing local area networks (LANs), implementing virtual private networks (VPNs), and managing a secure network. Hands-on exercises will be used to reinforce the concepts. 2 hrs. lecture, 3 hrs. lab/wk.

IT 203   Voice Over IP Fundamentals* (4 Hours)

Prerequisites: IT 145

This course is designed to provide students with the fundamentals of Voice over IP (VoIP) networking technology. Concepts covered include an explanation of the national voice and data network, telephony terminology, VoIP protocol analysis and telephony survey techniques. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 205   Implementing Windows Client (3 Hours)

The focus of this course is the use of Microsoft Windows as an operating system in a business environment. Planning a simple network system, installation and configuration of the software and hardware, resource management, connectivity, running application software under Windows, monitoring and optimizing system hardware, and troubleshooting all lead the student to a deeper understanding of local area network use and administration. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 209   Scaling Networks* (4 Hours)

Prerequisites: IT 145

This course is designed to provide students with the necessary knowledge and skills to interconnect and configure routers and switches in large networks. Students successfully completing this course should be able to perform switch and router administration tasks including installing, configuring and troubleshooting. Students will build networks based on the hierarchical design model supported by Virtual Local Area Networks (VLANs), Spanning Tree Protocol (STP), Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) in Internet Protocol Version 4 and 6 (IPv4 and IPv6) networks. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 221   Windows Server* (3 Hours)

Prerequisites: IT 205

This course is designed to provide students with the knowledge and skills to perform competently in the role of a network administrator utilizing the Windows network operating system. Students completing this course will be able to accomplish basic fundamental network management tasks, including planning server roles and subsequent requirements, planning the network file system, implementing user accounts and file system security, implementing network printing, and managing the network servers. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 225   Windows Active Directory Services* (3 Hours)

Prerequisites: IT 221

The focus of this course is using Microsoft Windows Server or Advanced Server software to install, configure and troubleshoot Active Directory components, Domain Name Space (DNS) for Active Directory and Active Directory security solutions. The course also emphasizes the skills required to manage, monitor and optimize the desktop environment using Group Policy. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 228   Exchange Server* (3 Hours)

Prerequisites: IT 225

This course is designed to provide network administrators with information that enhances their ability to manage an Exchange server network. Included are topics related to server and client mail management and server performance, e-mail concepts and advanced Internet networking. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 230   Linux Fundamentals (3 Hours)

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to execute common Linux commands and utilities; and accomplish system tasks such as navigating the file system, applying file system security, managing user accounts, using the printing environment, and utilizing the resources of a basic Linux system. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 231   Linux Administration* (3 Hours)

Prerequisites: IT 230

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including installing, configuring and troubleshooting a basic Linux system, managing devices, implementing the printing environment, installing software packages, and configuring the graphical user interface. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 232   Linux Networking* (4 Hours)

Prerequisites: IT 231

This course is designed to provide students with information that enhances their ability to manage Linux systems in a networked environment. Included are topics related to configuring and managing network connectivity, and the installation, configuration, and securing of network services. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 233   Linux Advanced Administration (4 Hours)

This course is designed to provide students with the skills and techniques to perform advanced administration tasks in a networked Linux environment. Topics will include compiling the Linux kernel, configuring advanced storage solutions, customizing system startup processes, and managing advanced network connections. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 245   Network Infrastructure* (3 Hours)

Prerequisites: IT 221

This course is designed to provide an in-depth understanding of the ability to install, manage, monitor, configure and troubleshoot DNS, DHCP, Remote Access, Network Protocols, IP Routing and WINS in a Windows 2000 network infrastructure. In addition, it will provide an in-depth understanding of the ability to manage, monitor and troubleshoot Network Address Translation and Certificate Services. Laboratory exercises will accompany the lectures. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 247   Accessing Wide Area Networks* (3 Hours)

Prerequisites: IT 145 and IT 209

The goal is to develop an understanding of various Wide Area Network (WAN) technologies to connect medium-size business networks. The course focuses on WAN technologies including Point-to-Point Protocol (PPP), Frame Relay and broadband links. WAN security concepts are discussed in detail, including types of threats, how to analyze network vulnerabilities, and general methods for mitigating common security threats. The course explains the principles of Access Control Lists (ACLs) and describes how to implement IP addressing services for an enterprise network, including Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP). IPv6 addressing concepts are also discussed. Finally, students learn how to troubleshoot and correct common network implementation issues. 2 hrs. lecture, 3 hrs. lab/wk.

IT 256   Windows Security* (4 Hours)

Prerequisites: IT 225 and IT 245

This course is designed to provide students with the skills and techniques to properly secure a Windows network. The topics will include building a Windows Active Directory infrastructure, securing the Windows Active Directory infrastructure and penetrating the infrastructure with current hacking tool kits. This course serves as a capstone course in the Windows track of the Information Technology Department. It is the last course in a series of six Windows classes. It takes concepts and skills learned in the pre-requisite Windows courses and ties them together focusing on securing a Windows network. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 271   Information Technology Internship I* (3 Hours)

Prerequisites: IT 210 or IT 221 or IT 230 and department approval

This course affords the student the opportunity to apply classroom knowledge to an actual work environment. It will provide advanced information technology students with appropriate on-the-job experience with area employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours a semester at an approved job site.

IT 272   Information Technology Internship II* (3 Hours)

Prerequisites: IT 271 and department approval

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

IT 292   Special Topics:* (1-3 Hour)

Prerequisites: Department approval

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit; but only on different topics.

IT 120

  • Title: CompTIA A+ Practical Applications
  • Number: IT 120
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

Students will gain knowledge required to install, configure and maintain software for end users. This course will also cover the basics of networking as well as networking security/forensics. Students will apply troubleshooting skills to properly and safely diagnose, resolve and document common software issues. Students will also apply appropriate customer support and soft skills, understand the basics of virtualization and examine desktop imaging and deployment. 2 hrs. lecture/wk, 2 hrs. lab/wk, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Illustrate the installation, configuration and troubleshooting of current operating systems (OS).
  2. Compare and contrast the features and requirements of various Microsoft Operating Systems. 
  3. Demonstrate use of networking, OS and recovery console command line tools.
  4. Configure and troubleshoot a network client/desktop device.
  5. Perform preventive maintenance procedures.
  6. Demonstrate use of basic network, OS and data security. 
  7. Identify and integrate mobile devices. 
  8. Demonstrate common troubleshooting methods. 
  9. Demonstrate professional customer service skills.

Content Outline and Competencies:

I. Current Operating Systems

A. Explain the purpose of an operating system.

B. Perform an operating system installation.

C. Configure network settings to provide access to remote resources.

D. Identify common operating system installations problems and describe appropriate troubleshooting steps to resolve them.

II. Microsoft Operating Systems

A. Compare and contrast versions of Microsoft operating systems.

B. List system requirements of various Microsoft operating systems.

C. Explore common tools and applets of the Window graphical user interface (GUI).

D. Describe upgrading between different versions of Wind

III. Command Line Interface Tools

A. Perform basic network configuration and monitoring using command line tools.

B. Perform basic user management tasks using command line tools.

C. Perform basic file structure operations using command line tools.

D. Describe system recovery processes using command line options.

IV. Network Client/Desktop Device Configuration

A. Configure a network client computer including addressing and transport protocols.

B. Connect a computer to a wired and a wireless network.

C. Set up and modify user profiles.

D. Create shared folders and permissions.

E. Install and configure printers in a shared environment.

V. Preventive Maintenance

A. Identify and apply common preventive maintenance techniques.

B. Monitor, identify and resolve a performance problem.

C. Compare surge protectors and uninterruptible power supplies.

D. Explain Redundancy and Fault Tolerance.

VI. Basic Network and Data Security

A. Describe types of networks and their physical components.

B. Describe network topologies.

C. Describe Ethernet standards.

D. Explain the Open Systems Interconnection (OSI) model.

E. Describe security threats.

F. Identify common security procedures.

VII. Mobile Devices

A. Explain mobile device hardware.

B. Describe the features and characteristics of mobile operating systems.

C. Compare and contrast methods for securing mobile devices.

D. Establish basic network connectivity for common mobile devices.

VIII. Troubleshooting Methods

A. Identify common troubleshooting steps.

B. Identify and implement solutions for the following problems: boot process failure, printer failure, installation process failure, application failure, and resource access failure.

