Information Technology (IT)

This is an archived copy of the 2021-22 Catalog. To access the most recent version of the catalog, please visit http://catalog.jccc.edu/.

Courses

IT 120   CompTIA A+ Practical Applications (3 Hours)

Students will gain knowledge required to install, configure and maintain software for end users. This course will also cover the basics of networking as well as networking security/forensics. Students will apply troubleshooting skills to properly and safely diagnose, resolve and document common software issues. Students will also apply appropriate customer support and soft skills, understand the basics of virtualization and examine desktop imaging and deployment. 2 hrs. lecture/wk, 2 hrs. lab/wk, 1 hr. open lab/wk.

IT 141   Introduction to Networks (3 Hours)

Introduction to Networks is the first of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course introduces the architecture, structure, functions, components, and models of the internet and other computer networks. The principles and structure of Internet Protocol (IP) addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple local area networks (LANs), perform basic configurations for routers and switches, and implement IP addressing schemes. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 150   Switching, Routing, and Wireless Essentials* (3 Hours)

Prerequisites : IT 140 or IT 141.

Switching, Routing and Wireless Essentials is the 2nd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLANs) and security concepts. Students will learn how to perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 155   Microsoft Administration Fundamentals* (3 Hours)

Prerequisites : IT 120 or IT 205.

This course is designed to provide students with foundational knowledge of cloud concepts and services in Microsoft 365 and Microsoft Azure. Students will also learn about cloud security, privacy, compliance and trust in these environments. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 175   Cybersecurity Fundamentals* (3 Hours)

Prerequisites : (IT 120 or IT 205) and (IT 140 or IT 141).

This course is designed to provide students with the knowledge and skills required to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. Students will perform these tasks to support the principles of confidentiality, integrity and availability. 2 hrs. lecture, 2 hrs. lab, 1 hr. open lab/wk.

IT 202   IT Scripting* (3 Hours)

Prerequisites : IT 231 .

The main objective of this course is to introduce students to writing scripts using Python. The course maps to the Python Institute PCAP (Python Certified Associate in Programming) certification exam with emphasis on networking programming. Topics covered in this course include lists, strings, dictionaries, functions, recursion, file processing, using modules, object-oriented programming and exception handling. 2 hrs. lecture, 2 hrs. open lab/wk.

IT 204   Enterprise Networking, Security and Automation* (3 Hours)

Prerequisites : IT 145 or IT 150.

Enterprise Networking, Security, and Automation is the 3rd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. The course describes the architectures and considerations related to designing, securing, operating and troubleshooting enterprise networks. The course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access along with the introduction of software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 206   Network Security Fundamentals* (3 Hours)

Prerequisites : IT 145 or IT 150.

This course is designed to provide an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality and availability of data and devices. Topics covered include network threats, mitigation techniques, securing network devices, implementing firewall technologies, implementing intrusion prevention, securing local area networks (LANs), implementing virtual private networks (VPNs), and managing a secure network. Hands-on exercises will be used to reinforce the concepts. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 223   Azure Administration* (3 Hours)

Prerequisites : IT 155 or IT 221.

This course teaches students the fundamentals of Azure Administration. Students will implement, manage and monitor identity, governance, storage, compute and virtual networks in a cloud environment. Students will provision, size, monitor and adjust resources as appropriate. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 224   Modern Desktop Administrator* (3 Hours)

Prerequisites : IT 155 or IT 221.

This course teaches students the fundamentals of Modern Desktop Administration. Students will deploy, configure, secure, manage and monitor devices and client applications in an enterprise environment. Students will manage identity, access, policies, updates and apps. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 230   Linux Fundamentals (3 Hours)

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to perform Linux installation and package management; execute common Linux commands and utilities; and accomplish different system tasks such as navigating the filesystem and utilizing the resources of a basic Linux system.

IT 231   Linux Administration* (3 Hours)

Prerequisites : IT 230.

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including configuring the graphical user interface, managing user accounts, managing system logging, configuring basic networking, writing shell scripts and maintaining system security.

IT 238   Digital Forensics* (3 Hours)

Prerequisites : (IT 120 or IT 205) and IT 230.

This course will cover the fundamentals of computer and cyber forensics. Students will learn different aspects of digital evidence and methods to uncover illegal activities left on storage media. Various forensics tools, techniques and procedures will be used in a lab environment to perform forensic investigations. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 239   Ethical Hacking* (3 Hours)

Prerequisites : (IT 145 or IT 150) and IT 230.

This course introduces students to common computer vulnerabilities as well as exploits and techniques used by hackers. Students will develop countermeasures to mitigate attacks and strengthen system security. Topics covered include vulnerability scanning, social engineering, denial of service attacks, intrusion detection, buffer overflow and penetration testing. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 257   Cybersecurity Operations* (3 Hours)

Prerequisites : IT 175 and (IT 150 or IT 145) and IT 230.

Cybersecurity Operations is designed to map to the Cisco Certified CyberOps Associate certification. The course covers knowledge and skills needed to successfully handle the tasks, duties and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Topics covered include investigating endpoint vulnerabilities and attacks, evaluating network security alerts and applying incident response models to manage network security incidents. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 271   Information Technology Internship I* (3 Hours)

Prerequisites : (IT 120 or IT 140 or IT 141 or IT 205 or IT 230) and Department approval.

This course affords the student the opportunity to apply classroom knowledge to a real-world environment. Students will gain advanced information technology experience working with local employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours/semester at an approved job site.

IT 272   Information Technology Internship II* (3 Hours)

Prerequisites : IT 271 and department approval.

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

IT 292   Special Topics:* (1-3 Hour)

Prerequisites : Department approval.

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit, but only on different topics.

