Courses

IT 120   CompTIA A+ Core 2 (3 Hours)

This course aligns with the CompTIA A+ Core 2 certification exam. Students will learn to install and configure an operating system (OS), identify and apply fundamental security concepts, troubleshoot software and OS configurations and use best practice operational procedures. 2 hrs. lecture/2 hrs. lab/1 hr. open lab/wk.

IT 141   Introduction to Networks (3 Hours)

Introduction to Networks is the first of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course introduces the architecture, structure, functions, components, and models of the internet and other computer networks. The principles and structure of Internet Protocol (IP) addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple local area networks (LANs), perform basic configurations for routers and switches, and implement IP addressing schemes. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 150   Switching, Routing, and Wireless Essentials* (3 Hours)

Prerequisites : IT 140 or IT 141.

Switching, Routing and Wireless Essentials is the 2nd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLANs) and security concepts. Students will learn how to perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 151   VMware vSphere Essentials* (3 Hours)

Prerequisites : IT 120.

Students will gain a foundational understanding of virtualization and vSphere concepts, including cloud, network, and data center. Students will learn troubleshooting techniques and attain a working knowledge of managing a virtual environment using vSphere. 2 hrs. lecture/2 hrs. lab/1 hr. open lab/wk.

IT 152   Google Cloud Fundamentals* (3 Hours)

Prerequisites : IT 120.

This course teaches students the skills to successfully manage and maintain Google Cloud solutions. Topics include configuring infrastructure and application modernization, securing cloud operations, and configuring, managing and deploying Google Cloud solutions. 2 hrs. lecture/2 hrs. lab/1hr. open lab/wk.

IT 153   AWS Cloud Foundations* (3 Hours)

Prerequisites : IT 120.

This course provides students with a fundamental understanding of cloud computing in Amazon Web Services (AWS). Topics include cloud concepts, core services, security, architecture, pricing, support and data center technologies. 2 hrs. lecture/2 hrs. lab/1hr. open lab/wk.

IT 155   Microsoft Administration Fundamentals* (3 Hours)

Prerequisites : IT 120 or IT 205.

This course is designed to provide students with foundational knowledge of cloud concepts and services in Microsoft 365 and Microsoft Azure. Students will also learn about cloud security, privacy, compliance, and trust in these environments. 2 hrs. lecture, 2 hrs. lab, and 1 hr. open lab/wk.

IT 175   Cybersecurity Fundamentals* (3 Hours)

Prerequisites : (IT 120 or IT 205) and (IT 140 or IT 141).

This course is designed to provide students with the knowledge and skills required to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. Students will perform these tasks to support the principles of confidentiality, integrity and availability. 2 hrs. lecture, 2 hrs. lab, 1 hr. open lab/wk.

IT 202   IT Scripting* (3 Hours)

Prerequisites : IT 231 .

The main objective of this course is to introduce students to writing scripts using Python. The course maps to the Python Institute PCAP (Python Certified Associate in Programming) certification exam with emphasis on networking programming. Topics covered in this course include lists, strings, dictionaries, functions, recursion, file processing, using modules, object-oriented programming and exception handling. 2 hrs. lecture, 2 hrs. open lab/wk.

IT 204   Enterprise Networking, Security and Automation* (3 Hours)

Prerequisites : IT 145 or IT 150.

Enterprise Networking, Security, and Automation is the 3rd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. The course describes the architectures and considerations related to designing, securing, operating and troubleshooting enterprise networks. The course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access along with the introduction of software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 206   Network Security Fundamentals* (3 Hours)

Prerequisites : IT 145 or IT 150.

This course is designed to provide an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality and availability of data and devices. Topics covered include network threats, mitigation techniques, securing network devices, implementing firewall technologies, implementing intrusion prevention, securing local area networks (LANs), implementing virtual private networks (VPNs), and managing a secure network. Hands-on exercises will be used to reinforce the concepts. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 207   AWS Cloud Operations* (3 Hours)

Prerequisites : IT 153.