C. Use Task Manager to find and resolve problems.

D. Free up computer resources to optimize performance.

IX. Professional Customer Service Skills

A. Explain why good communication skills are a critical part of an information technology (IT) career.

B. Explain legal and ethical issues that arise in the IT industry and appropriate behaviors when faced with these issues

C. Describe the call center environment and technician responsibilities.

D. Describe the process of responding to a computer support call.

Method of Evaluation and Competencies:

20-50%    Quizzes
30-50%    Assignments
15-30%    Final Exam

Total:    100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 140

  • Title: Networking Fundamentals
  • Number: IT 140
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Description:

This course serves as the first module of four that are designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification. The course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the CCNA curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. 3 hrs. lecture 2 hrs. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Understand and describe the devices and services used to support communications in data networks and the internet.

  2. Understand and describe the role of protocol layers in data networks.

  3. Understand and describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments.

  4. Design, calculate, and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 networks.

  5. Explain fundamental Ethernet concepts such as media, services, and operations.

  6. Build a simple Ethernet network using routers and switches.

  7. Use Cisco command-line interface (CLI) commands to perform basic router and switch configurations.

  8. Utilize common network utilities to verify small network operations and analyze data traffic.

Content Outline and Competencies:

I. Exploring the Network
    A. Explain how networks affect the way we interact, learn, work and play.
    B. Describe how networks support communication.
    C. Explain the concept of converged network.
    D. Describe the four basic requirements of a reliable network.
    E. Explain the use of network devices.
    F. Compare the devices and topologies of a LAN (local area network) to the devices and topologies of a WAN (wide area network).
    G. Explain the basic structure of the Internet.
    H. Explain how LANs and WANs interconnect to the Internet.
    I. Describe the impact of BYOD (bring your own device), online collaboration, video, and cloud computing on a business network.
    J. Explain how networking technologies are changing the home environment.
    K. Identify some basic security threats and solutions for both small and large network.
    L. Explain how the three Cisco enterprise architectures work to meet the needs of the evolving network environment.
II. Configuring a Network Operating System
    A. Explain the purpose of Cisco IOS(Internetwork Operating System)
    B. Explain how to access and navigate Cisco IOS to configure network devices
    C. Describe the command structure of Cisco IOS software.
    D. Configure hostnames on a Cisco IOS device using the CLI (command line interface).
    E. Use Cisco IOS commands to limit access to device configurations.
    F. Use Cisco IOS commands to save the running configuration.
    G. Explain how devices communicate across network media.
     H. Configure a host device with an IP (internet protocol) address.
     I. Verify connectivity between two end devices.
III. Network Protocols and Communications
     A. Explain why protocols are necessary in communication.
     B. Explain the purpose of adhering to a protocol suite.
     C. Explain the role of standards organizations in establishing protocols for network interoperability.
     D. Explain how the TCP/IP (transmission control protocol/internet protocol) model and the OSI model are used to facilitate standardization in the communication process.
     E. Explain why RFCs (request for comments) became the process for establishing standards.
     F. Describe the RFC (request for comments) process.
     G. Explain how data encapsulation allows data to be transported across the network.
     H. Explain how local hosts access local resources on a network.
     I. Explain how local hosts access remote resources on a network.
IV. Network Access
     A. Identify device connectivity options.
     B. Describe the purpose and functions of the physical layer in the network.
     C. Describe basic principles of the physical layer standards.
     D. Identify the basic characteristics of copper cabling.
     E. Build a UTP (unshielded twisted pair) cable used in Ethernet networks.
     F. Describe fiber-optic cabling and its main advantages over the media.
     G. Describe wireless media.
     H. Select the appropriate media for a given requirement and connect devices.
     I. Describe the purpose and function of the data link layer in preparing communication for transmission on specific media.
     J. Describe the layer 2 frame structure and identify generic fields.
     K. Identify several sources for the protocols and standards used by the data link layer.
     L. Compare the functions of logical topologies and physical topologies.
     M. Describe the basic characteristics of media access control methods on WAN topologies. N. Describe the basic characteristics of media access control methods on LAN topologies.
     O. Describe the characteristics and functions of data link frame.
V. Ethernet
     A. Describe the operation of the Ethernet sub layers.
     B. Identify the major fields of Ethernet frame
     C. Describe the purpose and the characteristics of Ethernet MAC (media access control) address
     D. Describe the purpose of ARP (address resolution protocol)
     E. Explain how ARP requests impact network and host performance
     F. Explain basic switching concepts
     G. Compare fixed configuration and modular switches
     H. Configure a Layer 3 switch
VI. Network Layer
     A. Describe the purpose of the network layer in data communication
     B. Explain why the IPV4 protocol requires other layers to provide reliability
     C. Explain the role of the major header fields in the IPv4 and IPv6 packets
     D. Explain how host devices use routing tables to direct packets to itself, a local destination, or a default gateway.
     E. Compare a host routing table to a routing table in a router.
     F. Describe the common components and interfaces of a router.
     G. Describe the boot-up process of a Cisco IOS router
     H. Configure initial settings on a Cisco IOS router
     I. Configure two active interfaces on a Cisco IOS router
     J. Configure the default gateway on a network devices
VII. Transport Layer
     A. Describe the purpose of the transport layer in managing the transportation of data in end-to-end communication.
     B. Describe characteristics of the TCP (transmission control protocol) and UDP (user datagram protocol) protocols, including port numbers and their uses.
     C. Explain how TCP session establishment and termination process facilitate reliable communication
     D. Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery
     E. Describe the UDP client processes to establish communication with a server
     F. Determine whether high-reliability TCP transmissions, or non-guaranteed UDP transmissions, are best suited for common applications.
VIII. IP Addressing
     A. Describe the structure of an IPv4 address
     B. Describe the purpose of the subnet mask
     C. Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses
     D. Compare the use of public address space and private address space
     E. Explain the need for IPv6 addressing
     F. Describe the representation of an IPv6 address
     G. Describe types of IPv6 network addresses
     H. Configure global unicast addresses
     I. Describe multicast addresses
     J. Describe the role of ICMP(internet control message protocol) in an IP network (include IPv4 and IPv6).
     K. Use ping and traceroute utilities to test network connectivity.
IX. Subnetting IP Networks
     A. Explain why routing is necessary for hosts on different subnets to communicate
     B. Describe IP as a communication protocol used to identify a single device on a network.
     C. Given a network and subnet mask, calculate the number of host addresses available.
     D. Calculate the necessary subnet mask in order to accommodate a given number of hosts.
     E. Describe the benefits of variable length subnet masking (VLSM).
     F. Describe and implement a hierarchical addressing scheme.
     G. Explain how IPv6 address assignments are implemented in a business network
X. Application Layer
     A. Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
     B. Describe how common application layer protocols interact with end user applications.
     C. Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
     D. Describe application layer protocols that provide IP addressing services, including: DNS (domain name server) and DHCP (dynamic host configuration protocol).
     E. Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP (file transfer protocol), File Sharing Services, SMB (simple message block) protocol.
     F. Explain how data is moved across the network, from opening an application, to receiving data.
XI. It's a Network
     A. Identify the devices and protocols used in a small network
     B. Explain how a small network serves as a basis of larger networks.
     C. Describe the need for basic security measures on network devices
     D. Identify security vulnerabilities and general mitigation techniques
     E. Configure network devices with device hardening features to mitigate security threats
     F. Use the output of the ping and tracert commands to establish relative network performance.
     G. Use basic show commands to verify the configuration and status of a device interface.
     H. Use the basic host and IOS commands to acquire information about the device in a network.
     I. Explain file systems on routers and switches.
     J. Apply the commands to back up and restore an IOS configuration file. 

Method of Evaluation and Competencies:

Hands on labs:                      25 - 35%

Quizzes:                               15 - 25%

Performance Tests:               10 - 20%

Final:                                    25 - 35%

Total:                                    100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 145

  • Title: Routing and Switching Essentials*
  • Number: IT 145
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Requirements:

Prerequisites: IT 140

Description:

This course is designed to provide students with a fundamental understanding of network routing and switching. Students successfully completing this course will be able to configure and troubleshoot routers and switches and resolve common issues with RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) in IPv4 and IPv6 (Internet Protocol version 4 and 6) networks. Laboratory exercises will accompany lectures. 3 hrs. lecture, 2 hrs. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the process of network routing and switching.
  2. Configure and verify static and default routing.
  3. Evaluate the characteristics of dynamic routing protocols.
  4. Design and implement network addressing schemes.
  5. Describe, configure and verify RIP operation.
  6. Describe, configure and verify single-area OSPF.