IT 120

  • Title: CompTIA A+ Practical Applications
  • Number: IT 120
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

Students will gain knowledge required to install, configure and maintain software for end users. This course will also cover the basics of networking as well as networking security/forensics. Students will apply troubleshooting skills to properly and safely diagnose, resolve and document common software issues. Students will also apply appropriate customer support and soft skills, understand the basics of virtualization and examine desktop imaging and deployment. 2 hrs. lecture/wk, 2 hrs. lab/wk, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Illustrate the installation, configuration and troubleshooting of current operating systems (OS).
  2. Compare and contrast the features and requirements of various Microsoft Operating Systems. 
  3. Demonstrate use of networking, OS and recovery console command line tools.
  4. Configure and troubleshoot a network client/desktop device.
  5. Perform preventive maintenance procedures.
  6. Demonstrate use of basic network, OS and data security. 
  7. Identify and integrate mobile devices. 
  8. Demonstrate common troubleshooting methods. 
  9. Demonstrate professional customer service skills.

Content Outline and Competencies:

I. Current Operating Systems

A. Explain the purpose of an operating system.

B. Perform an operating system installation.

C. Configure network settings to provide access to remote resources.

D. Identify common operating system installations problems and describe appropriate troubleshooting steps to resolve them.

II. Microsoft Operating Systems

A. Compare and contrast versions of Microsoft operating systems.

B. List system requirements of various Microsoft operating systems.

C. Explore common tools and applets of the Window graphical user interface (GUI).

D. Describe upgrading between different versions of Wind

III. Command Line Interface Tools

A. Perform basic network configuration and monitoring using command line tools.

B. Perform basic user management tasks using command line tools.

C. Perform basic file structure operations using command line tools.

D. Describe system recovery processes using command line options.

IV. Network Client/Desktop Device Configuration

A. Configure a network client computer including addressing and transport protocols.

B. Connect a computer to a wired and a wireless network.

C. Set up and modify user profiles.

D. Create shared folders and permissions.

E. Install and configure printers in a shared environment.

V. Preventive Maintenance

A. Identify and apply common preventive maintenance techniques.

B. Monitor, identify and resolve a performance problem.

C. Compare surge protectors and uninterruptible power supplies.

D. Explain Redundancy and Fault Tolerance.

VI. Basic Network and Data Security

A. Describe types of networks and their physical components.

B. Describe network topologies.

C. Describe Ethernet standards.

D. Explain the Open Systems Interconnection (OSI) model.

E. Describe security threats.

F. Identify common security procedures.

VII. Mobile Devices

A. Explain mobile device hardware.

B. Describe the features and characteristics of mobile operating systems.

C. Compare and contrast methods for securing mobile devices.

D. Establish basic network connectivity for common mobile devices.

VIII. Troubleshooting Methods

A. Identify common troubleshooting steps.

B. Identify and implement solutions for the following problems: boot process failure, printer failure, installation process failure, application failure, and resource access failure.

C. Use Task Manager to find and resolve problems.

D. Free up computer resources to optimize performance.

IX. Professional Customer Service Skills

A. Explain why good communication skills are a critical part of an information technology (IT) career.

B. Explain legal and ethical issues that arise in the IT industry and appropriate behaviors when faced with these issues

C. Describe the call center environment and technician responsibilities.

D. Describe the process of responding to a computer support call.

Method of Evaluation and Competencies:

20-50%    Quizzes
30-50%    Assignments
15-30%    Final Exam

Total:    100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 141

  • Title: Introduction to Networks
  • Number: IT 141
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

Introduction to Networks is the first of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course introduces the architecture, structure, functions, components, and models of the internet and other computer networks. The principles and structure of Internet Protocol (IP) addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple local area networks (LANs), perform basic configurations for routers and switches, and implement IP addressing schemes. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explore and describe the devices and services used to support communications in data networks and the Internet.
  2. Use Cisco command-line interface (CLI) commands to perform basic switch and end devices configurations.
  3. Describe the role of protocol layers in data networks.
  4. Explain fundamental Ethernet concepts, such as media, services and operations.
  5. Describe the functions of the network layer and the importance of addressing in IPv4 and IPv6 environments.
  6. Design, calculate and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 networks.
  7. Explain the operation of application and transport layers protocols.
  8. Build a simple network using routers and switches.

Content Outline and Competencies:

I. Network Exploration

A. Explain how multiple networks are used in everyday life.

B. Describe the topologies and devices used in a small to medium-sized business network.

C. Explain the basic characteristics of a network that supports communication in a small to medium-sized business.

D. Explain trends in networking that will affect the use of networks in small to medium-sized businesses.

II. Basic Switch and End Device Configurations

A. Explain the features and functions of Cisco Internetwork Operating System (IOS) Software.

B. Configure initial settings on a switch using the Cisco IOS software.

C. Given an IP addressing scheme, configure IP address parameters on end devices to provide end-to-end connectivity in a small to medium-sized business network.

III. Network Protocols and Communications

A. Explain how rules are used to facilitate communication.

B. Explain the role of protocols and standards organizations in facilitating interoperability in network communications.

C. Explain how devices on a LAN access resources in a small to medium-sized business network.

IV. Ethernet

A. Explain the operation of Ethernet.

B. Build a simple network using the appropriate media.

C. Explain how the Data Link layer supports communications across data networks.

D. Compare media access control techniques and logical topologies used in networks

E. Explain how a switch operates.

F. Explain how the address resolution protocol enables communication on a network.

V. Network Layer and IP Addressing

A. Explain how network layer protocols and services support communications across data networks.

B. Explain how routers enable end-to-end connectivity in a small to medium-sized business network.

C. Explain how devices route traffic in a small to medium-sized business network.

D. Configure a router with basic configurations.

E. Explain the use of IPv4 addresses to provide connectivity in a small to medium-sized business network.

F. Configure IPv6 addresses to provide connectivity in small to medium-sized business networks.

G. Use common testing utilities to verify network connectivity.

VI. IP Networks Subnetting

A. Implement an IPv4 addressing scheme to enable end-to-end connectivity in a small to medium-sized business network.

B. Given a set of requirements, implement a Variable Length Subnet Mask (VLSM) addressing scheme to provide connectivity to end users in a small to medium-sized network.