This course teaches students the skills to successfully manage cloud operations of Amazon Web Services (AWS). Topics include creating automatable and repeatable deployments of networks and systems using AWS features and tools for configuration and deployment. 2 hrs. lecture/2 hrs. lab/1 hr. open lab/wk.

IT 223   Azure Administration* (3 Hours)

Prerequisites : IT 155 or IT 221.

This course teaches students the fundamentals of Azure Administration. Students will implement, manage and monitor a Microsoft Azure environment, including virtual networks, storage, compute, identity, security and governance. Students will also implement security controls that protect identity, access, data, applications and networks in cloud and hybrid environments as part of an end-to-end infrastructure. 2 hrs. lecture, 2 hrs. lab, and 1 hr. open lab/wk.

IT 224   Microsoft 365 Administration* (3 Hours)

Prerequisites : IT 155 or IT 221.

This course teaches students the fundamentals of deploying, configuring, protecting, managing, and monitoring devices and client applications in a Microsoft 365 environment. Students will manage identity, security, access, policies, updates, and apps for endpoints. They will implement solutions for efficient deployment and management of endpoints on various operating systems, platforms, and device types. They will also perform Microsoft 365 tenant-level implementation and administration of cloud and hybrid environments. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 230   Linux Fundamentals (3 Hours)

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to perform Linux installation and package management; execute common Linux commands and utilities; and accomplish different system tasks such as navigating the filesystem and utilizing the resources of a basic Linux system.

IT 231   Linux Administration* (3 Hours)

Prerequisites : IT 230.

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including configuring the graphical user interface, managing user accounts, managing system logging, configuring basic networking, writing shell scripts and maintaining system security.

IT 238   Digital Forensics* (3 Hours)

Prerequisites : (IT 120 or IT 205) and IT 230.

This course will cover the fundamentals of computer and cyber forensics. Students will learn different aspects of digital evidence and methods to uncover illegal activities left on storage media. Various forensics tools, techniques and procedures will be used in a lab environment to perform forensic investigations. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 239   Ethical Hacking* (3 Hours)

Prerequisites : (IT 145 or IT 150) and IT 230.

This course introduces students to common computer vulnerabilities as well as exploits and techniques used by hackers. Students will develop countermeasures to mitigate attacks and strengthen system security. Topics covered include vulnerability scanning, social engineering, denial of service attacks, intrusion detection, buffer overflow and penetration testing. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 257   Cybersecurity Operations* (3 Hours)

Prerequisites : IT 175 and (IT 150 or IT 145) and IT 230.

Cybersecurity Operations is designed to map to the Cisco Certified CyberOps Associate certification. The course covers knowledge and skills needed to successfully handle the tasks, duties and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Topics covered include investigating endpoint vulnerabilities and attacks, evaluating network security alerts and applying incident response models to manage network security incidents. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

IT 271   Information Technology Internship I* (3 Hours)

Prerequisites : (IT 120 or IT 140 or IT 141 or IT 205 or IT 230) and Department approval.

This course affords the student the opportunity to apply classroom knowledge to a real-world environment. Students will gain advanced information technology experience working with local employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours/semester at an approved job site.

IT 272   Information Technology Internship II* (3 Hours)

Prerequisites : IT 271 and department approval.

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

IT 292   Special Topics:* (1-3 Hour)

Prerequisites : Department approval.

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit, but only on different topics. This is a repeatable course and may be taken more than once for credit.

IT 120

  • Title: CompTIA A+ Core 2
  • Number: IT 120
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

This course aligns with the CompTIA A+ Core 2 certification exam. Students will learn to install and configure an operating system (OS), identify and apply fundamental security concepts, troubleshoot software and OS configurations and use best practice operational procedures. 2 hrs. lecture/2 hrs. lab/1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Install, configure and manage OSs.