Content Outline and Competencies:

I. Network Routing and Switching

A. Describe the functions and features of a router.

B. Describe how a router determines a path and switches packets

C. Use CLI (Command Line Interface) to perform and verify initial configuration tasks for a small routed network.

D. Describe switching technologies such as VLANs, VTP (Virtual Local Area Network Trunking Protocol) and STP (Spanning Tree Protocol).

II. Static and Default Routing

A. List common requirements for static routing.

B. Describe, configure and verify static routing.

C. Describe, configure and verify default routing.

III. Dynamic Routing Protocols

A. Explain the role of dynamic routing protocols and place these protocols in the context of modern network design.

B. Compare and contrast distance-vector and link-state routing protocols.

C. Describe the basic structure of the routing table.

IV. Network Addressing Schemes

A. Compare and contrast classful and classless network addressing.

B. Design and implement  IPv4 and IPv6 addressing schemes.

C. Troubleshoot and correct common network addressing problems.

D. Describe the operations of DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System) for IPv4 and IPv6.

V. RIP

A. Describe the basic characteristics and operation of RIP.

B. Configure RIP in a small network.

C. Verify and troubleshoot RIP operation.

Method of Evaluation and Competencies:

Evaluation of student mastery of course competencies will be accomplished using the following methods:
30-70% Assignments/Labs
30-70% Tests
Total 100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59 % = F

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 201

  • Title: Network Security Fundamentals*
  • Number: IT 201
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 3

Requirements:

Prerequisites: IT 145

Description:

This course is designed to provide an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality and availability of data and devices. Topics covered include network threats, mitigation techniques, securing network devices, implementing firewall technologies, implementing intrusion prevention, securing local area networks (LANs), implementing virtual private networks (VPNs), and managing a secure network. Hands-on exercises will be used to reinforce the concepts. 2 hrs. lecture, 3 hrs. lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

Upon successful completion of this course, the student should be able to:

  1. Explain network threats, mitigation techniques and the basics of securing a network.
  2. Secure administrative access with AAA (Authentication, Authorization and Accounting).
  3. Implement firewall technologies to secure the network perimeter.
  4. Configure IPS (Intrusion Prevention System) to mitigate attacks on the network.
  5. Describe LAN security considerations and implement endpoint and Layer 2 security features.
  6. Describe methods for implementing data confidentiality and integrity.
  7. Implement secure virtual private networks.
  8. Given the security needs of an enterprise, create and implement a comprehensive security policy.

Content Outline and Competencies:

I. Network Threats and Mitigation Techniques

A. Explain network threats, mitigation techniques and the basics of securing a network.

B. Describe Trojan Horse attacks.

C. Identify computer viruses and worms.

D. Identify denial of service attacks.

II. Administrative Access to Network Devices

A. Explain physical security and its implementation.

B. Disable unused services to minimize the attack surface.

C. Implement enhanced login security methods.

D. Configure basic AAA architecture using a RADIUS (Remote Authentication Dial In User Service) server.

III. Remote Access Technologies

A. Describe the operation of VPNs (Virtual Private Networks).

B. Compare and contrast the roles of RADIUS and Terminal Access Controller Access-Control System (TACACS) servers in securing remote access.

C. Identify telecommuting vulnerabilities.

D. Describe the IP (Internet Protocol) security protocol.

IV. Firewall Technologies

A. Describe the operation of firewalls.

B. Configure packet filtering using access control lists.

C. Implement a router-based firewall to protect the perimeter of the network.

D. Implement a dedicated firewall appliance to protect the perimeter of the network.

V. LAN Security

A. Compare and contrast internal and external network threats.

B. Implement layer 2 security measures to mitigate internal threats.

C. Configure port security on a network switch.

D. Explain common technologies used to enhance endpoint security.

VI. Confidentiality and Integrity

A. Describe common public and symmetric key encryption algorithms.

B. Describe common hashing algorithms used in data integrity.

C. Explain the functions of digital certificates in e-commerce transactions.

D. Describe the framework of PKI (Public Key Infrastructure).

E. Explain steganography technology and its applications.

VII. VPNs

A. Describe encryption protocols used in VPN applications.

B. Compare site-to-site and remote access VPN technologies.

C. Implement site-to-site VPN using IPSec (Internet Protocol Security) architecture.

D. Implement remote access VPN using SSL (Secure Socket Layer) protocols.

VIII. Security Policies

A. Analyze internal and external security risks.

B. Define disaster recovery procedures.

C. Develop an action plan.

D. Write a formal security plan.

Method of Evaluation and Competencies:

30-70%    Tests and Quizzes
30-70%    Projects/Assignments

100%    Total  

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 203

  • Title: Voice Over IP Fundamentals*
  • Number: IT 203
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145

Description:

This course is designed to provide students with the fundamentals of Voice over IP (VoIP) networking technology. Concepts covered include an explanation of the national voice and data network, telephony terminology, VoIP protocol analysis and telephony survey techniques. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the history and advent of telephony.
  2. Define specialized VoIP, PBX and Public Voice and Data network terminology.
  3. Explain the basics of internal telephone systems environment and peripherals.
  4. Identify and explain network service providers and local competition.
  5. Explain the public voice and data network infrastructure.
  6. Define specialized network services.
  7. Outline the basics of analog, cable TV, digital modems and set-top boxes.
  8. Define and analyze VoIP protocols.
  9. Explain telephony corporate user applications.
  10. Learn how to define user applications by telephony survey methods.
  11. Demonstrate VoIP programming fundamentals. 

Content Outline and Competencies:

I. History and Advent of Voice and Data Telephony
   A. Review Public Switch Telephone Network history and key events
   B. Review PBX System vendors, history and key events
   C. Review Internet history and key events
   D. Review VoIP vendors, history and key events

II. VoIP, PBX and Public Voice and Data Network Terminology
   A. Identify system wide features, capabilities and components
   B. Identify Attendant features, capabilities and components
   C. Identify user features, capabilities and component
   D. Identify special features, capabilities and component

III. Basics of Internal Telephone Systems Environment and Peripherals
   A. Define parameters of an internal telephone system for small to
mid-size companies
   B. Define parameters of an internal telephone system a large company
   C. Define parameters of an internal telephone system a enterprise
company environment

IV. Network Service Providers and Local Competition
   A. Identify and define the national public switch telephone network
   B. Identify and define the national public data network
   C. Identify and define the local voice and data network

V. Public Voice and Data Network Infrastructure
   A. Identify the parameters, boundaries and infrastructure of the public
switch network  
   B. Identify the parameters, boundaries and infrastructure of the
Internet
   C. Identify the parameters, boundaries and infrastructure of the local
telecos

VI. Specialized Network Services
   A. Review and define special voice telephone applications
   B. Review and define special VoIP applications

VII. Basics of Analog, Cable TV, Digital Modems and Set-top Boxes
   A. Explain analog to digital transmission
   B. Review peripherals NT1s, CSUs and cable modems
   C. Review cable voice and data networks.