C. Explain design considerations for implementing IPv6 in a business network.

VII. Transport Layer and Application Layer

A. Describe the purpose of the transport layer in managing the transportation of data in end-to-end communication.

B. Describe characteristics of the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) including port numbers and their uses.

C. Explain the operation of the application layer in providing support to end-user applications.

D. Explain how well-known TCP/IP application layer protocols and services operate.

VIII. Small Network Configuration

A. Explain how a small network can scale into a larger network.

B. Configure switches and routers with device hardening features to enhance security.

C. Use common show commands and utilities to establish a relative performance baseline for the network.

D. Apply troubleshooting methodologies and command host and IOS commands to resolve problems.

E. Explain how a small network of directly connected segments is created, configured and verified.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 150

  • Title: Switching, Routing, and Wireless Essentials*
  • Number: IT 150
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 140 or IT 141.

Description:

Switching, Routing and Wireless Essentials is the 2nd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLANs) and security concepts. Students will learn how to perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

Upon successful completion of this course, the student should be able to:

  1. Configure devices by using security best practices.
  2. Implement Virtual Local Area Networks (VLANs) and trunking in a switched network.
  3. Implement inter-VLAN routing on Layer 3 devices.
  4. Explain how Spanning Tree Protocol (STP) enables redundancy in a Layer 2 network.
  5. Implement EtherChannel on switched links.
  6. Implement Dynamic Host Configuration Protocol (DHCP) in Internet Protocol (IP) v4 and IPv6 environments.
  7. Explain how First Hop Redundancy Protocols (FHRPs) provide default gateway services in a redundant network.
  8. Implement switch security to mitigate LAN attacks.
  9. Implement a WLAN using a wireless router and Wireless LAN Controller (WLC).
  10. Configure IPv4 and IPv6 static routes.

Content Outline and Competencies:

I. Basic Device Configuration

A. Configure Initial settings on a Cisco switch.

B. Configure secure management access on a switch.

C. Configure basic settings on a router to route between two directly connected networks.

D. Explain how frames are forwarded in a switched network.

E. Compare a collision domain to broadcast domain.

II. VLANs

A. Explain the purpose of VLANs in a switched network.

B. Explain how a switch forwards frames based on VLAN configuration in a multi-switch environment.

C. Configure a trunk port on a LAN switch.

D. Configure Dynamic Trunking Protocol (DTP).

III. Inter-VLAN Routing

A. Describe options for configuring inter-VLAN routing.

B. Configure router-on-a-stick inter-VLAN routing.

C. Configure inter-VLAN routing using Layer 3 switching.

D. Troubleshoot common inter-VLAN configuration issues.

IV. STP

A. Explain common problems in a redundant, L2 switched network.

B. Explain how STP operates in a simple, switched network.

C. Explain how Rapid Per-VLAN Spanning Tree Plus (RPVST+) operates.

V. EtherChannel

A. Describe EtherChannel technology.

B. Configure EtherChannel.

C. Troubleshoot EtherChannel.

VI. DHCP

A. Configure a router as a DHCPv4 server.

B. Explain how an IPv6 host can acquire its IPv6 configuration.

C. Configure a stateful and stateless DHCPv6 server.

VII. FHRP Concepts

A. Explain the purpose and operation of first hop redundancy protocols.

B. Explain how Hot Standby Router Protocol HSRP operates

VIII. Switch Security

A. Implement port security to mitigate Media Access Control (MAC) address table attacks.

B. Explain how to configure DTP and native VLAN to mitigate VLAN attacks.

C. Explain how to configure DHCP snooping to mitigate DHCP attacks.

D. Explain how to configure Address Resolution Protocol (ARP) inspection to mitigate ARP attacks.

E. Explain how to configure Portfast and Bridge Protocol Data Unit (BPDU) Guard to mitigate STP attacks.

IX. WLAN Concepts

A. Describe WLAN technology and standards.

B. Describe the components of a WLAN infrastructure.

C. Explain how wireless technology enables WLAN operation.

D. Describe WLAN security mechanisms.

X. Static Routing

A. Describe the command syntax for static routes.

B. Configure IPv4 and IPv6 static and default routes.

C. Configure a floating static route to provide a backup connection.

D. Troubleshoot common static and default route configuration issues.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 155

  • Title: Microsoft Administration Fundamentals*
  • Number: IT 155
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 120 or IT 205.

Description:

This course is designed to provide students with foundational knowledge of cloud concepts and services in Microsoft 365 and Microsoft Azure. Students will also learn about cloud security, privacy, compliance and trust in these environments. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Identify cloud concepts.
  2. Describe core Azure services.
  3. Describe core Microsoft 365 services and concepts.
  4. Understand security, privacy, compliance and trust.
  5. Explain cloud pricing and support.

Content Outline and Competencies:

I. Cloud Concepts

A. Describe the benefits of using cloud services.

B. Describe the differences between Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).

C. Explain the differences between public, private and hybrid cloud models.

II. Azure Services

A. Understand core Azure architectural components.

B. Describe core Azure products.

C. Explain Azure solutions.

D. Implement Azure management tools.

III. Microsoft 365 Services

A. Identify core Microsoft 365 components.

B. Compare core services in Microsoft 365 with corresponding on-premises services.

C. Describe the concept of modern management.

D. Explain Office 365 ProPlus.

E. Identify collaboration and mobility options.

IV. Security, Compliance, Privacy and Trust

A. Describe security and compliance concepts.

B. Explain identity protection and management options.

C. Implement endpoint management.

D. Describe core Azure identity services.

E. Understand Azure security tools and features.

F. Implement Azure governance methodologies.

G. Understand Azure monitoring and reporting.

V. Cloud Pricing and Support

A. Describe pricing options.

B. Describe licensing options.

C. Understand planning and management costs.

D. Explain support options.

Method of Evaluation and Competencies:

20-50%    Quizzes
30-50%    Assignments
15-30%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 175

  • Title: Cybersecurity Fundamentals*
  • Number: IT 175
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: (IT 120 or IT 205) and (IT 140 or IT 141).