  2. Identify and apply security concepts.

  3. Troubleshoot software and OS configurations.

  4. Implement proper operational procedures.

Content Outline and Competencies:

I. Operating Systems

A. Identify basic features of Microsoft Windows editions.

B. Use the appropriate Microsoft command-line tool given a scenario.

C. Use features and tools of the Microsoft Windows OS.

D. Perform tasks using the appropriate Microsoft Windows Control Panel utility.

E. Modify Windows settings.

F. Configure Microsoft Windows networking features on a client/desktop.

G. Apply application installation and configuration concepts.

H. Explain common OS types and their purposes.

I. Perform OS installations and upgrades in a diverse OS environment.

J. Identify common features and tools of the macOS/desktop OS.

K. Identify common features and tools of the Linux client/desktop OS.

II. Security

A. Summarize various security measures and their purposes.

B. Compare and contrast wireless security protocols and authentication methods.

C. Detect, remove and prevent malware using the appropriate tools and methods.

D. Explain common social-engineering attacks, threats and vulnerabilities.

E. Manage and configure basic security settings in the Microsoft Windows OS.

F. Configure a workstation to meet best practices for security.

G. Explain common methods for securing mobile and embedded devices.

H. Use common data destruction and disposal methods.

I. Configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.

J. Install and configure browsers and relevant security settings.

III. Software Troubleshooting

A. Troubleshoot common Windows OS problems.

B. Troubleshoot common personal computer (PC) security issues.

C. Use best practice procedures for malware removal.

D. Understand common mobile OS and application issues.

E. Explain common mobile OS and application security issues.

IV. Operational Procedures

A. Implement best practices associated with documentation and support systems information management.

B. Explain basic change-management best practices.

C. Implement workstation backup and recovery methods.

D. Describe common safety procedures.

E. Summarize environmental impacts and local environmental controls.

F. Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.

G. Use proper communication techniques and professionalism.

H. Identify the basics of scripting.

I. Configure and implement remote access technologies.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total:       100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 141

  • Title: Introduction to Networks
  • Number: IT 141
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

Introduction to Networks is the first of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course introduces the architecture, structure, functions, components, and models of the internet and other computer networks. The principles and structure of Internet Protocol (IP) addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple local area networks (LANs), perform basic configurations for routers and switches, and implement IP addressing schemes. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explore and describe the devices and services used to support communications in data networks and the Internet.
  2. Use Cisco command-line interface (CLI) commands to perform basic switch and end devices configurations.
  3. Describe the role of protocol layers in data networks.
  4. Explain fundamental Ethernet concepts, such as media, services and operations.
  5. Describe the functions of the network layer and the importance of addressing in IPv4 and IPv6 environments.
  6. Design, calculate and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 networks.
  7. Explain the operation of application and transport layers protocols.
  8. Build a simple network using routers and switches.

Content Outline and Competencies:

I. Network Exploration

A. Explain how multiple networks are used in everyday life.

B. Describe the topologies and devices used in a small to medium-sized business network.

C. Explain the basic characteristics of a network that supports communication in a small to medium-sized business.

D. Explain trends in networking that will affect the use of networks in small to medium-sized businesses.

II. Basic Switch and End Device Configurations

A. Explain the features and functions of Cisco Internetwork Operating System (IOS) Software.

B. Configure initial settings on a switch using the Cisco IOS software.

C. Given an IP addressing scheme, configure IP address parameters on end devices to provide end-to-end connectivity in a small to medium-sized business network.

III. Network Protocols and Communications

A. Explain how rules are used to facilitate communication.

B. Explain the role of protocols and standards organizations in facilitating interoperability in network communications.

C. Explain how devices on a LAN access resources in a small to medium-sized business network.

IV. Ethernet

A. Explain the operation of Ethernet.

B. Build a simple network using the appropriate media.

C. Explain how the Data Link layer supports communications across data networks.

D. Compare media access control techniques and logical topologies used in networks

E. Explain how a switch operates.

F. Explain how the address resolution protocol enables communication on a network.

V. Network Layer and IP Addressing

A. Explain how network layer protocols and services support communications across data networks.

B. Explain how routers enable end-to-end connectivity in a small to medium-sized business network.

C. Explain how devices route traffic in a small to medium-sized business network.

D. Configure a router with basic configurations.

E. Explain the use of IPv4 addresses to provide connectivity in a small to medium-sized business network.

F. Configure IPv6 addresses to provide connectivity in small to medium-sized business networks.

G. Use common testing utilities to verify network connectivity.

VI. IP Networks Subnetting

A. Implement an IPv4 addressing scheme to enable end-to-end connectivity in a small to medium-sized business network.

B. Given a set of requirements, implement a Variable Length Subnet Mask (VLSM) addressing scheme to provide connectivity to end users in a small to medium-sized network.