VIII. Define and Analyze VoIP Protocols
   A. Define and explain VoIP public network protocols
   B. Define and explain VoIP LAN network protocols
   C. Define and explain VoIP user protocols

IX. Telephony Corporate User Applications
   A. Review corporate user telephony internal applications Automatic Call
Distribution, Unified Messaging, Voice Mail and other applications
   B. Review corporate user telephony external applications enterprise
networks, ISDN, T-1s and other applications

X. User Applications by Telephony Survey Methods and Implementation of a
VoIP Network
   A. Develop a plan to survey corporate users, attendants and executive
staff
   B. Learn to assemble survey results
   C. Present survey results and cost justifications to management

XI. VoIP Programming Fundamentals
   A. Demonstrate programming a VoIP Call Manager to the Public Switch
Telephone Network
   B. Demonstrate programming a VoIP Voice Mail Manager and associated
telephone extension

Method of Evaluation and Competencies:

Assessment Test      50%
Quizzes              25%
Projects/Assignments 25%
  Total:            100%

Grade Criteria:
  A =  90 to 100%
  B =  80 to  89%
  C =  70 to  79%
  D =  60 to  69%
  F =   0 to  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 205

  • Title: Implementing Windows Client
  • Number: IT 205
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

The focus of this course is the use of Microsoft Windows as an operating system in a business environment. Planning a simple network system, installation and configuration of the software and hardware, resource management, connectivity, running application software under Windows, monitoring and optimizing system hardware, and troubleshooting all lead the student to a deeper understanding of local area network use and administration. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basics of the Windows operating system.
  2. Install Windows operating system.
  3. Add/remove hardware components in Windows.
  4. Use control panel for basic operating system setup.
  5. Upgrade to Windows in a given situation.
  6. Configure server-based installation for wide-scale deployment in a given situation.
  7. Create and manage local user and group accounts; set up and modify user profiles; create shared folders and permissions. Install and configure printers in a shared environment.
  8. Use multiple methods of connecting a workstation to the network and its resources. Set up a TCP/IP connection to the Internet. Install and configure dial-up networking.
  9. Start and run applications in various operations system environments.
  10. Monitor, identify and resolve a performance problem. Optimize system performance.
  11. Identify and implement solutions for the following problems: boot process failure, printer failure, installation process failure, application failure, and resource access failure.
  12. Modify the registry using the appropriate tools in a specific situation.  

Content Outline and Competencies:

I. Planning Network Installation
   A. Choose an appropriate operating system for a specific situation.
   B. Differentiate between Windows server and other server operating
systems.
   C. Create unattended installation files.
   D. Choose the appropriate file structure for a specific situation.
   E. Create a dual-boot system.
   F. Differentiate between Windows Server and Windows Client OS.

II. Installing Windows Client Operating System
   A. Prepare a hard drive for Windows installation.
   B. Demonstrate partitioning the drives.
   C. Explain the major differences between installing and upgrading
Windows.
   D. Remove Windows from a hard drive.

III. Installing, Configuring and Removing Hardware Components
   A. Explain the hardware compatibility list.
   B. Choose the required hardware for a specified situation.
   C. Explain how various pieces of hardware are installed.
   D. Find and install the appropriate drivers.
   E. Explain how to best avoid hardware conflicts.
   F. Remove hardware and drivers from a Windows installation.
   G. Demonstrate updating drivers.

IV. Using Control Panel Applications
   A. Describe the control panel and its various options.
   B. Explain how system settings affect Windows.
   C. Configure the telephone feature.
   D. Install applications.
   E. Set user-specific variables.

V. Upgrading Windows
   A. Explain the ramification of upgrading to Windows from another
system.
   B. Determine the best upgrade path for a specific situation.
   C. Explain upgrading to Windows from other operating systems.

VI. Installing Windows from a Server-Based Computer
   A. Contrast the advantages and disadvantages of wide-scale deployment.
   B. Demonstrate how to create a network share.
   C. Install files on the client computer.
   D. Set permissions on the client computer.

VII. Establishing Users, Groups, Policies and Resources
   A. Explain the advantages and disadvantages of multiple-user systems.
   B. Create and configure users and user accounts.
   C. Demonstrate how to modify local and global groups.
   D. Develop security policies for the system.
   E. Assign permissions to network resources.

VIII. Connections Using the TCP/IP Protocol
   A. Explain the basics of TCP/IP architecture.
   B. Configure TCP/IP on an NT Workstation.
   C. Configure Windows NT for use with the Internet.
   D. Install peer web services.

IX. Running Applications
   A. Explain the advantages and disadvantages associated with running 16
and 32 bit applications under Windows Operating System.
   B. Demonstrate how to run DOS-based applications under Windows.
   C. Show how to run OS/2 applications under Windows.
   D. Explain the problems of running applications designed for the POSIX
environment.

X. Monitoring, Identifying and Resolving Performance Problems
   A. Find and eliminate operational bottlenecks.
   B. Demonstrate the use of Windows self-tuning features.
   C. Explain the need and process for continual monitoring of system
performance.

XI. Implementing Troubleshooting Procedures
   A. Demonstrate an understanding of basic troubleshooting procedures.
   B. Troubleshoot computer hardware to determine specific problems.
   C. Explain the steps for troubleshooting the Windows boot process.
   D. Demonstrate the use of troubleshooting applications.
   E. Identify troubleshooting resources.

XII. Modify the Registry
   A. Demonstrate a basic understanding of the registry and its
structure.
   B. Explain the importance of backing up the registry.
   C. Find specific settings by searching the registry.
   D. Use Windows registry diagnostic tools to identify registry
problems.
   E. Demonstrate the search features of the registry.
   F. Comment on warnings about the registry.

Method of Evaluation and Competencies:

Unit Quizzes      40%
Projects          30%
Midterm (Written) 15%
Final (Written)   15%
 Total           100%

Grading Scale (percentage of total points):
  90 - 100% = A
  80 -  89% = B
  70 -  79% = C
  60 -  69% = D
  Below 60% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 209

  • Title: Scaling Networks*
  • Number: IT 209
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145

Description:

This course is designed to provide students with the necessary knowledge and skills to interconnect and configure routers and switches in large networks. Students successfully completing this course should be able to perform switch and router administration tasks including installing, configuring and troubleshooting. Students will build networks based on the hierarchical design model supported by Virtual Local Area Networks (VLANs), Spanning Tree Protocol (STP), Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) in Internet Protocol Version 4 and 6 (IPv4 and IPv6) networks. 3 hrs. lecture, 2 hrs. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

1. State the principles of designing hierarchical networks.

2. Perform switch and router configuration.

3. Configure, manage, and troubleshoot Virtual LANs (VLANs).

4. Implement VLAN Trunking Protocol (VTP) to simplify management of the VLAN database across multiple switches.

5. Configure Spanning Tree Protocol (STP) to prevent loops in a switched network.

6. Install and configure inter-VLAN routing to facilitate communication between devices on separate VLANs.

7. Configure and troubleshoot EIGRP and single and multiarea OSPF in IPv4 and IPv6 networks.

Content Outline and Competencies:

I. Hierarchical Networks

A. Explain how a hierarchical network supports voice, video and data applications.

B. Provide examples of how voice and video over IP (Internet Protocol) affect network design.

C. Explain the concept of a converged network.

D. Identify the voice and video components in a hierarchical network.

E. Contrast the functions of Layer 2 and Layer 3 switches.

II. Switch Configuration

A. Explain the functions that enable a switch to forward Ethernet frames.

B. Configure a switch for operation in a network designed to support voice, video and data transmissions.

C. Configure basic security on a switch.

III. VLANs in a Switched Network

A. Explain the role of VLANs in a network.

B. Explain the role of trunking VLANs in a network.

C. Configure VLANs on the switches in a network topology.

D. Troubleshoot common software and hardware configuration  problems associated with VLANs.

IV. VTP Configuration

A. Explain the role of VTP in a converged switched network.

B. Describe the operation of VTP including domains, modes, advertisements and pruning.

C.  Configure VTP on the switches in a converged network.

V. Basic STP Configuration

A. Explain the role of redundancy in a switched network.

B. Summarize how STP works to eliminate Layer 2 loops in a switched network.

C. Explain how the STP algorithm uses three steps to converge on a loop-free topology.

D. Implement STP to prevent loops between redundant switches.

VI. Inter-VLANs Routing

A. Explain how network traffic is routed between VLANs in a converged network.

B. Configure inter-VLAN routing on router to enable communication between devices on separate VLANs.

C. Troubleshoot common inter-VLAN connectivity issues.

VII. EIGRP and OSPF configuration

A. Configure and troubleshoot EIGRP in IPv4 and IPv6 networks.

B. Configure and troubleshoot single area OSPF in IPv4 and IPv6 networks.

C. Configure and troubleshoot multi-area OSPF in 1Pv4 and IPv6 networks.

D. Describe the tasks of configuring and managing operating system files on routers and switches.

Method of Evaluation and Competencies:

Grading Criteria:
30-70%    Assignments/Labs
30-70%    Tests
Total: 100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59 % = F

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 221

  • Title: Windows Server*
  • Number: IT 221
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 205

Description:

This course is designed to provide students with the knowledge and skills to perform competently in the role of a network administrator utilizing the Windows network operating system. Students completing this course will be able to accomplish basic fundamental network management tasks, including planning server roles and subsequent requirements, planning the network file system, implementing user accounts and file system security, implementing network printing, and managing the network servers. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe, compare and contrast various modern network operating systems.
  2. Plan Windows server roles, including various network protocols.
  3. Install and configure Windows servers.
  4. Describe, compare, contrast and configure various network protocols.
  5. Explain Windows networking services.
  6. Establish and manage user accounts.
  7. Implement network and file level security.
  8. Manage Windows servers and their clients.
  9. Implement remote connectivity into the network and with other networks, including the Internet.
  10. Establish print services in the network environment.
  11. Support multiple clients on the Windows network. 