Description:

This course is designed to provide students with the knowledge and skills required to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. Students will perform these tasks to support the principles of confidentiality, integrity and availability. 2 hrs. lecture, 2 hrs. lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Identify threats, attacks and vulnerabilities.
  2. Implement security technologies and tools.
  3. Design security architecture.
  4. Implement identity and access management techniques.
  5. Understand risk management.
  6. Apply cryptography and public key infrastructure (PKI).

Content Outline and Competencies:

I. Threats, Attacks and Vulnerabilities

A. Analyze indicators of compromise and determine the type of malware.

B. Compare and contrast types of attacks.

C. Explain threat actor types and attributes.

D. Describe penetration testing concepts.

E. Identify vulnerability scanning concepts.

F. Explain the impact associated with types of vulnerabilities.

II. Technologies and Tools

A. Install and configure network components.

B. Assess the security posture of an organization.

C. Troubleshoot common security issues.

D. Interpret output from security technologies.

E. Deploy mobile devices securely.

F. Implement secure protocols.

III. Architecture and Design

A. Explain use cases, best practices, frameworks and secure configuration guides.

B. Implement secure network architecture concepts.

C. Implement secure systems design.

D. Explain the importance of secure staging deployment concepts.

E. Explain the security implications of embedded systems.

F. Summarize secure application development and deployment concepts.

G. Summarize cloud and virtualization concepts.

H. Explain how resiliency and automation strategies reduce risk.

I. Explain the importance of physical security controls.

IV. Identity and Access Management

A. Compare and contrast identity and access management concepts.

B. Install and configure identity and access services.

C. Implement identity and access management controls.

D. Differentiate common account management practices.

V. Risk Management

A. Explain the importance of policies, plans and procedures related to organizational security.

B. Summarize business impact analysis and concepts.

C. Explain risk management processes and concepts.

D. Follow incident response procedures.

E. Summarize basic concepts of forensics.

F. Explain disaster recovery and continuity of operation concepts.

G. Compare and contrast various types of controls.

H. Implement data security and privacy practices.

VI. Cryptography and PKI

A. Compare and contrast basic concepts of cryptography.

B. Explain cryptography algorithms and their basic characteristics.

C. Install and configure wireless security settings.

D. Understand public key infrastructure.

Method of Evaluation and Competencies:

20-30%    Quizzes
20-30%    Tests
40-50%    Lab Exercises

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 202

  • Title: IT Scripting*
  • Number: IT 202
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 231 .

Description:

The main objective of this course is to introduce students to writing scripts using Python. The course maps to the Python Institute PCAP (Python Certified Associate in Programming) certification exam with emphasis on networking programming. Topics covered in this course include lists, strings, dictionaries, functions, recursion, file processing, using modules, object-oriented programming and exception handling. 2 hrs. lecture, 2 hrs. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe and use Python literals, variables, strings and numerical operators.
  2. Explain and use decision, loops, lists and strings.
  3. Describe and write functions, tuples and dictionaries.
  4. Explain and use modules, packages, exception handling and string methods. 
  5. Explain and use object-oriented programming, methods, inheritance, exceptions and file processing

Content Outline and Competencies:

I. Python Literals, Operators and Variables 

A. Use Python literals int, float, string and Boolean. 

B. Use Python operators and variables.

II. Python Decision, Loops, Logic Operators and Lists 

A. Write scripts which use loops and decision. 

B. Write scripts which use logic operators. 

C. Write scripts which use lists. 

D. Use different list functions.

III. Functions, Scopes, Tuples and Dictionaries 

A. Explain and develop functions. 

B. Discuss the scopes of functions and variables. 

C. Discuss sequence types and mutability. 

D. Explain how to create and use dictionaries. 

E. Explain how to create and use tuples.

IV. Modules, Packages, Exception and String Methods 

A. Discuss how to use some of the most common Python modules. 

B. Explain how to make packages. 

C. Explain exception handling.  

D. Write scripts which use modules, and handle exception.

E. Explain strings and their methods, their similarities and differences compared to lists.

V. Object Oriented Programming, Methods, Inheritance, Exception, Generators and Processing Files 

A. Explain object-oriented programming implementation in Python including methods, classes, inheritance, abstraction, encapsulation and polymorphism. 

B. Discuss how to process data from files. 

C. Explain how to create your own exception. 

Method of Evaluation and Competencies:

25-55%     Labs and Projects
10-25%     Quizzes
10-25%     Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 204

  • Title: Enterprise Networking, Security and Automation*
  • Number: IT 204
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145 or IT 150.

Description:

Enterprise Networking, Security, and Automation is the 3rd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. The course describes the architectures and considerations related to designing, securing, operating and troubleshooting enterprise networks. The course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access along with the introduction of software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure and troubleshoot Single-area Open Shortest Path First (OSPFv2) to operate in both point-to-point and multi access networks. 
  2. Explain how vulnerabilities, threats and exploits can be mitigated to enhance network  security. 
  3. Implement Internet Protocol (IPv4) Access Control Lists (ACLs) to filter traffic and secure administrative access. 
  4. Configure Network Address Translation (NAT) services on the edge router to provide IPv4 address scalability. 
  5. Explain how WAN access technologies can be used to satisfy business requirements. 
  6. Explain how Virtual Private Networks (VPNs) secure site-to-site and remote access connectivity. 
  7. Explain how networking devices implement QoS. 
  8. Implement protocols to manage the network.
  9. Explain the characteristics of scalable network architectures.
  10. Troubleshoot enterprise networks. 
  11. Explain the purpose and characteristics of network virtualization. 
  12. Explain how network automation is enabled through Representational State Transfer (RESTful) APIs and configuration management tools. 

Content Outline and Competencies:

I. Single-Area OSPFv2 Concepts and Configuration

A. Explain how single-area OSPFv2 operates. 

B. Configure single-area OSPFv2. 

C. Configure the OSPF interface priority to influence the Designated Router/Backup Designated Router (DR/BDR) election in a multi-access network. 