C. Explain design considerations for implementing IPv6 in a business network.

VII. Transport Layer and Application Layer

A. Describe the purpose of the transport layer in managing the transportation of data in end-to-end communication.

B. Describe characteristics of the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) including port numbers and their uses.

C. Explain the operation of the application layer in providing support to end-user applications.

D. Explain how well-known TCP/IP application layer protocols and services operate.

VIII. Small Network Configuration

A. Explain how a small network can scale into a larger network.

B. Configure switches and routers with device hardening features to enhance security.

C. Use common show commands and utilities to establish a relative performance baseline for the network.

D. Apply troubleshooting methodologies and command host and IOS commands to resolve problems.

E. Explain how a small network of directly connected segments is created, configured and verified.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 150

  • Title: Switching, Routing, and Wireless Essentials*
  • Number: IT 150
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 140 or IT 141.

Description:

Switching, Routing and Wireless Essentials is the 2nd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. This course focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLANs) and security concepts. Students will learn how to perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

Upon successful completion of this course, the student should be able to:

  1. Configure devices by using security best practices.
  2. Implement Virtual Local Area Networks (VLANs) and trunking in a switched network.
  3. Implement inter-VLAN routing on Layer 3 devices.
  4. Explain how Spanning Tree Protocol (STP) enables redundancy in a Layer 2 network.
  5. Implement EtherChannel on switched links.
  6. Implement Dynamic Host Configuration Protocol (DHCP) in Internet Protocol (IP) v4 and IPv6 environments.
  7. Explain how First Hop Redundancy Protocols (FHRPs) provide default gateway services in a redundant network.
  8. Implement switch security to mitigate LAN attacks.
  9. Implement a WLAN using a wireless router and Wireless LAN Controller (WLC).
  10. Configure IPv4 and IPv6 static routes.

Content Outline and Competencies:

I. Basic Device Configuration

A. Configure Initial settings on a Cisco switch.

B. Configure secure management access on a switch.

C. Configure basic settings on a router to route between two directly connected networks.

D. Explain how frames are forwarded in a switched network.

E. Compare a collision domain to broadcast domain.

II. VLANs

A. Explain the purpose of VLANs in a switched network.

B. Explain how a switch forwards frames based on VLAN configuration in a multi-switch environment.

C. Configure a trunk port on a LAN switch.

D. Configure Dynamic Trunking Protocol (DTP).

III. Inter-VLAN Routing

A. Describe options for configuring inter-VLAN routing.

B. Configure router-on-a-stick inter-VLAN routing.

C. Configure inter-VLAN routing using Layer 3 switching.

D. Troubleshoot common inter-VLAN configuration issues.

IV. STP

A. Explain common problems in a redundant, L2 switched network.

B. Explain how STP operates in a simple, switched network.

C. Explain how Rapid Per-VLAN Spanning Tree Plus (RPVST+) operates.

V. EtherChannel

A. Describe EtherChannel technology.

B. Configure EtherChannel.

C. Troubleshoot EtherChannel.

VI. DHCP

A. Configure a router as a DHCPv4 server.

B. Explain how an IPv6 host can acquire its IPv6 configuration.

C. Configure a stateful and stateless DHCPv6 server.

VII. FHRP Concepts

A. Explain the purpose and operation of first hop redundancy protocols.

B. Explain how Hot Standby Router Protocol HSRP operates

VIII. Switch Security

A. Implement port security to mitigate Media Access Control (MAC) address table attacks.

B. Explain how to configure DTP and native VLAN to mitigate VLAN attacks.

C. Explain how to configure DHCP snooping to mitigate DHCP attacks.

D. Explain how to configure Address Resolution Protocol (ARP) inspection to mitigate ARP attacks.

E. Explain how to configure Portfast and Bridge Protocol Data Unit (BPDU) Guard to mitigate STP attacks.

IX. WLAN Concepts

A. Describe WLAN technology and standards.

B. Describe the components of a WLAN infrastructure.

C. Explain how wireless technology enables WLAN operation.

D. Describe WLAN security mechanisms.

X. Static Routing

A. Describe the command syntax for static routes.

B. Configure IPv4 and IPv6 static and default routes.

C. Configure a floating static route to provide a backup connection.

D. Troubleshoot common static and default route configuration issues.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 151