Content Outline and Competencies:

I. Network Operating Systems
   A. Define network models.
   B. Identify operating system features.
   C. Compare file systems.
   D. Describe networking services features.
   E. Contrast common modern network operating systems.

II. Planning Network Technologies
   A. Define network foundations and options.
   B. Identify Windows security models.
   C. Distinguish among Windows server roles.
   D. Define special purpose servers.
   E. Select supporting hardware.

III. Installing Windows Server
   A. Prepare hardware components.
   B. Boot with multiple operating systems.
   C. Perform the installation process.
   D. Perform the upgrade process.

IV. Network Protocols
   A. Define OSI model.
   B. Describe Windows networking components.
   C. Compare network protocols.
   D. Install and configure network protocols.

V. Configuring Windows
   A. Install drivers.
   B. Configure Windows using control panel.
   C. Configure Windows using the registry.

VI. Utilizing Windows Networking Services
   A. Explain the service architecture.
   B. Explain the security architecture.

VII. Implementing Security in the User Environment
   A. Plan user account policies, groups, sharing and security.
   B. Define and manage groups.
   C. Define and manage user accounts.
   D. Plan and define user environments.

VIII. Perform Server Management
   A. Utilize file services.
   B. Manage the distributed file systems.
   C. Implement remote server administration.
   D. Implement directory replication.

IX. Planning and Implementing Connectivity
   A. Implement and manage remote access service.
   B. Implement internet connectivity.
   C. Define and implement an intranet.
   D. Coexist with NetWare.

X. Printing with Windows
   A. Explain Windows print components.
   B. Define the print model.
   C. Implement local printers.
   D. Implement remote printers.

XI. Supporting Network Clients
   A. Define client operating systems supported by Windows.
   B. Install client connectivity software.
   C. Implement home directories.
   D. Implement roaming profiles.

Method of Evaluation and Competencies:

Quizzes       20%
Tests         30%
Lab Exercises 50%
 Total       100%

Grading Scale:
  A = 90% - 100% 
  B = 80% -  89% 
  C = 70% -  79% 
  D = 60% -  69% 
  F =  0% -  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 225

  • Title: Windows Active Directory Services*
  • Number: IT 225
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 221

Description:

The focus of this course is using Microsoft Windows Server or Advanced Server software to install, configure and troubleshoot Active Directory components, Domain Name Space (DNS) for Active Directory and Active Directory security solutions. The course also emphasizes the skills required to manage, monitor and optimize the desktop environment using Group Policy. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install, configure, and troubleshoot Active Directory.
  2. Install, configure, manage, monitor, and troubleshoot Directory Name System (DNS) for Active Directory.
  3. Install, configure, manage, monitor, optimize and troubleshoot Change and Configuration Management.
  4. Manage, monitor, and optimize the components of Active Directory.
  5. Configure, manage, monitor, and troubleshoot Active Directory security solutions. 

Content Outline and Competencies:

I. Install, configure, and troubleshoot Active Directory.
   A. Install sites.
   B. Create subnets.
   C. Create site links.
   D. Create site link bridges.
   E. Create connection objects.
   F. Create global catalog servers.
   G. Move server objects between sites.
   H. Transfer Operations Master roles.
   I. Verify Active Directory installation.
   J. Implement an Organizational Unit (OU) structure.
   K. Perform an authoritative restore of Active Directory.
   L. Recover from a system failure.

II. Install, configure, manage, monitor, and troubleshoot Domain Name
System (DNS) for Active Directory.
   A. Integrate an Active Directory (AD) Domain Name System (DNS) with a
non-active DNS. 
   B. Configure zones for dynamic updates.
   C. Manage, monitor, and troubleshoot DNS.
   D. Manage replication of DNS data.

III. Install, configure, manage, monitor, optimize and troubleshoot Change
and Configuration Management.
   A. Create a Group Policy Object (GPO).
   B. Link an existing GPO.
   C. Delegate administrative control of Group Policy.
   D. Modify Group Policy inheritance.
   E. Filter Group Policy settings by associating security groups to
GPOs.
   F. Modify Group Policy.
   G. Control user environments by using Administrative Templates.
   H. Assign script policies to users and computers.
   I. Deploy software by using Group Policy.
   J. Maintain software by using Group Policy.
   K. Configure deployment options.
   L. Troubleshoot common problems that occur during software deployment.
   M. Manage network configuration by using Group Policy.
   N. Install an image on a Remote Installation Services (RIS) client
computer.
   O. Create a RIS boot disk.
   P. Configure remote installation options.
   Q. Troubleshoot RIS problems.
   R. Manage images for performing remote installations.
   S. Authorize a RIS server.
   T. Grant computer account creation rights.
   U. Prepare RIS client computers for added security and load balancing.
 
IV. Manage, monitor, and optimize the components of Active Directory.
   A. Move Active Directory (AD) objects.
   B. Publish resources in AD.
   C. Locate objects in AD.
   D. Create and manage accounts manually and by scripting.
   E. Control access to AD objects.
   F. Delegate administrative control of objects in AD.
   G. Monitor, maintain, and troubleshoot domain controller performance.
   H. Monitor, maintain, and troubleshoot AD components.
   I. Manage intersite replication.
   J. Manage intrasite replication.

V. Configure, manage, monitor, and troubleshoot Active Directory security
solutions.
   A. Configure and troubleshoot security in a directory services
infrastructure.
   B. Apply security policies by using Group Policy.
   C. Create, analyze, and modify security configurations by using
security configuration and analysis and security templates.
   D. Implement an audit policy.
   E. Monitor and analyze security events.

Method of Evaluation and Competencies:

 Examinations           60 % of grade
 Projects/Assignments   40  % of grade
    Total              100  %

Grade Criteria:
A =  90 to 100% 
B =  80 to  89% 
C =  70 to  79% 
D =  60 to  69% 
F =   0 to  59% 

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 228

  • Title: Exchange Server*
  • Number: IT 228
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 225

Description:

This course is designed to provide network administrators with information that enhances their ability to manage an Exchange server network. Included are topics related to server and client mail management and server performance, e-mail concepts and advanced Internet networking. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basic concepts of e-mail
  2. Describe architecture of Active Directory for Exchange
  3. Install Windows Exchange Server
  4. Install recipients and manage public and private folders
  5. Install and configure client access
  6. Install and configure the information store
  7. Administer routing groups and maintenance
  8. Troubleshoot access to resources
  9. Manage, monitor, and optimize system performance
  10. Configure and troubleshoot Exchange network connections
  11. Secure Exchange Server
  12. Manage backup and recovery 

Content Outline and Competencies:

I. Identify and test the basic concepts of email
   A. List the characteristics of shared-file and client/server message
systems
   B. List the email computer models
   C. List the enterprise-quality features of e-mail
   D. List the industry standards

II. Define the architecture of Active Directory for Exchange
   A. Define the components of Exchange Active Directory
   B. Define information stores
   C. Define the different types of message flow

III. Install Windows Exchange Server
   A. Develop a pre-installations configuration
   B. Install and set up an Exchange server
   C. Document the post installation configurations
   D. Troubleshoot the Exchange installation

IV. Create and manage recipients
   A. Create and manage users
   B. Create and manage groups
   C. Create and manage contracts
   D. Create and manage public folder recipients

V. Install and manage public and private folders
   A. Manage folders with Outlook
   B. Manage folders with System Manager
   C. Create new public folders and trees
   D. Create new dedicated folders
   E. Set up custom folders

