This is an archived copy of the Spring 2015 Catalog. To access the most recent version of the catalog, please visit http://catalog.jccc.edu/.

Information Technology (IT)

Courses

IT 140   Networking Fundamentals (4 Hours)

This course serves as the first module of four that are designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification. The course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the CCNA curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. 3 hrs. lecture 2 hrs. open lab/wk.

IT 145   Routing and Switching Essentials* (3 Hours)

Prerequisites: IT 140

This course is designed to provide students with a fundamental understanding of network routing and switching. Students successfully completing this course will be able to configure and troubleshoot routers and switches and resolve common issues with RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) in IPv4 and IPv6 (Internet Protocol version 4 and 6) networks. Laboratory exercises will accompany lectures. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 203   Voice Over IP Fundamentals* (4 Hours)

Prerequisites: IT 145

This course is designed to provide students with the fundamentals of Voice over IP (VoIP) networking technology. Concepts covered include an explanation of the national voice and data network, telephony terminology, VoIP protocol analysis and telephony survey techniques. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 205   Implementing Windows Client (3 Hours)

The focus of this course is the use of Microsoft Windows as an operating system in a business environment. Planning a simple network system, installation and configuration of the software and hardware, resource management, connectivity, running application software under Windows, monitoring and optimizing system hardware, and troubleshooting all lead the student to a deeper understanding of local area network use and administration. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 209   Scaling Networks* (4 Hours)

Prerequisites: IT 145

This course is designed to provide students with the necessary knowledge and skills to interconnect and configure routers and switches in large networks. Students successfully completing this course should be able to perform switch and router administration tasks including installing, configuring and troubleshooting. Students will build networks based on the hierarchical design model supported by Virtual Local Area Networks (VLANs), Spanning Tree Protocol (STP), Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) in Internet Protocol Version 4 and 6 (IPv4 and IPv6) networks. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 221   Windows Server* (3 Hours)

Prerequisites: IT 205

This course is designed to provide students with the knowledge and skills to perform competently in the role of a network administrator utilizing the Windows network operating system. Students completing this course will be able to accomplish basic fundamental network management tasks, including planning server roles and subsequent requirements, planning the network file system, implementing user accounts and file system security, implementing network printing, and managing the network servers. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 225   Windows Active Directory Services* (3 Hours)

Prerequisites: IT 221

The focus of this course is using Microsoft Windows Server or Advanced Server software to install, configure and troubleshoot Active Directory components, Domain Name Space (DNS) for Active Directory and Active Directory security solutions. The course also emphasizes the skills required to manage, monitor and optimize the desktop environment using Group Policy. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 228   Exchange Server* (3 Hours)

Prerequisites: IT 225

This course is designed to provide network administrators with information that enhances their ability to manage an Exchange server network. Included are topics related to server and client mail management and server performance, e-mail concepts and advanced Internet networking. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 230   Linux Fundamentals (3 Hours)

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to execute common Linux commands and utilities; and accomplish system tasks such as navigating the file system, applying file system security, managing user accounts, using the printing environment, and utilizing the resources of a basic Linux system. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 231   Linux Administration* (3 Hours)

Prerequisites: IT 230

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including installing, configuring and troubleshooting a basic Linux system, managing devices, implementing the printing environment, installing software packages, and configuring the graphical user interface. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 232   Linux Networking* (4 Hours)

Prerequisites: IT 231

This course is designed to provide students with information that enhances their ability to manage Linux systems in a networked environment. Included are topics related to configuring and managing network connectivity, and the installation, configuration, and securing of network services. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 233   Linux Advanced Administration (4 Hours)

This course is designed to provide students with the skills and techniques to perform advanced administration tasks in a networked Linux environment. Topics will include compiling the Linux kernel, configuring advanced storage solutions, customizing system startup processes, and managing advanced network connections. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 245   Network Infrastructure* (3 Hours)

Prerequisites: IT 221

This course is designed to provide an in-depth understanding of the ability to install, manage, monitor, configure and troubleshoot DNS, DHCP, Remote Access, Network Protocols, IP Routing and WINS in a Windows 2000 network infrastructure. In addition, it will provide an in-depth understanding of the ability to manage, monitor and troubleshoot Network Address Translation and Certificate Services. Laboratory exercises will accompany the lectures. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 247   Accessing Wide Area Networks* (3 Hours)

Prerequisites: IT 145 and IT 209

The goal is to develop an understanding of various Wide Area Network (WAN) technologies to connect medium-size business networks. The course focuses on WAN technologies including Point-to-Point Protocol (PPP), Frame Relay and broadband links. WAN security concepts are discussed in detail, including types of threats, how to analyze network vulnerabilities, and general methods for mitigating common security threats. The course explains the principles of Access Control Lists (ACLs) and describes how to implement IP addressing services for an enterprise network, including Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP). IPv6 addressing concepts are also discussed. Finally, students learn how to troubleshoot and correct common network implementation issues. 2 hrs. lecture, 3 hrs. lab/wk.

IT 249   Advanced Routing* (3 Hours)

Prerequisites: IT 247

This course provides advanced instruction of Cisco routers found in medium to large networks. It is intended for students preparing for advanced Cisco certification. Upon completion of this course, the student will be able to select and implement the appropriate Cisco services required to build a scalable router network. Topics covered include extending IP addressing, implementing OSPF for a single area and multiple areas, configuring EIGRP, and implementing BGP. This course will follow semester five in the Cisco Networking Academy curriculum. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 250   Networking Seminar* (3 Hours)

Prerequisites: IT 225 and IT 247

This course is designed to teach advanced concepts in information technology. Topics covered are section specific and include e-mail servers, Web servers, database servers, routing, switching and advanced LAN design concepts. Prerequisites are posted for each section. Students may use this course as a capstone for applying concepts and procedures developed in previous courses using realistic business scenarios. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

IT 251   Network Security Fundamentals* (4 Hours)

Prerequisites: IT 247

This course is designed to provide students with a fundamental understanding of network security principles and implementation. Topics covered include authentication, the types of attacks and malicious code that may be used against computer networks, the threats and countermeasures for e-mail, Web applications, remote access, and file and print services. A variety of security topologies will be discussed as well as technologies and concepts used for providing secure communication channels, secure internetworking devices, intrusion detection systems, and firewalls. Hands-on exercises will be used to reinforce the concepts. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 253   Advanced Switching* (3 Hours)

Prerequisites: IT 247

This course provides advanced instruction of Cisco switches found in medium to large networks. It introduces students to the deployment of the state-of-the art campus Local Area Networks (LAN). The course focuses on the selection and implementation of the appropriate Cisco Internetworking Operating System (IOS) services to build reliable scalable multilayer-switches LANs. Students will develop skills with Virtual LANs (VLAN), Virtual Trunking Protocol (VTP), Spanning Tree Protocol (STP), inter-VLAN routing, redundancy, Quality of Service (QoS) issues, campus LAN security, and transparent LAN services. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 256   Windows Security* (4 Hours)

Prerequisites: IT 225 and IT 245

This course is designed to provide students with the skills and techniques to properly secure a Windows network. The topics will include building a Windows Active Directory infrastructure, securing the Windows Active Directory infrastructure and penetrating the infrastructure with current hacking tool kits. This course serves as a capstone course in the Windows track of the Information Technology Department. It is the last course in a series of six Windows classes. It takes concepts and skills learned in the pre-requisite Windows courses and ties them together focusing on securing a Windows network. 3 hrs. lecture, 2 hrs. open lab/wk.

IT 271   Information Technology Internship I* (3 Hours)

Prerequisites: IT 210 or IT 221 or IT 230 and department approval

This course affords the student the opportunity to apply classroom knowledge to an actual work environment. It will provide advanced information technology students with appropriate on-the-job experience with area employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours a semester at an approved job site.

IT 272   Information Technology Internship II* (3 Hours)

Prerequisites: IT 271 and department approval

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

IT 292   Special Topics:* (1-3 Hour)

Prerequisites: Department approval

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit; but only on different topics.

IT 140

  • Title: Networking Fundamentals
  • Number: IT 140
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Description:

This course serves as the first module of four that are designed to prepare students to complete the Cisco Certified Network Associate (CCNA) Certification. The course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the CCNA curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. 3 hrs. lecture 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Understand and describe the devices and services used to support communications in data networks and the internet.