  • Title: VMware vSphere Essentials*
  • Number: IT 151
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 120.

Description:

Students will gain a foundational understanding of virtualization and vSphere concepts, including cloud, network, and data center. Students will learn troubleshooting techniques and attain a working knowledge of managing a virtual environment using vSphere. 2 hrs. lecture/2 hrs. lab/1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain foundational virtualization concepts.

  2. Analyze and implement VMware architectures and technologies.

  3. Install, configure, and setup VMware vSphere.

  4. Complete administrative and operational tasks using VMware vSphere.

Content Outline and Competencies:

I. Virtualization Foundations

A. Explain the benefits of virtualization.

B. Describe types of virtualization.

C. Identify the concepts of server, network, storage and desktop virtualization.

D. Explain the importance of virtual machines (VMs) and containers in cloud computing and DevOps.

II. Architecture and Technologies 

A. Identify how physical resources are presented to multiple VMs.

B. Explain type 1 and type 2 hypervisors.

C. Describe business challenges addressed by vSphere.

D. Identify components of the vSphere environment.

E. Configure vSphere virtual networking.

F. Analyze vSphere storage technologies.

G. Create VMs with various operating systems.

H. Use snapshots, cloning and templates.

III. Installation, Configuration, and Setup

A. Identify Virtual Switch configuration options.

B. Configure datastores.

C. Manage clustering and high availability.

D. Implement vMotion technology.

IV. Administrative and Operational Tasks

A. Describe considerations when provisioning a VM.

B. Explain role-based user management.

C. Troubleshoot virtual networking.

D. Explain the importance of monitoring alarms, tasks and events.

E. Identify virtual storage issues.

F. Use performance charts to monitor the environment.

G. Explain VMware Tools.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 152

  • Title: Google Cloud Fundamentals*
  • Number: IT 152
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 120.

Description:

This course teaches students the skills to successfully manage and maintain Google Cloud solutions. Topics include configuring infrastructure and application modernization, securing cloud operations, and configuring, managing and deploying Google Cloud solutions. 2 hrs. lecture/2 hrs. lab/1hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the basics of Google Cloud in digital transformation and innovation.

  2. Configure infrastructure and application modernization using Google Cloud.

  3. Secure Google Cloud operations using best practices.

  4. Configure, manage and deploy Google Cloud solutions.

Content Outline and Competencies:

I. Google Cloud Basics

A. Explain why cloud technology is revolutionizing business.

B. Compare and contrast cloud technology and traditional or on-premises technology.

C. Identify common Google Cloud solutions for data management.

D. Identify common Google Cloud solutions for smart analytics. 

E. Analyze Google Cloud’s solutions for machine learning and artificial intelligence (AI).

II. Infrastructure and Application Modernization

A. Explain why legacy infrastructure struggles to deliver modern services to customers.

B. Explain hybrid and multicloud infrastructures.

C. Differentiate between virtual machines, containers and serverless computing within business use cases.

D. Describe the business drivers for modernizing applications.

E. Explain the benefits of Google Kubernetes Engine, Anthos, and App Engine for application development.

F. Explain how application programming interfaces (APIs) can modernize legacy systems.

III. Cloud Security and Operations

A. Describe financial governance in the cloud and Google Cloud's recommended best practices for effective cloud cost management.