VI. Install and configure client access
   A. Load and access email with Microsoft Outlook with a MAPI or IMAPI4
architecture
   B. Load and access email with Outlook Web Access
   C. Load and access email with POP
   D. Load the Network News Transfer Protocol

VII. Install and configure the information stores
   A. Install and manage storage groups
   B. Manage the stores

VIII. Administer routing groups and maintenance
   A. Install and manage administrative groups
   B. Install and manage routing groups

IX. Manage, monitor, and optimize system performance
   A. Monitor the Exchange server with Event Viewer
   B. Use policies to track users
   C. Troubleshoot client access problems

X. Configure and troubleshoot Exchange network connections
   A. Replicate between an operational master and domain controller
   B. Install the Active Directory connector
   C. Manage and troubleshoot a mixed mode environment

XI. Install and manage auxiliary services
   A. Install and manage Instant Messaging
   B. Install and manage chat services

XII. Disaster recovery of Exchange Server
   A. Set up a back-up and restore plan
   B. Back-up and restore data
   C. Set up a server for disaster recovery
   D. Troubleshoot the back-up and restore

Method of Evaluation and Competencies:

 Examinations          50 % of grade
 Projects/Assignments  50 % of grade
   Total              100 %

Grade Criteria:
A =  90 to 100%
B =  80 to 89%
C =  70 to 79%
D =  60 to 69%
F =   0 to 59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 230

  • Title: Linux Fundamentals
  • Number: IT 230
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to execute common Linux commands and utilities; and accomplish system tasks such as navigating the file system, applying file system security, managing user accounts, using the printing environment, and utilizing the resources of a basic Linux system. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1.  
    1. Describe the Linux network operating system.
    2. Install and configure the Linux operating system.
    3. Execute common Linux commands and utilities.
    4. Describe, and configure the network interface.
    5. Establish and manage user accounts.
    6. Implement file level security.
    7. Establish print services in the network environment.
    8. Plan and implement archiving strategies.
    9. Utilize common Help utilities. 

Content Outline and Competencies:

I. The Linux Operating System
   A. List operating system features.
   B. Describe file systems.
   C. Define networking services features.
   D. Identify system processes.

II. Operating System Installation and Configuration
   A. Describe hardware preparation.
   B. Define and implement the Linux installation process.
   C. Describe and configure the Linux boot process.
   D. Create and maintain filesystems.

III. Commands and Utilities
   A. Use navigation and reading commands.
   B. Use searching and manipulating commands.
   C. Switch between common shells.
   D. Use redirection and pipes.
   E. Utilize a command-line text editor.

IV. The Network Interface
   A. Describe the Linux network environment.
   B. Implement network connectivity.
   C. Utilize network commands.

V. User Accounts
   A. Define and create user accounts.
   B. Discuss and utilize switch user utilities.

VI. File Level Security
   A. Describe file level security features.
   B. Interpret and assign file ownership.
   C. Interpret and apply file permissions.

VII. Print Services
   A. Describe printing components.
   B. Implement local printers.
   C. Implement remote printers.
   D. Utilize print commands.

VIII. Archiving Utilities
   A. Describe the uses of archiving.
   B. Utilize common archiving utilities.

IX. Help Utilities
   A. Describe and utilize command-line help utilities.
   B. Access and interpret on-line help resources.

Method of Evaluation and Competencies:

20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests
Total 100%

Grading Scale:
  A = 90 - 100%
  B = 80 -  89%
  C = 70 -  79%
  D = 60 -  69%
  F = Below 60%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 231

  • Title: Linux Administration*
  • Number: IT 231
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 230

Description:

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including installing, configuring and troubleshooting a basic Linux system, managing devices, implementing the printing environment, installing software packages, and configuring the graphical user interface. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Perform advanced Linux installations.
  2. Implement advanced systems configuration techniques.
  3. Implement and configure client network connections.
  4. Install and manage software.
  5. Apply advanced Linux troubleshooting techniques.
  6. Automate system processes. 
  7. Describe and configure system security features.

Content Outline and Competencies:

I. Advanced Installations
   A. Plan an installation.
   B. Define client and server roles.
   C. Perform the installation process using a variety of methods.

II. Advanced Systems Configuration
   A. Configure and maintain network time synchronization.
   B. Perform system maintenance.
   C. Review problem solving logs.
   D. Perform advanced user account management and customization.
   E. Install and configure the graphical user environment.

III. Client Network Connections
   A. Configure the network interface.
   B. Implement and configure name resolution on a client.
   C. Implement and configure network addressing.
   D. Utilize network-related commands and utilities.
   E. Utilize remote connectivity methods.

IV. Software Management
   A. Install and configure software.
   B. Manage software components.

V. Troubleshooting Techniques
   A. Describe and use troubleshooting strategies.
   B. Utilize troubleshooting commands and utilities.
   C. Access and utilize recovery environments.
   D. Explain and resolve common problems.

VI. System Automation
   A. Utilize system task schedulers.
   B. Read and write simple shell scripts.

VII. System Security Features
   A. Describe and configure system access restrictions.
   B. Describe and utilize methods of limiting root access.
   C. Configure limitations on system resource usage.
   D. Describe and utilize secure shell technologies.

Method of Evaluation and Competencies:

Grading Criteria: 
20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests
Total 100% 

Grading Scale:
A = 90 - 100%
B = 80 -  89%
C = 70 -  79%
D = 60 -  69%
F =  0 -  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 232

  • Title: Linux Networking*
  • Number: IT 232
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 231

Description:

This course is designed to provide students with information that enhances their ability to manage Linux systems in a networked environment. Included are topics related to configuring and managing network connectivity, and the installation, configuration, and securing of network services. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure and manage the network connection on a Linux server.
  2. Install and configure file sharing services.
  3. Configure and manage web services.
  4. Configure and manage network address services.
  5. Configure and manage mail services.
  6. Configure and manage firewall services.
  7. Configure and manage security. 

Content Outline and Competencies:

I. The Network Connection
   A. List the network settings on a Linux server. 
   B. Locate and setup or modify network settings on a Linux server.
   C. Troubleshoot network connectivity problems.

II. File Sharing Services
   A. Identify and list common file sharing technologies.
   B. Develop a plan to institute file sharing on a Linux server.
   C. Configure file sharing security on a Linux server.

III. Web Services
   A. Identify and list Linux web server parameters and settings.
   B. Install web services on a Linux server.
   C. Test web server capabilities.

IV. Network Address Services
   A. Identify and list Linux address server parameters and settings.
   B. Install address services on a Linux server.
   C. Test address server capabilities.

V. Mail Services
   A. Identify various Linux mail systems
   B. Implement and configure a mail system on a Linux server.
   C. Configure Linux clients to utilize a mail system.

VI. Firewall Services
   A. Describe the capabilities of the Linux firewall.
   B. Configure the Linux firewall on a Linux server.
   C. Write firewall rules.

VII. Security Configuration
   A. Identify Linux security components.
   B. Develop a plan to secure the Linux servers.
   C. Implement the security plan.
   D. Test security implementation.

Method of Evaluation and Competencies:

20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests

Grade Criteria:
  A =  90 to 100%
  B =  80 to  89%
  C =  70 to  79%
  D =  60 to  69%
  F =   0 to  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 233

  • Title: Linux Advanced Administration
  • Number: IT 233
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Description:

This course is designed to provide students with the skills and techniques to perform advanced administration tasks in a networked Linux environment. Topics will include compiling the Linux kernel, configuring advanced storage solutions, customizing system startup processes, and managing advanced network connections. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure the Linux kernel.
  2. Customize system startup and boot processes.
  3. Configure and utilize advanced filesystem features.
  4. Configure and administer advanced storage devices.
  5. Implement advanced network configurations.
  6. Perform advanced system maintenance.
  7. Implement name services.

Content Outline and Competencies:

I. Linux Kernel
   A. Describe the kernel.
   B. Obtain and install a kernel.
   C. Apply kernel patches.
   D. Build a custom kernel.
   E. Manage kernel modules.

II. System Startup
   A. Install and configure the bootloader.
   B. Configure startup scripts.
   C. Utilize startup recovery and repair strategies.