D. Verify a single-area OSPFv2 implementation.

II. Network Security Concepts 

A. Describe the current state of cybersecurity and vectors of data loss. 

B. Describe tools used by threat actors to exploit networks. 

C. Describe malware types and common network attacks. 

D. Explain how IP, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) vulnerabilities are exploited by threat actors. 

E. Describe best practices for protecting a network.

III. ACL Concepts and Configuration 

A. Explain how ACLs filter traffic. 

B. Configure standard and extended IPv4 ACLs to filter traffic to meet network requirements. 

C. Compare standard and extended IPv4 ACLs.

IV. NAT for IPv4 

A. Explain the purpose and function of NAT. 

B. Configure static and dynamic NAT using the Command Line Interface (CLI). 

C. Describe NAT for IPv6.

V. WAN Concepts 

A. Explain the purpose of a WAN. 

B. Explain how WAN operate. 

C. Compare traditional and modern WAN connectivity options. 

D. Compare internet-based connectivity options.

VI. VPN and IPsec Concepts 

A. Describe the benefits of VPN technology. 

B. Describe different types of VPNs. 

C. Explain how the IPsec framework is used to secure network traffic.

VII. QoS Concepts 

A. Describe minimum network requirements for voice, video and data traffic. 

B. Describe the queuing algorithms used by networking devices. 

C. Describe the different QoS models. 

D. Explain how QoS uses mechanisms to ensure transmission quality.

VIII. Network Management

A. Use CDP and LLDP to map a network topology. 

B. Implement Network Time Protocol (NTP) between an NTP client and NTP server. 

C. Explain Simple Network Management Protocol (SNMP) and Syslog operations. 

D. Use Commands to backup and restore an Internetwork Operation System (IOS) configuration file. 

E. Implement protocols to manage the network.

IX. Network Design 

A. Explain how data, voice and video are converged in a switched network. 

B. Explain considerations for designing a scalable network. 

C. Explain how switch hardware features support network requirements. 

D. Describe the types of routers available for small to medium-sized business networks.

X. Network Troubleshooting 

A. Explain how network documentation is developed and used to troubleshoot network issues. 

B. Compare troubleshooting methods that use a systematic, layered approach. 

C. Describe different networking troubleshooting tools. 

D. Troubleshoot a network using the layered model.

XI. Network Virtualization 

A. Explain the importance of virtualization and cloud computing. 

B. Describe the virtualization of network devices and services. 

C. Describe software-defined networking. 

D. Describe controllers used in network programming.

XII. Network Automation 

A. Compare Java Script Object Notation (JSON), YAML Ain't Markup Language (YAML) and Extensible Markup Language (XML) data formats. 

B. Explain how APIs enable computer to computer communications.

C. Compare the configuration management tools Puppet, Chef, Ansible and SaltStack.  

D. Explain how Cisco Digital Network Architecture (DNA) center enable intent-based networking. 

Method of Evaluation and Competencies:

25-55%    Labs and Projects
10-25%    Quizzes
10-25%    Skill Assessment
10-35%   Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 206

  • Title: Network Security Fundamentals*
  • Number: IT 206
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145 or IT 150.

Description:

This course is designed to provide an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality and availability of data and devices. Topics covered include network threats, mitigation techniques, securing network devices, implementing firewall technologies, implementing intrusion prevention, securing local area networks (LANs), implementing virtual private networks (VPNs), and managing a secure network. Hands-on exercises will be used to reinforce the concepts. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain network threats, mitigation techniques and the basics of securing a network.
  2. Secure administrative access with Authentication, Authorization and Accounting (AAA).
  3. Implement firewall technologies to secure the network perimeter.
  4. Configure Intrusion Prevention System (IPS) to mitigate attacks on the network.
  5. Describe LAN security considerations and implement endpoint and layer 2 security features.
  6. Describe methods for implementing data confidentiality and integrity.
  7. Implement secure VPNs.
  8. Create and implement a comprehensive security policy based on enterprise security needs.

Content Outline and Competencies:

I. Network Threats and Mitigation Techniques

A. Explain network threats, mitigation techniques and the basics of securing a network.

B. Describe Trojan Horse attacks.

C. Identify computer viruses and worms.

D. Identify denial of service attacks.

II. Administrative Access to Network Devices

A. Explain physical security and its implementation.

B. Disable unused services to minimize the attack surface.

C. Implement enhanced login security methods.

D. Implement server-based AAA authentication using Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System (TACACS) protocols.

III. Firewall Technologies

A. Describe the operation of firewalls.

B. Configure packet filtering using access control lists.

C. Implement a router-based firewall to protect the perimeter of the network.

D. Implement a dedicated firewall appliance to protect the perimeter of the network.

IV. IPS

A. Explain how network-based IPS is used to help secure a network.

B. Explain how signatures are used to detect malicious network traffic.

C. Configure Cisco IPS operations.

V. LAN Security

A. Compare and contrast internal and external network threats.

B. Implement layer 2 security measures to mitigate internal threats.

C. Configure port security on a network switch.

D. Explain common technologies used to enhance endpoint security.

VI. Confidentiality and Integrity

A. Describe common public and symmetric key encryption algorithms.

B. Describe common hashing algorithms used in data integrity.

C. Explain the functions of digital certificates in e-commerce transactions.

D. Describe the framework of Public Key Infrastructure (PKI).

E. Explain steganography technology and its applications.

VII. VPNs

A. Describe encryption protocols used in VPN applications.

B. Compare site-to-site and remote access VPN technologies.

C. Implement site-to-site VPN using Internet Protocol Security (IPSec) architecture.

D. Implement remote access VPN using Secure Socket Layer (SSL) protocols.

VIII. Security Policies

A. Analyze internal and external security risks.

B. Define disaster recovery procedures.

C. Develop an action plan.

D. Write a formal security plan.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 223

  • Title: Azure Administration*
  • Number: IT 223
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 155 or IT 221.