  2. Understand and describe the role of protocol layers in data networks.

  3. Understand and describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments.

  4. Design, calculate, and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 networks.

  5. Explain fundamental Ethernet concepts such as media, services, and operations.

  6. Build a simple Ethernet network using routers and switches.

  7. Use Cisco command-line interface (CLI) commands to perform basic router and switch configurations.

  8. Utilize common network utilities to verify small network operations and analyze data traffic.

Content Outline and Competencies:

I. Exploring the Network
    A. Explain how networks affect the way we interact, learn, work and play.
    B. Describe how networks support communication.
    C. Explain the concept of converged network.
    D. Describe the four basic requirements of a reliable network.
    E. Explain the use of network devices.
    F. Compare the devices and topologies of a LAN (local area network) to the devices and topologies of a WAN (wide area network).
    G. Explain the basic structure of the Internet.
    H. Explain how LANs and WANs interconnect to the Internet.
    I. Describe the impact of BYOD (bring your own device), online collaboration, video, and cloud computing on a business network.
    J. Explain how networking technologies are changing the home environment.
    K. Identify some basic security threats and solutions for both small and large network.
    L. Explain how the three Cisco enterprise architectures work to meet the needs of the evolving network environment.
II. Configuring a Network Operating System
    A. Explain the purpose of Cisco IOS(Internetwork Operating System)
    B. Explain how to access and navigate Cisco IOS to configure network devices
    C. Describe the command structure of Cisco IOS software.
    D. Configure hostnames on a Cisco IOS device using the CLI (command line interface).
    E. Use Cisco IOS commands to limit access to device configurations.
    F. Use Cisco IOS commands to save the running configuration.
    G. Explain how devices communicate across network media.
     H. Configure a host device with an IP (internet protocol) address.
     I. Verify connectivity between two end devices.
III. Network Protocols and Communications
     A. Explain why protocols are necessary in communication.
     B. Explain the purpose of adhering to a protocol suite.
     C. Explain the role of standards organizations in establishing protocols for network interoperability.
     D. Explain how the TCP/IP (transmission control protocol/internet protocol) model and the OSI model are used to facilitate standardization in the communication process.
     E. Explain why RFCs (request for comments) became the process for establishing standards.
     F. Describe the RFC (request for comments) process.
     G. Explain how data encapsulation allows data to be transported across the network.
     H. Explain how local hosts access local resources on a network.
     I. Explain how local hosts access remote resources on a network.
IV. Network Access
     A. Identify device connectivity options.
     B. Describe the purpose and functions of the physical layer in the network.
     C. Describe basic principles of the physical layer standards.
     D. Identify the basic characteristics of copper cabling.
     E. Build a UTP (unshielded twisted pair) cable used in Ethernet networks.
     F. Describe fiber-optic cabling and its main advantages over the media.
     G. Describe wireless media.
     H. Select the appropriate media for a given requirement and connect devices.
     I. Describe the purpose and function of the data link layer in preparing communication for transmission on specific media.
     J. Describe the layer 2 frame structure and identify generic fields.
     K. Identify several sources for the protocols and standards used by the data link layer.
     L. Compare the functions of logical topologies and physical topologies.
     M. Describe the basic characteristics of media access control methods on WAN topologies. N. Describe the basic characteristics of media access control methods on LAN topologies.
     O. Describe the characteristics and functions of data link frame.
V. Ethernet
     A. Describe the operation of the Ethernet sub layers.
     B. Identify the major fields of Ethernet frame
     C. Describe the purpose and the characteristics of Ethernet MAC (media access control) address
     D. Describe the purpose of ARP (address resolution protocol)
     E. Explain how ARP requests impact network and host performance
     F. Explain basic switching concepts
     G. Compare fixed configuration and modular switches
     H. Configure a Layer 3 switch
VI. Network Layer
     A. Describe the purpose of the network layer in data communication
     B. Explain why the IPV4 protocol requires other layers to provide reliability
     C. Explain the role of the major header fields in the IPv4 and IPv6 packets
     D. Explain how host devices use routing tables to direct packets to itself, a local destination, or a default gateway.
     E. Compare a host routing table to a routing table in a router.
     F. Describe the common components and interfaces of a router.
     G. Describe the boot-up process of a Cisco IOS router
     H. Configure initial settings on a Cisco IOS router
     I. Configure two active interfaces on a Cisco IOS router
     J. Configure the default gateway on a network devices
VII. Transport Layer
     A. Describe the purpose of the transport layer in managing the transportation of data in end-to-end communication.
     B. Describe characteristics of the TCP (transmission control protocol) and UDP (user datagram protocol) protocols, including port numbers and their uses.
     C. Explain how TCP session establishment and termination process facilitate reliable communication
     D. Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery
     E. Describe the UDP client processes to establish communication with a server
     F. Determine whether high-reliability TCP transmissions, or non-guaranteed UDP transmissions, are best suited for common applications.
VIII. IP Addressing
     A. Describe the structure of an IPv4 address
     B. Describe the purpose of the subnet mask
     C. Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses
     D. Compare the use of public address space and private address space
     E. Explain the need for IPv6 addressing
     F. Describe the representation of an IPv6 address
     G. Describe types of IPv6 network addresses
     H. Configure global unicast addresses
     I. Describe multicast addresses
     J. Describe the role of ICMP(internet control message protocol) in an IP network (include IPv4 and IPv6).
     K. Use ping and traceroute utilities to test network connectivity.
IX. Subnetting IP Networks
     A. Explain why routing is necessary for hosts on different subnets to communicate
     B. Describe IP as a communication protocol used to identify a single device on a network.
     C. Given a network and subnet mask, calculate the number of host addresses available.
     D. Calculate the necessary subnet mask in order to accommodate a given number of hosts.
     E. Describe the benefits of variable length subnet masking (VLSM).
     F. Describe and implement a hierarchical addressing scheme.
     G. Explain how IPv6 address assignments are implemented in a business network
X. Application Layer
     A. Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
     B. Describe how common application layer protocols interact with end user applications.
     C. Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
     D. Describe application layer protocols that provide IP addressing services, including: DNS (domain name server) and DHCP (dynamic host configuration protocol).
     E. Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP (file transfer protocol), File Sharing Services, SMB (simple message block) protocol.
     F. Explain how data is moved across the network, from opening an application, to receiving data.
XI. It's a Network
     A. Identify the devices and protocols used in a small network
     B. Explain how a small network serves as a basis of larger networks.
     C. Describe the need for basic security measures on network devices
     D. Identify security vulnerabilities and general mitigation techniques
     E. Configure network devices with device hardening features to mitigate security threats
     F. Use the output of the ping and tracert commands to establish relative network performance.
     G. Use basic show commands to verify the configuration and status of a device interface.
     H. Use the basic host and IOS commands to acquire information about the device in a network.
     I. Explain file systems on routers and switches.
     J. Apply the commands to back up and restore an IOS configuration file. 

Method of Evaluation and Competencies:

Hands on labs:                      25 - 35%

Quizzes:                               15 - 25%

Performance Tests:               10 - 20%

Final:                                    25 - 35%

Total:                                    100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 145

  • Title: Routing and Switching Essentials*
  • Number: IT 145
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Requirements:

Prerequisites: IT 140

Description:

This course is designed to provide students with a fundamental understanding of network routing and switching. Students successfully completing this course will be able to configure and troubleshoot routers and switches and resolve common issues with RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) in IPv4 and IPv6 (Internet Protocol version 4 and 6) networks. Laboratory exercises will accompany lectures. 3 hrs. lecture, 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the process of network routing and switching.
  2. Configure and verify static and default routing.
  3. Evaluate the characteristics of dynamic routing protocols.
  4. Design and implement network addressing schemes.
  5. Describe, configure and verify RIP operation.
  6. Describe, configure and verify single-area OSPF.

Content Outline and Competencies:

I. Network Routing and Switching

A. Describe the functions and features of a router.

B. Describe how a router determines a path and switches packets

C. Use CLI (Command Line Interface) to perform and verify initial configuration tasks for a small routed network.

D. Describe switching technologies such as VLANs, VTP (Virtual Local Area Network Trunking Protocol) and STP (Spanning Tree Protocol).

II. Static and Default Routing

A. List common requirements for static routing.

B. Describe, configure and verify static routing.

C. Describe, configure and verify default routing.

III. Dynamic Routing Protocols

A. Explain the role of dynamic routing protocols and place these protocols in the context of modern network design.

B. Compare and contrast distance-vector and link-state routing protocols.

C. Describe the basic structure of the routing table.

IV. Network Addressing Schemes

A. Compare and contrast classful and classless network addressing.

B. Design and implement  IPv4 and IPv6 addressing schemes.

C. Troubleshoot and correct common network addressing problems.

D. Describe the operations of DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System) for IPv4 and IPv6.

V. RIP

A. Describe the basic characteristics and operation of RIP.

B. Configure RIP in a small network.

C. Verify and troubleshoot RIP operation.

Method of Evaluation and Competencies:

Evaluation of student mastery of course competencies will be accomplished using the following methods:
30-70% Assignments/Labs
30-70% Tests
Total 100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59 % = F

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 203

  • Title: Voice Over IP Fundamentals*
  • Number: IT 203
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145

Description:

This course is designed to provide students with the fundamentals of Voice over IP (VoIP) networking technology. Concepts covered include an explanation of the national voice and data network, telephony terminology, VoIP protocol analysis and telephony survey techniques. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the history and advent of telephony.
  2. Define specialized VoIP, PBX and Public Voice and Data network terminology.
  3. Explain the basics of internal telephone systems environment and peripherals.
  4. Identify and explain network service providers and local competition.
  5. Explain the public voice and data network infrastructure.
  6. Define specialized network services.
  7. Outline the basics of analog, cable TV, digital modems and set-top boxes.
  8. Define and analyze VoIP protocols.
  9. Explain telephony corporate user applications.
  10. Learn how to define user applications by telephony survey methods.
  11. Demonstrate VoIP programming fundamentals. 

Content Outline and Competencies:

I. History and Advent of Voice and Data Telephony
   A. Review Public Switch Telephone Network history and key events
   B. Review PBX System vendors, history and key events
   C. Review Internet history and key events
   D. Review VoIP vendors, history and key events

II. VoIP, PBX and Public Voice and Data Network Terminology
   A. Identify system wide features, capabilities and components
   B. Identify Attendant features, capabilities and components
   C. Identify user features, capabilities and component
   D. Identify special features, capabilities and component

III. Basics of Internal Telephone Systems Environment and Peripherals
   A. Define parameters of an internal telephone system for small to
mid-size companies
   B. Define parameters of an internal telephone system a large company
   C. Define parameters of an internal telephone system a enterprise
company environment

IV. Network Service Providers and Local Competition
   A. Identify and define the national public switch telephone network
   B. Identify and define the national public data network
   C. Identify and define the local voice and data network

V. Public Voice and Data Network Infrastructure
   A. Identify the parameters, boundaries and infrastructure of the public
switch network  
   B. Identify the parameters, boundaries and infrastructure of the
Internet
   C. Identify the parameters, boundaries and infrastructure of the local
telecos

VI. Specialized Network Services
   A. Review and define special voice telephone applications
   B. Review and define special VoIP applications

VII. Basics of Analog, Cable TV, Digital Modems and Set-top Boxes
   A. Explain analog to digital transmission
   B. Review peripherals NT1s, CSUs and cable modems
   C. Review cable voice and data networks.