III. Filesystems
   A. Configure and mount various types of filesystems.
   B. Troubleshoot and repair filesystems.
   C. Tune filesystem parameters.
   D. Configure automount filesystems using AutoFS.
   E. Manage devices with udev.

IV. Storage Devices
   A. Configure storage device access.
   B. Configure and implement software RAID (Redundant Array of Independent Disks)..
   C. Configure and utilize LVM (Logical Volume Management).
   D. Tune disk access.

V. Network Configuration
   A. Configure a network device to connect to varioustypes of networks.
   B. Configure a network device to implement various network authentication schemes.
   C. Monitor network traffic.
   D. Troubleshoot network issues.

VI. System Maintenance
   A. Build and install programs from source.
   B. Plan and implement network backups.

VII. Name Services
   A. Describe the role of name services on the network.
   B. Configure a basic name server.
   C. Create and maintain zone files.
   D. Secure the name server.

Method of Evaluation and Competencies:

Quizzes/Projects/Assignments 20% - 40%
Performance Tests 60% - 80%
Total 100%

90 to 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 245

  • Title: Network Infrastructure*
  • Number: IT 245
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 221

Description:

This course is designed to provide an in-depth understanding of the ability to install, manage, monitor, configure and troubleshoot DNS, DHCP, Remote Access, Network Protocols, IP Routing and WINS in a Windows 2000 network infrastructure. In addition, it will provide an in-depth understanding of the ability to manage, monitor and troubleshoot Network Address Translation and Certificate Services. Laboratory exercises will accompany the lectures. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install and configure TCP/IP on a client machine.
  2. Define IP addressing and its network classes.
  3. Calculate IP address subnet mask.
  4. Describe the IP address resolution process.
  5. Install, configure and troubleshoot IP routing protocols.
  6. Manage and monitor IP routing.
  7. Install, configure, manage, monitor and troubleshoot DHCP server.
  8. Explain NetBIOS name resolution methods.
  9. Install, manage, monitor, troubleshoot and configure WINS server and WINS replication.
  10. Install, configure, manage, monitor and troubleshoot DNS (Domain Name Service).
  11. Install, configure, manage, monitor and troubleshoot Remote Access.
  12. Install, configure, manage, monitor and troubleshoot Network Address Translation (NAT).
  13. Install, configure, manage, monitor and troubleshoot IPSec.
  14. Install, configure, manage, monitor and troubleshoot Certificate Authority.
  15. Document Server installation. 

Content Outline and Competencies:

I. Installing and Configuring TCP/IP
   A. Prepare the client machine for installing TCP/IP.
   B. Install the TCP/IP protocol suite.
   C. Configure TCP/IP for network communication.
   D. Describe TCP/IP utilities.

II. Defining IP Addressing and Its Network Classes
   A. Identify node address.
   B. Identify network address.
   C. Define network classes.
   D. Describe special addresses.

III. Subneting and Subnet Masking
   A. Define IP address subnets.
   B. Analyze subnets benefits.
   C. Calculate subnets masks.
   D. Contrast subneting and superneting.

IV. IP Address Resolution Process
   A. Explain IP address resolution.
   B. Outline the role of ARP.
   C. Compare MAC addressing to IP addressing.

V. IP Routing
   A. Configure static IP routers.
   B. Build a routing table.
   C. Configure dynamic IP routing.
   D. Describe routing internet protocol.
   E. Contrast static and dynamic IP routing.

VI. The Dynamic Host Configuration Protocol
   A. Distinguish between manual and automatic configuration.
   B. Outline how DHCP works.
   C. Describe IP lease request and offer.
   D. Install and configure a DHCP server.

VII. NetBIOS Name Resolution
   A. Explain NetBIOS naming.
   B. Describe resolving local NetBIOS names using a broadcast.
   C. Describe resolving names with a NetBIOS name server.
   D. NetBIOS over TCP/IP name resolution nodes.
   E. Create a HOSTS file to resolve NetBIOS names.

VIII. Implementing Windows Internet Name Service
   A. Define WINS role in name resolution.
   B. Install WINS server.
   C. Configure static entries for non-WINS clients.
   D. Configure a WINS proxy agent.
   E. Configure a DHCP server for WINS.

IX. Domain Name System (DNS)
   A. Outline DNS operation.
   B. Explain name resolution using DNS server.
   C. Create the DNS files.
   D. Install a DNS server.

X. Remote Access
   A. Explain Remote Access.
   B. Configure inbound connections.
   C. Create a remote access policy.
   D. Configure a remote access profile, a virtual private network (VPN),
multilink connections, and routing and remote access for DHCP
integration.
   E. Configure authentication and encryption protocols.

XI. Network Address Translation (NAT)
   A. Install Internet Connection Sharing.
   B. Install NAT.
   C. Configure NAT properties and interfaces.
   D. Troubleshoot NAT.

XII. IPSec
   A. Enable IPSec.
   B. Configure IPSec for transport or tunnel mode.
   C. Customize IPSec policies and rules.
   D. Manage and monitor IPSec.

XIII. Certificate Authority
   A. Install and configure Certificate Authority.
   B. Issue and revoke certificates.
   C. Remove the Encrypting File System (EFS) recovery keys.

XIV. Server Documentation
   A. Create screen captures.
   B. Save captured graphics in files.
   C. Create and print documents containing server documentation.

Method of Evaluation and Competencies:

Tests    40% of grade
Lab      30% of grade
Projects 30% of grade
Total   100%
Grading Scale:

90 - 100% = A
80 -  89% = B
70 -  79% = C
60 -  69% = D
Below 60% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 247

  • Title: Accessing Wide Area Networks*
  • Number: IT 247
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145 and IT 209

Description:

The goal is to develop an understanding of various Wide Area Network (WAN) technologies to connect medium-size business networks. The course focuses on WAN technologies including Point-to-Point Protocol (PPP), Frame Relay and broadband links. WAN security concepts are discussed in detail, including types of threats, how to analyze network vulnerabilities, and general methods for mitigating common security threats. The course explains the principles of Access Control Lists (ACLs) and describes how to implement IP addressing services for an enterprise network, including Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP). IPv6 addressing concepts are also discussed. Finally, students learn how to troubleshoot and correct common network implementation issues. 2 hrs. lecture, 3 hrs. lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain key Wide Area Network (WAN) technology concepts.
  2. Discuss and configure Point-to-Point Protocol (PPP) concepts and authentication.
  3. Describe and configure Frame Relay.
  4. Discuss and manage network security.
  5. Discuss and configure Access Control Lists (ACLs).
  6. Describe business requirements for Teleworker services.
  7. Discuss and configure Internet Protocol (IP) addressing services including Dynamic Host Configuration Protocol (DHCP), Network Address Translation (NAT) and IPv6.
  8. Discuss and apply network troubleshooting methodologies and tools.

Content Outline and Competencies:

I. WAN Access 
   A. Describe how the Cisco enterprise architecture provides integrated services over an enterprise network.
   B. Explain key WAN technology concepts. 
   C. Select the appropriate WAN technology to meet different enterprise business requirements 
II. PPP 
   A. Explain the fundamental concepts of point-to-point serial communication. 
   B. Explain key PPP concepts. 
   C. Configure PPP encapsulation. 
   D. Discuss and configure PAP and CHAP authentication 
III. Frame Relay 
   A. Explain the fundamental concepts of Frame Relay technology in terms of enterprise WAN services, including operation, implementation requirements, maps, and Local Management Interface (LMI) operation. 
   B. Configure a basic Frame Relay permanent virtual circuit (PVC), including configuring and troubleshooting Frame Relay on a router serial interface and configuring a static Frame Relay map. 
   C. Explain advanced concepts of Frame Relay technology in terms of enterprise WAN services, including subinterfaces, bandwidth, and flow control. 
   D. Configure an advanced Frame Relay PVC, including solving reachability issues, configuring subinterfaces, and verifying and troubleshooting a Frame Relay configuration. 
IV. Network Security 
   A. Identify security threats to enterprise networks. 
   B. Describe methods to mitigate security threats to enterprise networks. 
   C. Configure basic router security. 
   D. Disable unused router services and interfaces. 
   E. Use the Cisco Security Device Manager (SDM) one-step lockdown feature. 
   F. Manage files and software images with the Cisco IOS Integrated File System (IFS). 
V. Access Control Lists (ACLs) 
   A. Explain how ACLs are used to secure a medium-size enterprise branch office network, including the concept of packet filtering, the purpose of ACLs, how ACLs are used to control access, and the types of Cisco ACLs. 
   B. Configure standard ACLs in a medium-size enterprise branch office network, including defining filtering criteria, configuring standard ACLs to filter traffic, and applying standard ACLs to router interfaces. 
   C. Configure extended ACLs in a medium-size enterprise branch office network, including configuring extended ACLs and named ACLs, configuring filters, verifying and monitoring ACLs, and troubleshooting extended ACL issues.
   D. Describe complex ACLs in a medium-size enterprise branch office network, including configuring dynamic, reflexive and timed ACLs; verifying and troubleshooting complex ACLs; and explaining relevant caveats. 
VI. Teleworker Services 
   A. Describe the enterprise requirements for providing teleworker services, including the differences between private and public network infrastructures. 
   B. Describe the teleworker requirements and recommended architecture for providing teleworking services. 
   C. Explain how broadband services extend enterprise networks using DSL, cable and wireless technology. 
   D. Discuss the importance of VPN technology, including its role and benefits for enterprises and teleworkers. 
   E. Describe how VPN technology can be used to provide secure teleworker services to an enterprise network. 
VII. IP Addressing Services 
   A. Configure a router to be a Dynamic Host Configuration Protocol (DHCP) server 
   B. Describe how to integrate private addresses and configure Network Address Translation (NAT). 
   C. Describe IPv6 and how to configure routers to exchange IPv6 routes using Routing Information Protocol (RIPng). VIII. Network Troubleshooting 
   A. Establish and document a network baseline. 
   B. Describe the various troubleshooting methodologies and troubleshooting tools. 
   C. Discuss the common issues that occur during WAN implementation. 
   D. Identify and troubleshoot common enterprise network implementation issues using a layered model approach.

Method of Evaluation and Competencies:

Evaluation of student mastery of course competencies will be accomplished using the following methods:

Quizzes 25% - 35%

Labs 30% - 40%

Final Exam 20% - 30%

Final Skills Assessment 10% - 15%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59 % = F

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 256

  • Title: Windows Security*
  • Number: IT 256
  • Effective Term: 2015-16
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Requirements:

Prerequisites: IT 225 and IT 245

Description:

This course is designed to provide students with the skills and techniques to properly secure a Windows network. The topics will include building a Windows Active Directory infrastructure, securing the Windows Active Directory infrastructure and penetrating the infrastructure with current hacking tool kits. This course serves as a capstone course in the Windows track of the Information Technology Department. It is the last course in a series of six Windows classes. It takes concepts and skills learned in the pre-requisite Windows courses and ties them together focusing on securing a Windows network. 3 hrs. lecture, 2 hrs. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Plan and implement a firewall strategy.
  2. Create and install an Active Directory infrastructure.
  3. Design and implement a user and computer authorization strategy.
  4. Secure remote access.
  5. Implement a user and computer security strategy.
  6. Install, configure and manage Software Update Services (SUS).
  7. Install, configure and manage Certificate Services.
  8. Implement a user and computer authentication strategy.
  9. Plan and configure Internet Protocol Security (IPSec).
  10. Implement hacking tool kits to identify and analyze network security vulnerabilities.

Content Outline and Competencies:

I. Firewall Strategy
  A. Describe the basic framework for designing network security. 
  B. Plan and design the firewall. 
  C. Install and configure the firewall. 
  D. Test the firewall. 
 
II. Active Directory Infrastructure
  A. Identify key concepts used throughout the Windows security.  
  B. Plan and design an Active Directory infrastructure. 
  C. Install and configure the Active Directory infrastructure. 
  D. Harden installed servers and computers for specific roles. 

III. Authorization Strategy 
  A. Create user and group accounts. 
  B. Create share permissions. 
  C. Test share permissions. 
  D. Identify New Technology File System (NTFS) permissions. 
  E. Create and nest group resources. 

IV. Remote Access
  A. Create a remote user. 
  B. Configure Routing and Remote Access Services (RRAS) and create a policy.
  C. Configure and establish a Virtual Private Network (VPN) connection.

V. Security Policies and Strategy  
  A. Create a Windows security templates console. 
  B. Configure default domain policies and software restriction policies. 
  C. Deploy the security policies using group policies. 
  D. Test policies. 
  E. Create Results of Policy (RSoP) console. 

VI. Software Update Services 
  A. Install and configure SUS.
  B. Configure the automatic update client. 
  C. Secure automatic updates and clients. 

VII. Certificate Services
  A. Install and configure certificate authorities. 
  B. Configure the certificate template. 
  C. Request a certificate through web enrollment. 

VIII. Authentication Strategy 
  A. Install and configure network monitoring. 
  B. Capture network traffic. 
  C. Capture Kerberos traffic. 
  D. Configure packet filtering. 

IX. IPSec 
  A. Create an IP filter list. 
  B. Create IP filter actions. 
  C. Create an IP security policy. 
  D. Implement and test the IP security policy. 
 
X. Hacking Tool Kits 
  A. Install and configure network hacking tools. 
  B. Hack student firewall and servers. 
  C. Review and analyze hacks on firewalls and servers.

Method of Evaluation and Competencies:

Hands in lab = 25-40% 
Learning Modules = 15%-30% 
Performance Tests = 45%-60%  
 
  Grade Criteria:
  90 - 100% = A      
  80 -  89% = B          
  70 -  79% = C    
  60 -  69% = D  
  Below 60% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 271

  • Title: Information Technology Internship I*
  • Number: IT 271
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: IT 210 or IT 221 or IT 230 and department approval

Description:

This course affords the student the opportunity to apply classroom knowledge to an actual work environment. It will provide advanced information technology students with appropriate on-the-job experience with area employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours a semester at an approved job site.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable level of preparedness, personally and professionally, for a career. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the
workplace.
   B. Keep a log book of weekly activities or tasks performed while at the
workplace.
   C. Furnish activity log compiled for each week of work to the
instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties
were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company
produces.
   D. Provide a detailed description of products and services the student
was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area
network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business
environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business
environment.

Method of Evaluation and Competencies:

Percent not to exceed:
Instructor's on-site visits and evaluations       20%
Weekly work log                                   20%
Evaluation of the student by the work supervisor  60%
Total                                            100%

Grading Scale (percentage of total points):
90 - 100 = A
80 -  89 = B
70 -  79 = C
60 -  69 = D
Below 60 = F

Grade Criteria:

Caveats:

  1. Transportation to work site is the responsibility of the student. 

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 272

  • Title: Information Technology Internship II*
  • Number: IT 272
  • Effective Term: 2015-16
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: IT 271 and department approval

Description:

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable preparedness, personally and professionally, for a career position. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the
workplace.
   B. Keep a log book of weekly activities or tasks performed while at the
workplace.
   C. Furnish activity log compiled for each week of work to the
instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties
were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company
produces.
   D. Provide a detailed description of products and services the student
was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area
network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business
environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business
environment.

Method of Evaluation and Competencies:

Percent not to exceed:
Instructor's on-site visits and evaluations 20%
Weekly work log 20%
Evaluation of the student by the work supervisor 60%

Grading Scale (Percentage of Total Points):
90 - 100 = A
80 -  89 = B
70 -  79 = C
60 -  69 = D
Below 60 = F

Grade Criteria:

Caveats:

  1. Transportation to work site is the responsibility of the student. 

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 292

  • Title: Special Topics:*
  • Number: IT 292
  • Effective Term: 2015-16
  • Credit Hours: 1
  • Contact Hours: 1
  • Lecture Hours: 1

Requirements:

Prerequisites: Department approval

Description:

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit; but only on different topics.

Course Fees:

Varies

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Appropriately use terminology related to the special topic. 
  2. Solve problems by using content related to the special topic.
  3. Demonstrate conceptual understanding of the special topic.
  4. Use software and hardware related to the special topic.

Content Outline and Competencies:

Will vary within the guidelines of the educational affairs committee.

Method of Evaluation and Competencies:

Will vary within the guidelines of the educational affairs committee.

Grade Criteria:

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).