Description:

This course teaches students the fundamentals of Azure Administration. Students will implement, manage and monitor identity, governance, storage, compute and virtual networks in a cloud environment. Students will provision, size, monitor and adjust resources as appropriate. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Manage Azure identities and governance.
  2. Implement and manage storage.
  3. Deploy and manage Azure compute resources.
  4. Configure and manage virtual networking.
  5. Monitor and back up Azure resources.

Content Outline and Competencies:

I. Azure Identities and Governance

A. Configure Azure Active Directory (AD) objects.

B. Implement role-based access control (RBAC).

C. Manage subscriptions and governance.

II. Storage

A. Manage storage accounts.

B. Manage data in Azure Storage.

C. Configure Azure files and Azure blob storage.

III. Azure Compute Resources

A. Configure virtual machines (VMs) for high availability and scalability.

B. Automate deployment and configuration of VMs.

C. Create and configure VMs.

D. Implement containers.

E. Deploy Web Apps.

IV. Virtual Networking

A. Implement and manage virtual networking.

B. Configure name resolution.

C. Secure virtual networks.

D. Configure load balancing.

E. Integrate an on-premise network with an Azure virtual network.

V. Azure Resources

A. Monitor resources using Azure Monitor.

B. Implement backup and recovery.

Method of Evaluation and Competencies:

20-50%    Quizzes
30-50%    Assignments
15-30%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 224

  • Title: Modern Desktop Administrator*
  • Number: IT 224
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 155 or IT 221.

Description:

This course teaches students the fundamentals of Modern Desktop Administration. Students will deploy, configure, secure, manage and monitor devices and client applications in an enterprise environment. Students will manage identity, access, policies, updates and apps. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Deploy and update operating systems.
  2. Manage policies and profiles.
  3. Manage and protect devices.
  4. Manage apps and data.

Content Outline and Competencies:

I. Operating Systems

A. Deploy Windows 10 by using dynamic deployment.

B. Deploy Windows 10 by using Windows Autopilot.

C. Upgrade devices to Windows 10.

D. Manage updates.

E. Manage device authentication.

II. Policies and Profiles

A. Implement co-management.

B. Configure conditional access and compliance policies for devices.

C. Manage device profiles.

D. Manage user profiles.

III. Devices

A. Configure Windows Defender.

B. Manage Intune device enrollment and inventory.

C. Monitor devices.

IV. Apps and Data

A. Deploy and update applications.

B. Implement Mobile Application Management (MAM).

Method of Evaluation and Competencies:

20-50%    Quizzes
30-50%    Assignments
15-30%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 230

  • Title: Linux Fundamentals
  • Number: IT 230
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to perform Linux installation and package management; execute common Linux commands and utilities; and accomplish different system tasks such as navigating the filesystem and utilizing the resources of a basic Linux system.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Interact with shells and commands using the command line.

  2. Perform basic file management and locate system files.

  3. Perform basic text file tasks and manage processes.

  4. Perform advanced file management tasks.

  5. Describe and configure the Linux boot process and install a boot manager.

  6. Design hard disk layout and create partitions and filesystems.

  7. Manage disk quotas and maintain the integrity of filesystems.

  8. Describe and use package management.

Content Outline and Competencies:

I. Shell Configuration

A. Work on the command line.

B. Process text streams using filters.

C. Use streams, pipes and redirects.

II. Basic File Management

A. Perform basic file management.

B. Locate system files and place files in the correct location.

III. Text Processing

A. Search Text Files using regular expressions.

B. Perform basic file editing operations using the vi editor.

C. Create, monitor and kill processes.

D. Modify process execution priorities.

IV.  Advanced File Management

A. Manage file permission and ownership.

B. Create and change hard and symbolic links.

C. Create and manage archives.

V. Boot Process

A. Determine and configure hardware settings.

B. Change runlevels and shutdown or reboot system.

C. Boot the system and install a boot manager.

VI. Partitions

A. Design hard disk layout.

B. Create partitions and filesystems.

C. Control mounting and unmounting of filesystems.

VII. Filesystems Administration

A. Maintain the integrity of filesystems.

B. Manage disk quotas.

VIII. System Software

A. Use Red Hat package management.

B. Use Debian package management.

C. Manage shared libraries.

Method of Evaluation and Competencies:

40-60%    Quizzes/Projects/Assignments
40-60%    Tests

Total: 100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 231

  • Title: Linux Administration*
  • Number: IT 231
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 230.

Description:

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including configuring the graphical user interface, managing user accounts, managing system logging, configuring basic networking, writing shell scripts and maintaining system security.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Customize the shell environment and write shell scripts.
  2. Configure X Windows and set up a display manager.
  3. Manage user accounts and automate system administration tasks.
  4. Maintain system time and system logging.
  5. Configure basic networking.
  6. Describe and configure system security features.

Content Outline and Competencies:

I. Advanced Shell Features

A. Customize and use the shell environment.

B. Customize or write simple scripts.

C. Configure and use Structured Query Language (SQL) data management.

II. Display Administration

A. Install and configure X11.

B. Set up a display manager.

C. Configure accessibility, localization and internationalization.

III. System Administration

A. Manage user and group accounts and related system files.

B. Automate system administration tasks by scheduling jobs.

IV. Essential System Services

A. Configure and maintain network time synchronization.

B. Configure and manage system logging.

C. Configure basic mail transfer agent.

D. Configure and manage printers and printing.

V. Network Fundamentals

A. Describe the fundamentals of Internet Protocols.

B. Configure the network interface.

C. Utilize troubleshooting commands and utilities.

D. Configure client-side Domain Name System (DNS).

VI. System Security Features

A. Perform security administration tasks.

B. Describe and utilize methods of host security.

C. Describe and perform data encryption.

Method of Evaluation and Competencies:

40-60%    Quizzes/Projects/Assignments
40-60%    Tests

Total: 100% 

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 238

  • Title: Digital Forensics*
  • Number: IT 238
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: (IT 120 or IT 205) and IT 230.