VIII. Define and Analyze VoIP Protocols
   A. Define and explain VoIP public network protocols
   B. Define and explain VoIP LAN network protocols
   C. Define and explain VoIP user protocols

IX. Telephony Corporate User Applications
   A. Review corporate user telephony internal applications Automatic Call
Distribution, Unified Messaging, Voice Mail and other applications
   B. Review corporate user telephony external applications enterprise
networks, ISDN, T-1s and other applications

X. User Applications by Telephony Survey Methods and Implementation of a
VoIP Network
   A. Develop a plan to survey corporate users, attendants and executive
staff
   B. Learn to assemble survey results
   C. Present survey results and cost justifications to management

XI. VoIP Programming Fundamentals
   A. Demonstrate programming a VoIP Call Manager to the Public Switch
Telephone Network
   B. Demonstrate programming a VoIP Voice Mail Manager and associated
telephone extension

Method of Evaluation and Competencies:

Assessment Test      50%
Quizzes              25%
Projects/Assignments 25%
  Total:            100%

Grade Criteria:
  A =  90 to 100%
  B =  80 to  89%
  C =  70 to  79%
  D =  60 to  69%
  F =   0 to  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 205

  • Title: Implementing Windows Client
  • Number: IT 205
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

The focus of this course is the use of Microsoft Windows as an operating system in a business environment. Planning a simple network system, installation and configuration of the software and hardware, resource management, connectivity, running application software under Windows, monitoring and optimizing system hardware, and troubleshooting all lead the student to a deeper understanding of local area network use and administration. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basics of the Windows operating system.
  2. Install Windows operating system.
  3. Add/remove hardware components in Windows.
  4. Use control panel for basic operating system setup.
  5. Upgrade to Windows in a given situation.
  6. Configure server-based installation for wide-scale deployment in a given situation.
  7. Create and manage local user and group accounts; set up and modify user profiles; create shared folders and permissions. Install and configure printers in a shared environment.
  8. Use multiple methods of connecting a workstation to the network and its resources. Set up a TCP/IP connection to the Internet. Install and configure dial-up networking.
  9. Start and run applications in various operations system environments.
  10. Monitor, identify and resolve a performance problem. Optimize system performance.
  11. Identify and implement solutions for the following problems: boot process failure, printer failure, installation process failure, application failure, and resource access failure.
  12. Modify the registry using the appropriate tools in a specific situation.  

Content Outline and Competencies:

I. Planning Network Installation
   A. Choose an appropriate operating system for a specific situation.
   B. Differentiate between Windows server and other server operating
systems.
   C. Create unattended installation files.
   D. Choose the appropriate file structure for a specific situation.
   E. Create a dual-boot system.
   F. Differentiate between Windows Server and Windows Client OS.

II. Installing Windows Client Operating System
   A. Prepare a hard drive for Windows installation.
   B. Demonstrate partitioning the drives.
   C. Explain the major differences between installing and upgrading
Windows.
   D. Remove Windows from a hard drive.

III. Installing, Configuring and Removing Hardware Components
   A. Explain the hardware compatibility list.
   B. Choose the required hardware for a specified situation.
   C. Explain how various pieces of hardware are installed.
   D. Find and install the appropriate drivers.
   E. Explain how to best avoid hardware conflicts.
   F. Remove hardware and drivers from a Windows installation.
   G. Demonstrate updating drivers.

IV. Using Control Panel Applications
   A. Describe the control panel and its various options.
   B. Explain how system settings affect Windows.
   C. Configure the telephone feature.
   D. Install applications.
   E. Set user-specific variables.

V. Upgrading Windows
   A. Explain the ramification of upgrading to Windows from another
system.
   B. Determine the best upgrade path for a specific situation.
   C. Explain upgrading to Windows from other operating systems.

VI. Installing Windows from a Server-Based Computer
   A. Contrast the advantages and disadvantages of wide-scale deployment.
   B. Demonstrate how to create a network share.
   C. Install files on the client computer.
   D. Set permissions on the client computer.

VII. Establishing Users, Groups, Policies and Resources
   A. Explain the advantages and disadvantages of multiple-user systems.
   B. Create and configure users and user accounts.
   C. Demonstrate how to modify local and global groups.
   D. Develop security policies for the system.
   E. Assign permissions to network resources.

VIII. Connections Using the TCP/IP Protocol
   A. Explain the basics of TCP/IP architecture.
   B. Configure TCP/IP on an NT Workstation.
   C. Configure Windows NT for use with the Internet.
   D. Install peer web services.

IX. Running Applications
   A. Explain the advantages and disadvantages associated with running 16
and 32 bit applications under Windows Operating System.
   B. Demonstrate how to run DOS-based applications under Windows.
   C. Show how to run OS/2 applications under Windows.
   D. Explain the problems of running applications designed for the POSIX
environment.

X. Monitoring, Identifying and Resolving Performance Problems
   A. Find and eliminate operational bottlenecks.
   B. Demonstrate the use of Windows self-tuning features.
   C. Explain the need and process for continual monitoring of system
performance.

XI. Implementing Troubleshooting Procedures
   A. Demonstrate an understanding of basic troubleshooting procedures.
   B. Troubleshoot computer hardware to determine specific problems.
   C. Explain the steps for troubleshooting the Windows boot process.
   D. Demonstrate the use of troubleshooting applications.
   E. Identify troubleshooting resources.

XII. Modify the Registry
   A. Demonstrate a basic understanding of the registry and its
structure.
   B. Explain the importance of backing up the registry.
   C. Find specific settings by searching the registry.
   D. Use Windows registry diagnostic tools to identify registry
problems.
   E. Demonstrate the search features of the registry.
   F. Comment on warnings about the registry.

Method of Evaluation and Competencies:

Unit Quizzes      40%
Projects          30%
Midterm (Written) 15%
Final (Written)   15%
 Total           100%

Grading Scale (percentage of total points):
  90 - 100% = A
  80 -  89% = B
  70 -  79% = C
  60 -  69% = D
  Below 60% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 209

  • Title: Scaling Networks*
  • Number: IT 209
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145

Description:

This course is designed to provide students with the necessary knowledge and skills to interconnect and configure routers and switches in large networks. Students successfully completing this course should be able to perform switch and router administration tasks including installing, configuring and troubleshooting. Students will build networks based on the hierarchical design model supported by Virtual Local Area Networks (VLANs), Spanning Tree Protocol (STP), Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) in Internet Protocol Version 4 and 6 (IPv4 and IPv6) networks. 3 hrs. lecture, 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

1. State the principles of designing hierarchical networks.

2. Perform switch and router configuration.

3. Configure, manage, and troubleshoot Virtual LANs (VLANs).

4. Implement VLAN Trunking Protocol (VTP) to simplify management of the VLAN database across multiple switches.

5. Configure Spanning Tree Protocol (STP) to prevent loops in a switched network.

6. Install and configure inter-VLAN routing to facilitate communication between devices on separate VLANs.

7. Configure and troubleshoot EIGRP and single and multiarea OSPF in IPv4 and IPv6 networks.

Content Outline and Competencies:

I. Hierarchical Networks

A. Explain how a hierarchical network supports voice, video and data applications.

B. Provide examples of how voice and video over IP (Internet Protocol) affect network design.

C. Explain the concept of a converged network.

D. Identify the voice and video components in a hierarchical network.

E. Contrast the functions of Layer 2 and Layer 3 switches.

II. Switch Configuration

A. Explain the functions that enable a switch to forward Ethernet frames.

B. Configure a switch for operation in a network designed to support voice, video and data transmissions.

C. Configure basic security on a switch.

III. VLANs in a Switched Network

A. Explain the role of VLANs in a network.

B. Explain the role of trunking VLANs in a network.

C. Configure VLANs on the switches in a network topology.

D. Troubleshoot common software and hardware configuration  problems associated with VLANs.

IV. VTP Configuration

A. Explain the role of VTP in a converged switched network.

B. Describe the operation of VTP including domains, modes, advertisements and pruning.

C.  Configure VTP on the switches in a converged network.

V. Basic STP Configuration

A. Explain the role of redundancy in a switched network.

B. Summarize how STP works to eliminate Layer 2 loops in a switched network.

C. Explain how the STP algorithm uses three steps to converge on a loop-free topology.

D. Implement STP to prevent loops between redundant switches.

VI. Inter-VLANs Routing

A. Explain how network traffic is routed between VLANs in a converged network.

B. Configure inter-VLAN routing on router to enable communication between devices on separate VLANs.

C. Troubleshoot common inter-VLAN connectivity issues.

VII. EIGRP and OSPF configuration

A. Configure and troubleshoot EIGRP in IPv4 and IPv6 networks.

B. Configure and troubleshoot single area OSPF in IPv4 and IPv6 networks.

C. Configure and troubleshoot multi-area OSPF in 1Pv4 and IPv6 networks.

D. Describe the tasks of configuring and managing operating system files on routers and switches.

Method of Evaluation and Competencies:

Grading Criteria:
30-70%    Assignments/Labs
30-70%    Tests
Total: 100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59 % = F

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 221

  • Title: Windows Server*
  • Number: IT 221
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 205

Description:

This course is designed to provide students with the knowledge and skills to perform competently in the role of a network administrator utilizing the Windows network operating system. Students completing this course will be able to accomplish basic fundamental network management tasks, including planning server roles and subsequent requirements, planning the network file system, implementing user accounts and file system security, implementing network printing, and managing the network servers. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe, compare and contrast various modern network operating systems.
  2. Plan Windows server roles, including various network protocols.
  3. Install and configure Windows servers.
  4. Describe, compare, contrast and configure various network protocols.
  5. Explain Windows networking services.
  6. Establish and manage user accounts.
  7. Implement network and file level security.
  8. Manage Windows servers and their clients.
  9. Implement remote connectivity into the network and with other networks, including the Internet.
  10. Establish print services in the network environment.
  11. Support multiple clients on the Windows network. 