Description:

This course will cover the fundamentals of computer and cyber forensics. Students will learn different aspects of digital evidence and methods to uncover illegal activities left on storage media. Various forensics tools, techniques and procedures will be used in a lab environment to perform forensic investigations. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the fundamentals of digital forensics.
  2. Explore Windows and Linux file systems.
  3. Utilize various forensic acquisition tools.
  4. Describe procedures to safeguard digital forensics artifacts.
  5. Perform web browser forensics.
  6. Perform email forensics.
  7. Create understandable and accurate digital forensics reports.
  8. Implement anti-forensics methods.

Content Outline and Competencies:

 I. Digital Forensics Fundamentals

A. Plan the investigation case.

B. Prepare the computer forensics workstation and software.

C. Acquire, validate, extract and analyze digital evidence.

D. Complete the investigation case.

II. File Systems

A. Describe the filing system and disk structures for Windows.

B. Explain the structure of the Windows registry.

C. Describe the filing system and disk structures for Linux.

D. Explain the boot process for Linux.

III. Forensics Tools

A. Identify the need for computer forensics tools.

B. Evaluate the requirements for common forensics tools.

C. Validate and test common forensics tools.

 

IV. Forensics Artifacts

A. Summarize the Chain of Custody process.

B. Describe procedures used to protect digital evidence.

C. Verify compliance with common laws regarding search and seizure of digital evidence.

V. Web Browser Forensics

A. Extract evidence from common web browser activities.

B. Reconstruct browsing index.dat files.

C. Compare the security configurations of common web browsers.

VI. Email Forensics

A. Explore the roles of the client and server in email.

B. Investigate email crimes and violations.

C. Implement specialized email forensics tools.

D. Contrast the operation of common email systems.

VII. Forensics Reports

A. Explain digital forensics reporting guidelines.

B. Review examples of local forensics reports.

C. Create a digital forensics report.

VIII. Anti-Forensics Methods

A. Implement steganography to obscure evidence.

B. Describe methods used to overwrite data and metadata.

C. Implement techniques to recover damaged digital evidence.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Tests

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 239

  • Title: Ethical Hacking*
  • Number: IT 239
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: (IT 145 or IT 150) and IT 230.

Description:

This course introduces students to common computer vulnerabilities as well as exploits and techniques used by hackers. Students will develop countermeasures to mitigate attacks and strengthen system security. Topics covered include vulnerability scanning, social engineering, denial of service attacks, intrusion detection, buffer overflow and penetration testing. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Perform reconnaissance and footprinting procedures to collect information about potential targets.
  2. Describe common social engineering attacks and policies to mitigate them. 
  3. Demonstrate password-cracking techniques and develop measures to strengthen passwords.
  4. Deploy Metasploit framework to perform penetration testing on various systems.
  5. Attack web applications using cross-site scripting (XSS), command injection and client-side exploitations.
  6. Perform network analysis using common sniffing tools.
  7. Install backdoors to compromise access privileges and system integrity.
  8. Describe common attacks against cryptographic security measures. 

Content Outline and Competencies:

I. Reconnaissance and Footprinting

A. Use Network Mapper (Nmap) to outline the attack surface of potential targets.

B. Use Wireshark and Transport Control Protocol Dump (tcpdump) to identify system vulnerabilities.

C. Perform network enumeration to discover remote hosts, open ports and fingerprints of installed operating systems and applications.

II. Social Engineering

A. List common social engineering techniques.

B. Identify policies to train users to recognize social engineering attacks.

C. Describe impersonation methods used to compromise social networking accounts.

D. Identify countermeasures to protect against identity theft.

III. Passwords Attacks

A. Describe password-cracking techniques including dictionary, brute force and rainbow tables.

B. Extract password hashes from computer filing systems.

C. Perform password cracking using John the Ripper and Hashcat.

D. Develop strong password policies to mitigate unauthorized access.

IV. Penetration Testing

A. Describe Metasploit and Meterpreter frameworks.

B. Configure and launch system hacks using Metasploit.

C. Analyze antivirus evasion techniques to bypass installed security measures.

D. Implement pivoting strategies to expand attacks from the target environment.

V. Web Attacks

A. Probe web applications for potential vulnerabilities.

B. Perform web penetration testing with Nikto and Zed Attack Proxy (ZAP).

C. Hack web applications using XSS, Cross-Site Request Forgery (XSRF) and command injection.

VI. Network Analysis

A. Compare common network sniffing tools.

B. Configure Wireshark filters to capture specific network traffic.

C. Analyze captured packets in Transmission Control Protocol (TCP) stream to locate sensitive data.

D. Install measures to avoid intrusion detection systems and firewalls.

VII. Backdoors

A. Install a Virtual Network Computing (VNC) backdoor to compromise remote access.

B. Configure NetCat as a backdoor on remote systems.

C. Scan hosts on the network for potential backdoors.

VIII. Cryptography

A. Contrast symmetric and asymmetric encryption algorithms.

B. Create and install Secure Socket Layer (SSL) certificates.

C. Describe the framework of Public Key Infrastructure (PKI).

D. Use cryptanalysis tools to launch cryptographic attacks.

 

Method of Evaluation and Competencies:

25-55%    Hands-on labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 257

  • Title: Cybersecurity Operations*
  • Number: IT 257
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 175 and (IT 150 or IT 145) and IT 230.

Description:

Cybersecurity Operations is designed to map to the Cisco Certified CyberOps Associate certification. The course covers knowledge and skills needed to successfully handle the tasks, duties and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Topics covered include investigating endpoint vulnerabilities and attacks, evaluating network security alerts and applying incident response models to manage network security incidents. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  2. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  3. Explain the features and characteristics of the Linux Operating System.
  4. Analyze the operation of network protocols and services.
  5. Explain the operation of the network infrastructure.
  6. Classify the various types of network attacks.
  7. Use network monitoring tools to identify attacks against network protocols and services.
  8. Use various methods to prevent malicious access to computer networks, hosts and data.
  9. Explain the impacts of cryptography on network security monitoring.
  10. Explain how to investigate endpoint vulnerabilities and attacks.
  11. Evaluate network security alerts.
  12. Analyze network intrusion data to identify compromised hosts and vulnerabilities.
  13. Apply incident response models to manage network security incidents.