Content Outline and Competencies:

I. Network Operating Systems
   A. Define network models.
   B. Identify operating system features.
   C. Compare file systems.
   D. Describe networking services features.
   E. Contrast common modern network operating systems.

II. Planning Network Technologies
   A. Define network foundations and options.
   B. Identify Windows security models.
   C. Distinguish among Windows server roles.
   D. Define special purpose servers.
   E. Select supporting hardware.

III. Installing Windows Server
   A. Prepare hardware components.
   B. Boot with multiple operating systems.
   C. Perform the installation process.
   D. Perform the upgrade process.

IV. Network Protocols
   A. Define OSI model.
   B. Describe Windows networking components.
   C. Compare network protocols.
   D. Install and configure network protocols.

V. Configuring Windows
   A. Install drivers.
   B. Configure Windows using control panel.
   C. Configure Windows using the registry.

VI. Utilizing Windows Networking Services
   A. Explain the service architecture.
   B. Explain the security architecture.

VII. Implementing Security in the User Environment
   A. Plan user account policies, groups, sharing and security.
   B. Define and manage groups.
   C. Define and manage user accounts.
   D. Plan and define user environments.

VIII. Perform Server Management
   A. Utilize file services.
   B. Manage the distributed file systems.
   C. Implement remote server administration.
   D. Implement directory replication.

IX. Planning and Implementing Connectivity
   A. Implement and manage remote access service.
   B. Implement internet connectivity.
   C. Define and implement an intranet.
   D. Coexist with NetWare.

X. Printing with Windows
   A. Explain Windows print components.
   B. Define the print model.
   C. Implement local printers.
   D. Implement remote printers.

XI. Supporting Network Clients
   A. Define client operating systems supported by Windows.
   B. Install client connectivity software.
   C. Implement home directories.
   D. Implement roaming profiles.

Method of Evaluation and Competencies:

Quizzes       20%
Tests         30%
Lab Exercises 50%
 Total       100%

Grading Scale:
  A = 90% - 100% 
  B = 80% -  89% 
  C = 70% -  79% 
  D = 60% -  69% 
  F =  0% -  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 225

  • Title: Windows Active Directory Services*
  • Number: IT 225
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 221

Description:

The focus of this course is using Microsoft Windows Server or Advanced Server software to install, configure and troubleshoot Active Directory components, Domain Name Space (DNS) for Active Directory and Active Directory security solutions. The course also emphasizes the skills required to manage, monitor and optimize the desktop environment using Group Policy. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install, configure, and troubleshoot Active Directory.
  2. Install, configure, manage, monitor, and troubleshoot Directory Name System (DNS) for Active Directory.
  3. Install, configure, manage, monitor, optimize and troubleshoot Change and Configuration Management.
  4. Manage, monitor, and optimize the components of Active Directory.
  5. Configure, manage, monitor, and troubleshoot Active Directory security solutions. 

Content Outline and Competencies:

I. Install, configure, and troubleshoot Active Directory.
   A. Install sites.
   B. Create subnets.
   C. Create site links.
   D. Create site link bridges.
   E. Create connection objects.
   F. Create global catalog servers.
   G. Move server objects between sites.
   H. Transfer Operations Master roles.
   I. Verify Active Directory installation.
   J. Implement an Organizational Unit (OU) structure.
   K. Perform an authoritative restore of Active Directory.
   L. Recover from a system failure.

II. Install, configure, manage, monitor, and troubleshoot Domain Name
System (DNS) for Active Directory.
   A. Integrate an Active Directory (AD) Domain Name System (DNS) with a
non-active DNS. 
   B. Configure zones for dynamic updates.
   C. Manage, monitor, and troubleshoot DNS.
   D. Manage replication of DNS data.

III. Install, configure, manage, monitor, optimize and troubleshoot Change
and Configuration Management.
   A. Create a Group Policy Object (GPO).
   B. Link an existing GPO.
   C. Delegate administrative control of Group Policy.
   D. Modify Group Policy inheritance.
   E. Filter Group Policy settings by associating security groups to
GPOs.
   F. Modify Group Policy.
   G. Control user environments by using Administrative Templates.
   H. Assign script policies to users and computers.
   I. Deploy software by using Group Policy.
   J. Maintain software by using Group Policy.
   K. Configure deployment options.
   L. Troubleshoot common problems that occur during software deployment.
   M. Manage network configuration by using Group Policy.
   N. Install an image on a Remote Installation Services (RIS) client
computer.
   O. Create a RIS boot disk.
   P. Configure remote installation options.
   Q. Troubleshoot RIS problems.
   R. Manage images for performing remote installations.
   S. Authorize a RIS server.
   T. Grant computer account creation rights.
   U. Prepare RIS client computers for added security and load balancing.
 
IV. Manage, monitor, and optimize the components of Active Directory.
   A. Move Active Directory (AD) objects.
   B. Publish resources in AD.
   C. Locate objects in AD.
   D. Create and manage accounts manually and by scripting.
   E. Control access to AD objects.
   F. Delegate administrative control of objects in AD.
   G. Monitor, maintain, and troubleshoot domain controller performance.
   H. Monitor, maintain, and troubleshoot AD components.
   I. Manage intersite replication.
   J. Manage intrasite replication.

V. Configure, manage, monitor, and troubleshoot Active Directory security
solutions.
   A. Configure and troubleshoot security in a directory services
infrastructure.
   B. Apply security policies by using Group Policy.
   C. Create, analyze, and modify security configurations by using
security configuration and analysis and security templates.
   D. Implement an audit policy.
   E. Monitor and analyze security events.

Method of Evaluation and Competencies:

 Examinations           60 % of grade
 Projects/Assignments   40  % of grade
    Total              100  %

Grade Criteria:
A =  90 to 100% 
B =  80 to  89% 
C =  70 to  79% 
D =  60 to  69% 
F =   0 to  59% 

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 228

  • Title: Exchange Server*
  • Number: IT 228
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 225

Description:

This course is designed to provide network administrators with information that enhances their ability to manage an Exchange server network. Included are topics related to server and client mail management and server performance, e-mail concepts and advanced Internet networking. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basic concepts of e-mail
  2. Describe architecture of Active Directory for Exchange
  3. Install Windows Exchange Server
  4. Install recipients and manage public and private folders
  5. Install and configure client access
  6. Install and configure the information store
  7. Administer routing groups and maintenance
  8. Troubleshoot access to resources
  9. Manage, monitor, and optimize system performance
  10. Configure and troubleshoot Exchange network connections
  11. Secure Exchange Server
  12. Manage backup and recovery 

Content Outline and Competencies:

I. Identify and test the basic concepts of email
   A. List the characteristics of shared-file and client/server message
systems
   B. List the email computer models
   C. List the enterprise-quality features of e-mail
   D. List the industry standards

II. Define the architecture of Active Directory for Exchange
   A. Define the components of Exchange Active Directory
   B. Define information stores
   C. Define the different types of message flow

III. Install Windows Exchange Server
   A. Develop a pre-installations configuration
   B. Install and set up an Exchange server
   C. Document the post installation configurations
   D. Troubleshoot the Exchange installation

IV. Create and manage recipients
   A. Create and manage users
   B. Create and manage groups
   C. Create and manage contracts
   D. Create and manage public folder recipients

V. Install and manage public and private folders
   A. Manage folders with Outlook
   B. Manage folders with System Manager
   C. Create new public folders and trees
   D. Create new dedicated folders
   E. Set up custom folders

VI. Install and configure client access
   A. Load and access email with Microsoft Outlook with a MAPI or IMAPI4
architecture
   B. Load and access email with Outlook Web Access
   C. Load and access email with POP
   D. Load the Network News Transfer Protocol

VII. Install and configure the information stores
   A. Install and manage storage groups
   B. Manage the stores

VIII. Administer routing groups and maintenance
   A. Install and manage administrative groups
   B. Install and manage routing groups

IX. Manage, monitor, and optimize system performance
   A. Monitor the Exchange server with Event Viewer
   B. Use policies to track users
   C. Troubleshoot client access problems

X. Configure and troubleshoot Exchange network connections
   A. Replicate between an operational master and domain controller
   B. Install the Active Directory connector
   C. Manage and troubleshoot a mixed mode environment

XI. Install and manage auxiliary services
   A. Install and manage Instant Messaging
   B. Install and manage chat services

XII. Disaster recovery of Exchange Server
   A. Set up a back-up and restore plan
   B. Back-up and restore data
   C. Set up a server for disaster recovery
   D. Troubleshoot the back-up and restore

Method of Evaluation and Competencies:

 Examinations          50 % of grade
 Projects/Assignments  50 % of grade
   Total              100 %

Grade Criteria:
A =  90 to 100%
B =  80 to 89%
C =  70 to 79%
D =  60 to 69%
F =   0 to 59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 230

  • Title: Linux Fundamentals
  • Number: IT 230
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to execute common Linux commands and utilities; and accomplish system tasks such as navigating the file system, applying file system security, managing user accounts, using the printing environment, and utilizing the resources of a basic Linux system. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1.  
    1. Describe the Linux network operating system.
    2. Install and configure the Linux operating system.
    3. Execute common Linux commands and utilities.
    4. Describe, and configure the network interface.
    5. Establish and manage user accounts.
    6. Implement file level security.
    7. Establish print services in the network environment.
    8. Plan and implement archiving strategies.
    9. Utilize common Help utilities. 

Content Outline and Competencies:

I. The Linux Operating System
   A. List operating system features.
   B. Describe file systems.
   C. Define networking services features.
   D. Identify system processes.

II. Operating System Installation and Configuration
   A. Describe hardware preparation.
   B. Define and implement the Linux installation process.
   C. Describe and configure the Linux boot process.
   D. Create and maintain filesystems.

III. Commands and Utilities
   A. Use navigation and reading commands.
   B. Use searching and manipulating commands.
   C. Switch between common shells.
   D. Use redirection and pipes.
   E. Utilize a command-line text editor.

IV. The Network Interface
   A. Describe the Linux network environment.
   B. Implement network connectivity.
   C. Utilize network commands.

V. User Accounts
   A. Define and create user accounts.
   B. Discuss and utilize switch user utilities.

VI. File Level Security
   A. Describe file level security features.
   B. Interpret and assign file ownership.
   C. Interpret and apply file permissions.

VII. Print Services
   A. Describe printing components.
   B. Implement local printers.
   C. Implement remote printers.
   D. Utilize print commands.

VIII. Archiving Utilities
   A. Describe the uses of archiving.
   B. Utilize common archiving utilities.

IX. Help Utilities
   A. Describe and utilize command-line help utilities.
   B. Access and interpret on-line help resources.

Method of Evaluation and Competencies:

20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests
Total 100%

Grading Scale:
  A = 90 - 100%
  B = 80 -  89%
  C = 70 -  79%
  D = 60 -  69%
  F = Below 60%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 231

  • Title: Linux Administration*
  • Number: IT 231
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 230

Description:

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including installing, configuring and troubleshooting a basic Linux system, managing devices, implementing the printing environment, installing software packages, and configuring the graphical user interface. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Perform advanced Linux installations.
  2. Implement advanced systems configuration techniques.
  3. Implement and configure client network connections.
  4. Install and manage software.
  5. Apply advanced Linux troubleshooting techniques.
  6. Automate system processes. 
  7. Describe and configure system security features.

Content Outline and Competencies:

I. Advanced Installations
   A. Plan an installation.
   B. Define client and server roles.
   C. Perform the installation process using a variety of methods.

II. Advanced Systems Configuration
   A. Configure and maintain network time synchronization.
   B. Perform system maintenance.
   C. Review problem solving logs.
   D. Perform advanced user account management and customization.
   E. Install and configure the graphical user environment.

III. Client Network Connections
   A. Configure the network interface.
   B. Implement and configure name resolution on a client.
   C. Implement and configure network addressing.
   D. Utilize network-related commands and utilities.
   E. Utilize remote connectivity methods.

IV. Software Management
   A. Install and configure software.
   B. Manage software components.

V. Troubleshooting Techniques
   A. Describe and use troubleshooting strategies.
   B. Utilize troubleshooting commands and utilities.
   C. Access and utilize recovery environments.
   D. Explain and resolve common problems.

VI. System Automation
   A. Utilize system task schedulers.
   B. Read and write simple shell scripts.

VII. System Security Features
   A. Describe and configure system access restrictions.
   B. Describe and utilize methods of limiting root access.
   C. Configure limitations on system resource usage.
   D. Describe and utilize secure shell technologies.

Method of Evaluation and Competencies:

Grading Criteria: 
20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests
Total 100% 

Grading Scale:
A = 90 - 100%
B = 80 -  89%
C = 70 -  79%
D = 60 -  69%
F =  0 -  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 232

  • Title: Linux Networking*
  • Number: IT 232
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 231

Description:

This course is designed to provide students with information that enhances their ability to manage Linux systems in a networked environment. Included are topics related to configuring and managing network connectivity, and the installation, configuration, and securing of network services. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure and manage the network connection on a Linux server.
  2. Install and configure file sharing services.
  3. Configure and manage web services.
  4. Configure and manage network address services.
  5. Configure and manage mail services.
  6. Configure and manage firewall services.
  7. Configure and manage security. 

Content Outline and Competencies:

I. The Network Connection
   A. List the network settings on a Linux server. 
   B. Locate and setup or modify network settings on a Linux server.
   C. Troubleshoot network connectivity problems.

II. File Sharing Services
   A. Identify and list common file sharing technologies.
   B. Develop a plan to institute file sharing on a Linux server.
   C. Configure file sharing security on a Linux server.

III. Web Services
   A. Identify and list Linux web server parameters and settings.
   B. Install web services on a Linux server.
   C. Test web server capabilities.

IV. Network Address Services
   A. Identify and list Linux address server parameters and settings.
   B. Install address services on a Linux server.
   C. Test address server capabilities.

V. Mail Services
   A. Identify various Linux mail systems
   B. Implement and configure a mail system on a Linux server.
   C. Configure Linux clients to utilize a mail system.

VI. Firewall Services
   A. Describe the capabilities of the Linux firewall.
   B. Configure the Linux firewall on a Linux server.
   C. Write firewall rules.

VII. Security Configuration
   A. Identify Linux security components.
   B. Develop a plan to secure the Linux servers.
   C. Implement the security plan.
   D. Test security implementation.

Method of Evaluation and Competencies:

20% - 40% Quizzes/Projects/Assignments
60% - 80% Tests

Grade Criteria:
  A =  90 to 100%
  B =  80 to  89%
  C =  70 to  79%
  D =  60 to  69%
  F =   0 to  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 233

  • Title: Linux Advanced Administration
  • Number: IT 233
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Description:

This course is designed to provide students with the skills and techniques to perform advanced administration tasks in a networked Linux environment. Topics will include compiling the Linux kernel, configuring advanced storage solutions, customizing system startup processes, and managing advanced network connections. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure the Linux kernel.
  2. Customize system startup and boot processes.
  3. Configure and utilize advanced filesystem features.
  4. Configure and administer advanced storage devices.
  5. Implement advanced network configurations.
  6. Perform advanced system maintenance.
  7. Implement name services.

Content Outline and Competencies:

I. Linux Kernel
   A. Describe the kernel.
   B. Obtain and install a kernel.
   C. Apply kernel patches.
   D. Build a custom kernel.
   E. Manage kernel modules.

II. System Startup
   A. Install and configure the bootloader.
   B. Configure startup scripts.
   C. Utilize startup recovery and repair strategies.

III. Filesystems
   A. Configure and mount various types of filesystems.
   B. Troubleshoot and repair filesystems.
   C. Tune filesystem parameters.
   D. Configure automount filesystems using AutoFS.
   E. Manage devices with udev.

IV. Storage Devices
   A. Configure storage device access.
   B. Configure and implement software RAID (Redundant Array of Independent Disks)..
   C. Configure and utilize LVM (Logical Volume Management).
   D. Tune disk access.

V. Network Configuration
   A. Configure a network device to connect to varioustypes of networks.
   B. Configure a network device to implement various network authentication schemes.
   C. Monitor network traffic.
   D. Troubleshoot network issues.

VI. System Maintenance
   A. Build and install programs from source.
   B. Plan and implement network backups.

VII. Name Services
   A. Describe the role of name services on the network.
   B. Configure a basic name server.
   C. Create and maintain zone files.
   D. Secure the name server.

Method of Evaluation and Competencies:

Quizzes/Projects/Assignments 20% - 40%
Performance Tests 60% - 80%
Total 100%

90 to 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 245

  • Title: Network Infrastructure*
  • Number: IT 245
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 221

Description:

This course is designed to provide an in-depth understanding of the ability to install, manage, monitor, configure and troubleshoot DNS, DHCP, Remote Access, Network Protocols, IP Routing and WINS in a Windows 2000 network infrastructure. In addition, it will provide an in-depth understanding of the ability to manage, monitor and troubleshoot Network Address Translation and Certificate Services. Laboratory exercises will accompany the lectures. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install and configure TCP/IP on a client machine.
  2. Define IP addressing and its network classes.
  3. Calculate IP address subnet mask.
  4. Describe the IP address resolution process.
  5. Install, configure and troubleshoot IP routing protocols.
  6. Manage and monitor IP routing.
  7. Install, configure, manage, monitor and troubleshoot DHCP server.
  8. Explain NetBIOS name resolution methods.
  9. Install, manage, monitor, troubleshoot and configure WINS server and WINS replication.
  10. Install, configure, manage, monitor and troubleshoot DNS (Domain Name Service).
  11. Install, configure, manage, monitor and troubleshoot Remote Access.
  12. Install, configure, manage, monitor and troubleshoot Network Address Translation (NAT).
  13. Install, configure, manage, monitor and troubleshoot IPSec.
  14. Install, configure, manage, monitor and troubleshoot Certificate Authority.
  15. Document Server installation. 

Content Outline and Competencies:

I. Installing and Configuring TCP/IP
   A. Prepare the client machine for installing TCP/IP.
   B. Install the TCP/IP protocol suite.
   C. Configure TCP/IP for network communication.
   D. Describe TCP/IP utilities.

II. Defining IP Addressing and Its Network Classes
   A. Identify node address.
   B. Identify network address.
   C. Define network classes.
   D. Describe special addresses.