Content Outline and Competencies:

I. Cybersecurity and the Security Operations Center

A. Explain why networks and data are attacked.

B. Explain how to prepare for a career in Cybersecurity operations.

II. Windows Operating System

A. Explain the operation of the Windows Operating System.

B. Explain how to secure Windows endpoints.

III. Linux Operating System

A. Perform basic operations in the Linux shell.

B. Perform basic Linux administration tasks.

C. Perform basic security-related tasks on a Linux host.

IV. Network Protocols and Services

A. Explain how protocols enable network operations.

B. Explain how the Ethernet and IP protocols support network communication.

C. Use common testing utilities to verify and test network connectivity.

D. Explain how the address resolution protocol enables communication on a network.

E. Explain how transport layer protocols and network services support network functionality.

F. Explain how network services enable network functionality.

V. Network Infrastructure

A. Explain how network devices enable wired and wireless network communication.

B. Explain how devices and services are used to enhance network security.

C. Explain how networks and network topologies are represented.

VI. Principles of Network Security

A. Explain how networks are attacked.

B. Explain the various types of threats and attacks.

VII. Network Attacks: A Deeper Look

A. Explain network traffic monitoring.

B. Explain how Transport Control Protocol/Internet Protocol (TCP/IP) vulnerabilities enable network attacks.

C. Explain how common network applications and services are vulnerable to attack.

VIII. Protecting the Network

A. Explain approaches to network security defense.

B. Explain access control as a method of protecting a network.

C. Explain how firewalls and other devices prevent network intrusions.

D. Explain how content filtering prevents unwanted data from entering the network.

E. Use various intelligence sources to locate current security threats.

IX. Cryptography and the Public Key Infrastructure

A. Use tools to encrypt and decrypt data.

B. Explain how the public key infrastructure (PKI) supports network security.

X. Endpoint Security and Analysis

A. Use a tool to generate a malware analysis report.

B. Classify endpoint vulnerability assessment information.

XI. Security Monitoring

A. Explain how security technologies affect security monitoring.

B. Explain the types of log files used in security monitoring.

XII. Intrusion Data Analysis

A. Explain how security-related data is collected.

B. Arrange a variety of log files in preparation for intrusion data analysis.

C. Analyze intrusion data to determine the source of an attack.

XIII. Incident Response and Handling

A. Apply incident response models to an intrusion event.

B. Apply standards specified in National Institute of Standards and Technology (NIST) 800-61r2 to a computer security incident.

C. Given a set of logs, isolate a threat actor and recommend an incident response plan.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 271

  • Title: Information Technology Internship I*
  • Number: IT 271
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: (IT 120 or IT 140 or IT 141 or IT 205 or IT 230) and Department approval.

Description:

This course affords the student the opportunity to apply classroom knowledge to a real-world environment. Students will gain advanced information technology experience working with local employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours/semester at an approved job site.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable level of preparedness, personally and professionally, for a career. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job

A. Describe job-related activities accomplished while at the workplace.

B. Keep a log-book of weekly activities or tasks performed while at the workplace.

C. Furnish activity log compiled for each week of work to the instructor at the end of the course.

II. Company, Products and Services

A. Describe the company where the internship duties are performed, including the company’s mission or goals.

B. Provide a general outline of the organizational structure of the company and where the student fits into that structure.

C. Identify and describe the products and services produced by the company.

D. Provide a detailed description of products and services the student was directly involved with during the internship.

III. Classroom Experience to Work Assignments

A. Install and/or maintain equipment for a local area network (LAN).

B. Install and/or support software for a local area network.

C. Administer user accounts and access rights for a local area network.

D. Install and/or support a local web server and website.

E. Provide PC and network support for end-users.

IV. Workplace Skills

A. Follow written and oral instructions.

B. Demonstrate effective oral communication.

C. Create and present technical information in written format.

D. Compile and maintain records, logs or other documents.

E. Demonstrate interpersonal skills appropriate to a business environment.

F. Solve problems in a logical and reasonable manner.

G. Participate in team or group project.

H. Manage time and resources effectively.

I. Follow employee rules, regulations and policies.

J. Demonstrate effective work ethics appropriate to a business environment.

Method of Evaluation and Competencies:

20-30%    Instructor's evaluations
20-30%    Weekly work log
40-60%    Evaluation of the student by the work supervisor

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 272

  • Title: Information Technology Internship II*
  • Number: IT 272
  • Effective Term: 2021-22
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: IT 271 and department approval.

Description:

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable preparedness, personally and professionally, for a career position. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the workplace.
   B. Keep a log book of weekly activities or tasks performed while at the workplace.
   C. Furnish activity log compiled for each week of work to the instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company produces.
   D. Provide a detailed description of products and services the student was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business environment.

Method of Evaluation and Competencies:

Instructor's on-site visits and evaluations 20%
Weekly work log 20%
Evaluation of the student by the work supervisor 60%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Transportation to work site is the responsibility of the student. 

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 292

  • Title: Special Topics:*
  • Number: IT 292
  • Effective Term: 2021-22
  • Credit Hours: 1 - 3
  • Contact Hours: 2 - 6
  • Lecture Hours: 1 - 3
  • Lab Hours: 1 - 3

Requirements:

Prerequisites: Department approval.

Description:

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit, but only on different topics.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Appropriately use terminology related to the special topic. 
  2. Solve problems by using content related to the special topic.
  3. Demonstrate conceptual understanding of the special topic.
  4. Use software and hardware related to the special topic.

Content Outline and Competencies:

Will vary within the guidelines of the Educational Affairs committee.

Method of Evaluation and Competencies:

Will vary within the guidelines of the Educational Affairs committee.

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).