III. Subneting and Subnet Masking
   A. Define IP address subnets.
   B. Analyze subnets benefits.
   C. Calculate subnets masks.
   D. Contrast subneting and superneting.

IV. IP Address Resolution Process
   A. Explain IP address resolution.
   B. Outline the role of ARP.
   C. Compare MAC addressing to IP addressing.

V. IP Routing
   A. Configure static IP routers.
   B. Build a routing table.
   C. Configure dynamic IP routing.
   D. Describe routing internet protocol.
   E. Contrast static and dynamic IP routing.

VI. The Dynamic Host Configuration Protocol
   A. Distinguish between manual and automatic configuration.
   B. Outline how DHCP works.
   C. Describe IP lease request and offer.
   D. Install and configure a DHCP server.

VII. NetBIOS Name Resolution
   A. Explain NetBIOS naming.
   B. Describe resolving local NetBIOS names using a broadcast.
   C. Describe resolving names with a NetBIOS name server.
   D. NetBIOS over TCP/IP name resolution nodes.
   E. Create a HOSTS file to resolve NetBIOS names.

VIII. Implementing Windows Internet Name Service
   A. Define WINS role in name resolution.
   B. Install WINS server.
   C. Configure static entries for non-WINS clients.
   D. Configure a WINS proxy agent.
   E. Configure a DHCP server for WINS.

IX. Domain Name System (DNS)
   A. Outline DNS operation.
   B. Explain name resolution using DNS server.
   C. Create the DNS files.
   D. Install a DNS server.

X. Remote Access
   A. Explain Remote Access.
   B. Configure inbound connections.
   C. Create a remote access policy.
   D. Configure a remote access profile, a virtual private network (VPN),
multilink connections, and routing and remote access for DHCP
integration.
   E. Configure authentication and encryption protocols.

XI. Network Address Translation (NAT)
   A. Install Internet Connection Sharing.
   B. Install NAT.
   C. Configure NAT properties and interfaces.
   D. Troubleshoot NAT.

XII. IPSec
   A. Enable IPSec.
   B. Configure IPSec for transport or tunnel mode.
   C. Customize IPSec policies and rules.
   D. Manage and monitor IPSec.

XIII. Certificate Authority
   A. Install and configure Certificate Authority.
   B. Issue and revoke certificates.
   C. Remove the Encrypting File System (EFS) recovery keys.

XIV. Server Documentation
   A. Create screen captures.
   B. Save captured graphics in files.
   C. Create and print documents containing server documentation.

Method of Evaluation and Competencies:

Tests    40% of grade
Lab      30% of grade
Projects 30% of grade
Total   100%
Grading Scale:

90 - 100% = A
80 -  89% = B
70 -  79% = C
60 -  69% = D
Below 60% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 247

  • Title: Accessing Wide Area Networks*
  • Number: IT 247
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145 and IT 209

Description:

The goal is to develop an understanding of various Wide Area Network (WAN) technologies to connect medium-size business networks. The course focuses on WAN technologies including Point-to-Point Protocol (PPP), Frame Relay and broadband links. WAN security concepts are discussed in detail, including types of threats, how to analyze network vulnerabilities, and general methods for mitigating common security threats. The course explains the principles of Access Control Lists (ACLs) and describes how to implement IP addressing services for an enterprise network, including Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP). IPv6 addressing concepts are also discussed. Finally, students learn how to troubleshoot and correct common network implementation issues. 2 hrs. lecture, 3 hrs. lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain key Wide Area Network (WAN) technology concepts.
  2. Discuss and configure Point-to-Point Protocol (PPP) concepts and authentication.
  3. Describe and configure Frame Relay.
  4. Discuss and manage network security.
  5. Discuss and configure Access Control Lists (ACLs).
  6. Describe business requirements for Teleworker services.
  7. Discuss and configure Internet Protocol (IP) addressing services including Dynamic Host Configuration Protocol (DHCP), Network Address Translation (NAT) and IPv6.
  8. Discuss and apply network troubleshooting methodologies and tools.

Content Outline and Competencies:

I. WAN Access 
   A. Describe how the Cisco enterprise architecture provides integrated services over an enterprise network.
   B. Explain key WAN technology concepts. 
   C. Select the appropriate WAN technology to meet different enterprise business requirements 
II. PPP 
   A. Explain the fundamental concepts of point-to-point serial communication. 
   B. Explain key PPP concepts. 
   C. Configure PPP encapsulation. 
   D. Discuss and configure PAP and CHAP authentication 
III. Frame Relay 
   A. Explain the fundamental concepts of Frame Relay technology in terms of enterprise WAN services, including operation, implementation requirements, maps, and Local Management Interface (LMI) operation. 
   B. Configure a basic Frame Relay permanent virtual circuit (PVC), including configuring and troubleshooting Frame Relay on a router serial interface and configuring a static Frame Relay map. 
   C. Explain advanced concepts of Frame Relay technology in terms of enterprise WAN services, including subinterfaces, bandwidth, and flow control. 
   D. Configure an advanced Frame Relay PVC, including solving reachability issues, configuring subinterfaces, and verifying and troubleshooting a Frame Relay configuration. 
IV. Network Security 
   A. Identify security threats to enterprise networks. 
   B. Describe methods to mitigate security threats to enterprise networks. 
   C. Configure basic router security. 
   D. Disable unused router services and interfaces. 
   E. Use the Cisco Security Device Manager (SDM) one-step lockdown feature. 
   F. Manage files and software images with the Cisco IOS Integrated File System (IFS). 
V. Access Control Lists (ACLs) 
   A. Explain how ACLs are used to secure a medium-size enterprise branch office network, including the concept of packet filtering, the purpose of ACLs, how ACLs are used to control access, and the types of Cisco ACLs. 
   B. Configure standard ACLs in a medium-size enterprise branch office network, including defining filtering criteria, configuring standard ACLs to filter traffic, and applying standard ACLs to router interfaces. 
   C. Configure extended ACLs in a medium-size enterprise branch office network, including configuring extended ACLs and named ACLs, configuring filters, verifying and monitoring ACLs, and troubleshooting extended ACL issues.
   D. Describe complex ACLs in a medium-size enterprise branch office network, including configuring dynamic, reflexive and timed ACLs; verifying and troubleshooting complex ACLs; and explaining relevant caveats. 
VI. Teleworker Services 
   A. Describe the enterprise requirements for providing teleworker services, including the differences between private and public network infrastructures. 
   B. Describe the teleworker requirements and recommended architecture for providing teleworking services. 
   C. Explain how broadband services extend enterprise networks using DSL, cable and wireless technology. 
   D. Discuss the importance of VPN technology, including its role and benefits for enterprises and teleworkers. 
   E. Describe how VPN technology can be used to provide secure teleworker services to an enterprise network. 
VII. IP Addressing Services 
   A. Configure a router to be a Dynamic Host Configuration Protocol (DHCP) server 
   B. Describe how to integrate private addresses and configure Network Address Translation (NAT). 
   C. Describe IPv6 and how to configure routers to exchange IPv6 routes using Routing Information Protocol (RIPng). VIII. Network Troubleshooting 
   A. Establish and document a network baseline. 
   B. Describe the various troubleshooting methodologies and troubleshooting tools. 
   C. Discuss the common issues that occur during WAN implementation. 
   D. Identify and troubleshoot common enterprise network implementation issues using a layered model approach.

Method of Evaluation and Competencies:

Evaluation of student mastery of course competencies will be accomplished using the following methods:

Quizzes 25% - 35%

Labs 30% - 40%

Final Exam 20% - 30%

Final Skills Assessment 10% - 15%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59 % = F

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 249

  • Title: Advanced Routing*
  • Number: IT 249
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 247

Description:

This course provides advanced instruction of Cisco routers found in medium to large networks. It is intended for students preparing for advanced Cisco certification. Upon completion of this course, the student will be able to select and implement the appropriate Cisco services required to build a scalable router network. Topics covered include extending IP addressing, implementing OSPF for a single area and multiple areas, configuring EIGRP, and implementing BGP. This course will follow semester five in the Cisco Networking Academy curriculum. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives


  1. Explain routing principles.
  2. Given an IP address range, use VLSM to extend the use of IP addresses.
  3. Configure OSPF for proper operation in a single area.
  4. Configure a multiarea OSPF network.
  5. Configure Enhanced IGRP.
  6. Describe BGP features, operation and configuration.
  7. Implement BGP in scalable networks.
  8. Explain optimizing routing update operation. 

Content Outline and Competencies:

I. Explain Routing Principles
   A. Key information routers need to route data
   B. Classful and classless routing protocols
   C. Distance vector and link state protocol operation
   D. Routing tables

II. Apply VLSM to Extend the Use of IP Addresses
   A. Variable length subnetting
   B. Route summarization
   C. IP helper broadcast management

III. Configure OSPF in a Single Area
   A. OSPF versus RIP in a large Internetwork
   B. OSPF in a single area
   C. OSPF configuration
   D. OSPF in an NBMA environment

IV. Configure a Multiarea OSPF Network
   A. Interconnecting multiple OSPF areas
   B. LSAs types
   C. Multiple areas configuration
   D. Verifying OSPF operation

V. Configure EIGRP
   A. Enhanced IGRP features and operation
   B. EIGRP operation in an NBMA environment
   C. EIGRP support of large networks
   D. Configuring EIGRP operation

VI. Configure Basic Border Gateway Protocol
   A. BGP features and operation
   B. Connecting autonomous systems
   C. BGP policy-based routing functions
   D. Configuring external and internal BGP

VII. Implement BGP in Scalable Networks
   A. Scalability problems associated with internal BGP
   B. Configuring BGP route reflectors
   C. Configuring policy control in BGP using prefix lists
   D. Connecting to multiple ISPs using BGP

VIII. Apply Techniques to Optimize Routing Update Operation
   A. Route redistribution in networks with redundant paths
   B. Policy-based routing using route maps
   C. Controlling routing update traffic
   D. Verifying route redistribution

Method of Evaluation and Competencies:

Two or more written examinations 20%-30% of course total requirement.
Eight or more laboratory exercises 30%-60% of course total requirement.
Final Exam 20%-30% of course total requirement.

Grading Criteria:
A = 90 – 100%
B = 80 – 89%
C = 70 – 79%
D = 60 – 69%
F =  0 – 59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 250

  • Title: Networking Seminar*
  • Number: IT 250
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 225 and IT 247

Description:

This course is designed to teach advanced concepts in information technology. Topics covered are section specific and include e-mail servers, Web servers, database servers, routing, switching and advanced LAN design concepts. Prerequisites are posted for each section. Students may use this course as a capstone for applying concepts and procedures developed in previous courses using realistic business scenarios. 2 hrs. lecture, 2 hrs. instructional lab, 1 hr. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives


  1. Work as a team member toward implementing a new local area network installation.
  2. Plan the steps in a decision-making process and design a solution for a new LAN.
  3. Describe the effective implementation of networking in business processes.
  4. Explain characteristics of successful computer network and information technology management.

Content Outline and Competencies:

I. Teamwork
   A. Establish team goals for implementing a network solution.
   B. Build group consensus around the solution.
   C. Develop plan of action for network design and implementation.

II. Project Management
   A. Identify common hardware, software and peripheral equipment found in
a computer network.
   B. Select materials, tools and equipment needed to set up a small local
area network.
   C. Determine cost, time and resources needed to set up a local area
network.
   D. Apply benefit/cost analysis to a typical LAN project.
   E. Create a timeline for implementing the LAN solution.
   F. Use gantt chart to show project tasks, durations overtime and task
priorities.

III. Computer Networking in Business Processes
   A. Explain the role of networking and information transfer in product
development.
   B. Describe the impact of local area networks on marketing, sales, and
service operations.
   C. Discuss how to selectively integrate information technology in
processing orders across the company.
   D. Explain how to use networking strategies to improve business
planning and development.

IV. Successful Information Technology Management
   A. Discuss the role of top level management in implementing a
successful information technology strategy.
   B. Describe how information technology can be used to create a
customer-orientated service network.
   C. Discuss the pitfalls of incorporating network technology without
changes to corporate culture.

Method of Evaluation and Competencies:

Team project           50% of grade
Graded labs & homework 20% of grade
Quizzes & exams        30% of grade
Total                 100%

Grading Scale:
A = 90 - 100%
B = 80 -  89%
C = 70 -  79%
D = 60 -  69%
F = below 60%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 251

  • Title: Network Security Fundamentals*
  • Number: IT 251
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Requirements:

Prerequisites: IT 247

Description:

This course is designed to provide students with a fundamental understanding of network security principles and implementation. Topics covered include authentication, the types of attacks and malicious code that may be used against computer networks, the threats and countermeasures for e-mail, Web applications, remote access, and file and print services. A variety of security topologies will be discussed as well as technologies and concepts used for providing secure communication channels, secure internetworking devices, intrusion detection systems, and firewalls. Hands-on exercises will be used to reinforce the concepts. 3 hrs. lecture, 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives


  1. Describe authentication methods.
  2. Identify common network attacks and malicious code.
  3. Describe remote access network security technologies.
  4. Identify e-mail security vulnerabilities and implement protection measures.
  5. Identify vulnerabilities of Web Tools such as JavaScript and ActiveX.
  6. List common directory and file transfer protection services.
  7. Describe security threats against wireless data and instant messaging.
  8. Explain common security features of network devices such as firewalls, routers, and switches.
  9. Explain common methods used to secure transmission media.
  10. Compare and contrast main network security topologies.
  11. Identify common intrusion detection mechanisms.
  12. List common cryptography algorithms.
  13. Develop a basic security policy and a disaster recovery plan.

Content Outline and Competencies:

I. Describe Authentication Methods
   A. List common methods of access control. 
   B. Contrast authentication procedures for UNIX, and Windows operating
systems.
   C. Configure PAP (Password Authentication Protocol) and CHAP (Challenge
Authentication Protocol) authentications.
   D. Configure basic AAA (Authentication-Authorization-Accounting)
authentication using TACACS+ (Terminal Access Controller Access Plus) and
RADIUS (Remote Authentication Dial In User Service) servers.
   E. Describe biometric authentication.

II. Identify Common Network Attacks and Malicious Code
   A. Analyze port Scanning, and password sniffing techniques.
   B. Describe Trojan Horse attacks. 
   C. Identify computer viruses and worms.
   D. Identify denial of service attacks.
   E. Evaluate executable content in web pages and e-mail.

III. Describe Remote Access Network Security Technologies
   A. Describe the operation of VPNs (Virtual Private Networks).
   B. Compare and contrast the roles of RADIUS and TACACS servers in
securing remote access.
   C. Identify telecommuting vulnerabilities. 
   D. Describe IP (Internet Protocol) security protocol.  

IV. Identify E-mail Security Vulnerabilities and Implement Protection
Measures
   A. Identify e-mail vulnerabilities.
   B. Identify common e-mail encryption methods.
   C . Compare and contrast PGP (Pretty Good Privacy) and S/MIME
(Secure/Multipurpose Internet Mail Extensions)protocols. 
   D. Identify email Spam, hoaxes, and chain letters.

V. Identify Vulnerabilities of Web Tools Such as JavaScript and ActiveX
   A. List web tools vulnerabilities including JavaScript, ActiveX,
cookies, and CGI (Common Gateway Interface).  
   B. Describe the operation of SSL (Secure Socket Layer) and HTTPS (Hyper
Text Transport Protocol Secure).
   C. Outline Instant messaging security issues.

VI. List Common Directory and File Transfer Protection Services
   A. Describe LDAP (Lightweight Directory Access Protocol) operation. 
   B. Identify LDAP security benefits.
   C. Implement file shares protection measures.

VII. Describe Security Threats to Wireless Data and Instant Messaging
   A. Describe packet analysis and spoofing techniques.
   B. Identify RF jamming and data flooding.
   C. Describe the use of SSID (Service Set Identifier) in wireless
security.
   D. Analyze the operation of WEP (Wired Equivalent Privacy) protocols.
 
VIII. Explain Common Security Features of Network Devices Such as
Firewalls, Routers, and Switches
   A. Describe the operation of firewalls. 
   B. Describe the operation of routers.
   C. Describe the operation of switches.
   D. Implement a basic security policy on firewalls, routers, and
switches.

IX.  Explain Common Methods Used to Secure Transmission Media
   A. Compare and contrast common transmission media.
   B. Define measures used to secure transmission media.

X. Compare and Contrast Main Network Security Topologies
   A. Explain the concept of perimeter security topologies.
   B. Develop a secure topology design.
   C. Implement network address translation scheme.

XI. Identify Common Intrusion Detection Mechanisms
   A. Compare network-based and host-based IDS.
   B. List common IDS products.
   C. Explain the concept of Honeypots.

XII. List Common Cryptography Algorithms
   A. Encrypt and decrypt a file, and explore the details of a sample
encryption algorithm. 
   B. Contrast public key versus symmetric encryption.
   C. Describe message digests encryption.
   D. Describe public key infrastructure.
  
XIII. Develop a Basic Security Policy and a Disaster Recovery Plan
   A. Analyze internal and external security risks.
   B. Define disaster recovery procedures. 
   C. Develop an action plan.
   D. Write a formal security plan.

Method of Evaluation and Competencies:

Examinations          50% 
Projects/Assignments  50% 
Total                100%

Grade Criteria:
 A = 90 – 100%
 B = 80 –  89% 
 C = 70 –  79%
 D = 60 –  69%
 F =  0 –  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 253

  • Title: Advanced Switching*
  • Number: IT 253
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Requirements:

Prerequisites: IT 247

Description:

This course provides advanced instruction of Cisco switches found in medium to large networks. It introduces students to the deployment of the state-of-the art campus Local Area Networks (LAN). The course focuses on the selection and implementation of the appropriate Cisco Internetworking Operating System (IOS) services to build reliable scalable multilayer-switches LANs. Students will develop skills with Virtual LANs (VLAN), Virtual Trunking Protocol (VTP), Spanning Tree Protocol (STP), inter-VLAN routing, redundancy, Quality of Service (QoS) issues, campus LAN security, and transparent LAN services. 3 hrs. lecture, 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives


  1. Describe the Enterprise Composite Model used for designing networks.
  2. Describe the features and operation of VLANs on a switched network.
  3. Describe the features of the VLAN trunking protocols including 802.1Q, ISL and dynamic trunking protocol.
  4. Explain the operation and purpose of the Spanning-Tree Protocol (STP) on a switched network.
  5. Implement common techniques to optimize STP including PortFast and UplinkFast.
  6. Explain the operation and purpose of EtherChannel technology.
  7. List and describe the operation of the key components required to implement interVLAN routing.
  8. Explain the operation of Multilayer Switching (MLS) in the network.
  9. Explain the types of redundancy in a multilayer switched network including hardware and software redundancy.
  10. Describe the QoS solutions that address voice quality issues.
  11. Describe network monitoring using SPAN.
  12. Implement common security techniques to protect a switched network.
  13. Describe Transparent LAN Services and how they are implemented in a service provider network. 

Content Outline and Competencies:

I. Describe the Enterprise Composite Model Used for Designing
Networks
   A. Describe the elements of a switched campus network. 
   B. List common switching technologies.
   C. Identify the building blocks of hierarchical network design.

II. Describe the Features and Operation of VLANs on a Switched Network
   A. Describe the operation of VLANs. 
   B. Identify types of VLANs.
   C. Configure VLAN in a switched network.

III. Describe the Features of the VLAN Trunking Protocols Including
802.1Q, ISL and Dynamic Trunking Protocol
   A. Describe the operation of VTP.
   B. Compare methods of VLAN identification.
   C. Configure VTP in a multiple switches domain. 

IV. Explain the Operation and Purpose of the Spanning-Tree Protocol (STP)
on a Switched Network
   A. Describe the operation of STP.
   B. List the steps of the STP process.
   C. Configure STP in a multiple switches domain. 

V. Implement Common Techniques to Optimize STP Including PortFast and
UplinkFast. 
   A. Configure PortFast.
   B. Configure UplinkFast.
   C. Configure BackboneFast.

VI. Explain the Operation and Purpose of EtherChannel Technology 
   A. Describe the operation of EtherChannel Technology.
   B. Describe the operation of Port Aggregation Protocol.
   C. Configure EtherChannel between two switches. 

VII. List and Describe the Operation of the Key Components Required to
Implement InterVLAN Routing
   A. Compare common methods of Inter-VLAN Routing.
   B. Configure Inter-VLAN Routing using trunking.
   C. Configure Inter-VLAN Routing using subinterfaces. 

VIII. Explain the Operation of Multilayer Switching (MLS) in the Network
   A. Describe the operation of MLS. 
   B. Contrast MLS and CEF.
   C. Configure MLS.

IX. Explain the Types of Redundancy in a Multilayer Switched Network
Including Hardware and Software Redundancy
   A. Explain the operation of HSRP.
   B. Configure HSRP to improve redundancy in the distribution layer. 

X. Describe the QoS Solutions that Address Voice Quality Issues
   A. List the requirements for QoS.
   B. Describe the benefits of QoS.
   C. Configure QoS classifications at the access layer.

XI. Describe Network Monitoring Using SPAN
   A. List the limitations of monitoring switched networks.
   B. Apply SPAN to monitor network frames. 
   
XII. Implement Common Security Techniques to Protect a Switched Network
   A. Explain the operation of AAA security. 
   B. List common techniques used to secure remote management.
   C. Apply common procedures to secure user access.

XIII. Describe Transparent LAN Services and How They are Implemented in a
Service Provider Network
   A. Identify Transparent LAN Services architecture.
   B. Explain fiber optic transports.

Method of Evaluation and Competencies:

Examinations         50% 
Projects/Assignments 50% 
  Total             100%

Grade Criteria:
  A = 90 – 100%
  B = 80 –  89% 
  C = 70 –  79%
  D = 60 –  69%
  F =  0 –  59%

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 256

  • Title: Windows Security*
  • Number: IT 256
  • Effective Term: Spring 2015
  • Credit Hours: 4
  • Contact Hours: 5
  • Lecture Hours: 3
  • Other Hours: 2

Requirements:

Prerequisites: IT 225 and IT 245

Description:

This course is designed to provide students with the skills and techniques to properly secure a Windows network. The topics will include building a Windows Active Directory infrastructure, securing the Windows Active Directory infrastructure and penetrating the infrastructure with current hacking tool kits. This course serves as a capstone course in the Windows track of the Information Technology Department. It is the last course in a series of six Windows classes. It takes concepts and skills learned in the pre-requisite Windows courses and ties them together focusing on securing a Windows network. 3 hrs. lecture, 2 hrs. open lab/wk.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Plan and implement a firewall strategy.
  2. Create and install an Active Directory infrastructure.
  3. Design and implement a user and computer authorization strategy.
  4. Secure remote access.
  5. Implement a user and computer security strategy.
  6. Install, configure and manage Software Update Services (SUS).
  7. Install, configure and manage Certificate Services.
  8. Implement a user and computer authentication strategy.
  9. Plan and configure Internet Protocol Security (IPSec).
  10. Implement hacking tool kits to identify and analyze network security vulnerabilities.

Content Outline and Competencies:

I. Firewall Strategy
  A. Describe the basic framework for designing network security. 
  B. Plan and design the firewall. 
  C. Install and configure the firewall. 
  D. Test the firewall. 
 
II. Active Directory Infrastructure
  A. Identify key concepts used throughout the Windows security.  
  B. Plan and design an Active Directory infrastructure. 
  C. Install and configure the Active Directory infrastructure. 
  D. Harden installed servers and computers for specific roles. 

III. Authorization Strategy 
  A. Create user and group accounts. 
  B. Create share permissions. 
  C. Test share permissions. 
  D. Identify New Technology File System (NTFS) permissions. 
  E. Create and nest group resources. 

IV. Remote Access
  A. Create a remote user. 
  B. Configure Routing and Remote Access Services (RRAS) and create a policy.
  C. Configure and establish a Virtual Private Network (VPN) connection.

V. Security Policies and Strategy  
  A. Create a Windows security templates console. 
  B. Configure default domain policies and software restriction policies. 
  C. Deploy the security policies using group policies. 
  D. Test policies. 
  E. Create Results of Policy (RSoP) console. 

VI. Software Update Services 
  A. Install and configure SUS.
  B. Configure the automatic update client. 
  C. Secure automatic updates and clients. 

VII. Certificate Services
  A. Install and configure certificate authorities. 
  B. Configure the certificate template. 
  C. Request a certificate through web enrollment. 

VIII. Authentication Strategy 
  A. Install and configure network monitoring. 
  B. Capture network traffic. 
  C. Capture Kerberos traffic. 
  D. Configure packet filtering. 

IX. IPSec 
  A. Create an IP filter list. 
  B. Create IP filter actions. 
  C. Create an IP security policy. 
  D. Implement and test the IP security policy. 
 
X. Hacking Tool Kits 
  A. Install and configure network hacking tools. 
  B. Hack student firewall and servers. 
  C. Review and analyze hacks on firewalls and servers.

Method of Evaluation and Competencies:

Hands in lab = 25-40% 
Learning Modules = 15%-30% 
Performance Tests = 45%-60%  
 
  Grade Criteria:
  90 - 100% = A      
  80 -  89% = B          
  70 -  79% = C    
  60 -  69% = D  
  Below 60% = F

Grade Criteria:

Caveats:

None

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 271

  • Title: Information Technology Internship I*
  • Number: IT 271
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: IT 210 or IT 221 or IT 230 and department approval

Description:

This course affords the student the opportunity to apply classroom knowledge to an actual work environment. It will provide advanced information technology students with appropriate on-the-job experience with area employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours a semester at an approved job site.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable level of preparedness, personally and professionally, for a career. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the
workplace.
   B. Keep a log book of weekly activities or tasks performed while at the
workplace.
   C. Furnish activity log compiled for each week of work to the
instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties
were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company
produces.
   D. Provide a detailed description of products and services the student
was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area
network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business
environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business
environment.

Method of Evaluation and Competencies:

Percent not to exceed:
Instructor's on-site visits and evaluations       20%
Weekly work log                                   20%
Evaluation of the student by the work supervisor  60%
Total                                            100%

Grading Scale (percentage of total points):
90 - 100 = A
80 -  89 = B
70 -  79 = C
60 -  69 = D
Below 60 = F

Grade Criteria:

Caveats:

  1. Transportation to work site is the responsibility of the student. 

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 272

  • Title: Information Technology Internship II*
  • Number: IT 272
  • Effective Term: Spring 2015
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: IT 271 and department approval

Description:

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

Course Fees:

None

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable preparedness, personally and professionally, for a career position. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the
workplace.
   B. Keep a log book of weekly activities or tasks performed while at the
workplace.
   C. Furnish activity log compiled for each week of work to the
instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties
were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company
produces.
   D. Provide a detailed description of products and services the student
was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area
network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business
environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business
environment.

Method of Evaluation and Competencies:

Percent not to exceed:
Instructor's on-site visits and evaluations 20%
Weekly work log 20%
Evaluation of the student by the work supervisor 60%

Grading Scale (Percentage of Total Points):
90 - 100 = A
80 -  89 = B
70 -  79 = C
60 -  69 = D
Below 60 = F

Grade Criteria:

Caveats:

  1. Transportation to work site is the responsibility of the student. 

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.

IT 292

  • Title: Special Topics:*
  • Number: IT 292
  • Effective Term: Spring 2015
  • Credit Hours: 1
  • Contact Hours: 1
  • Lecture Hours: 1

Requirements:

Prerequisites: Department approval

Description:

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit; but only on different topics.

Course Fees:

Varies

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Appropriately use terminology related to the special topic. 
  2. Solve problems by using content related to the special topic.
  3. Demonstrate conceptual understanding of the special topic.
  4. Use software and hardware related to the special topic.

Content Outline and Competencies:

Will vary within the guidelines of the educational affairs committee.

Method of Evaluation and Competencies:

Will vary within the guidelines of the educational affairs committee.

Grade Criteria:

Caveats:

Student Responsibilities:

Disabilities:

If you are a student with a disability, and if you will be requesting accommodations, it is your responsibility to contact Access Services. Access Services will recommend any appropriate accommodations to your professor and his/her director. The professor and director will identify for you which accommodations will be arranged.

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you desire support services, contact the office of Access Services for Students With Disabilities (913) 469-8500, ext. 3521 or TDD (913) 469-3885. The Access Services office is located in the Success Center on the second floor of the Student Center.