B. Define fundamental cloud security terms, including privacy, availability, security, and control.

C. Describe the security benefits of using Google Cloud.

D. Identify today's top cybersecurity challenges and threats to data privacy.

E. Demonstrate how organizations can control and manage access to cloud resources.

F. Differentiate service availability requirements in the cloud versus in on-premises environments.

G. Describe the operational challenges that DevOps solves.

H. Apply the goals of site reliability engineering (SRE) to different business use cases.

I. Identify Google Cloud solutions for cloud resource monitoring and application performance management.

IV. Cloud Solutions

A. Plan and estimate Google Cloud products use using the Pricing Calculator.

B. Plan and configure compute resources.

C. Configure data storage options.

D. Configure cloud monitoring and logging.

E. Implement data solutions.

F. Manage compute engine resources, including virtual machines, snapshots and images.

G. Manage network resources.

H. Configure management interfaces.

I. Manage current running cluster inventory.

J. Work with pods, services and stateful applications.

K. Configure access and security.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total:       100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 153

  • Title: AWS Cloud Foundations*
  • Number: IT 153
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 120.

Description:

This course provides students with a fundamental understanding of cloud computing in Amazon Web Services (AWS). Topics include cloud concepts, core services, security, architecture, pricing, support and data center technologies. 2 hrs. lecture/2 hrs. lab/1hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain foundational AWS cloud concepts.

  2. Describe data operations components and tools.

  3. Apply cloud security strategies.

  4. Design and configure AWS networks.

  5. Configure AWS compute, storage and database services.

  6. Design a cloud architecture using AWS best practices.

Content Outline and Competencies:

I. Cloud Concepts

A. Define different cloud computing models.

B. Describe the advantages of cloud computing.

C. Recognize the main AWS service categories and core services.

D. Describe AWS pricing and total cost of ownership (TCO).

E. Explain AWS Global Infrastructure.

II. Data Center Operations

A. Identify the basic design requirements for a data center.

B. Describe data center physical infrastructure.

C. Explain the importance of physical security and access control.

D. Discuss the fundamentals of electricity, including alternating current (AC), direct current (DC) and voltage types.

E. Explain the importance of batteries and generators in data centers.

F. Manage and operate datacenters using proper tools. 

G. Discuss data center maintenance, reliability, availability and efficiency.

H. Identify safety considerations in a data center.

I. Implement appropriate data center regulations.

III. Cloud Security

A. Explain the shared responsibility model.

B. Describe Identity and Access Management (IAM) users, groups, and roles.

C. Identify IAM security credentials.

D. Secure AWS accounts and data.

E. Explain AWS compliance programs.

IV. Networking 

A. Describe virtual networking in the cloud with Amazon Virtual Private Networking (VPC).

B. Design a basic VPC architecture.

C. Configure a customized network using a VPC.

D. Identify the fundamentals of Amazon Route 53.

E. Summarize the benefits of Amazon CloudFront.

V. Compute, Storage and Databases

A. Describe AWS compute services in the cloud.

B. Use AWS compute services to build a virtual computing environment. 

C. Identify how to run containerized applications in a cluster of managed servers.

D. Compare and contrast the different types of storage available in AWS.

E. Perform functions using AWS storage technologies to build a storage solution.

F. Describe AWS database services in the cloud.

G. Use AWS database services to launch, configure and interact with a database.

VI. Cloud Architecture

A. Describe the AWS Well-Architected Framework.

B. Discuss the importance of reliability and high availability. 

C. Explain the role of the AWS Trusted Advisor.

D. Perform automatic scaling and monitoring in an AWS environment.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total:       100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 155

  • Title: Microsoft Administration Fundamentals*
  • Number: IT 155
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 120 or IT 205.

Description:

This course is designed to provide students with foundational knowledge of cloud concepts and services in Microsoft 365 and Microsoft Azure. Students will also learn about cloud security, privacy, compliance, and trust in these environments. 2 hrs. lecture, 2 hrs. lab, and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Identify cloud concepts in Azure.
  2. Describe Azure architecture and services.
  3. Discuss Azure management and governance.
  4. Describe core Microsoft 365 services and concepts.
  5. Explain security, privacy, compliance and trust in Microsoft 365.
  6. Explain cloud pricing and support.

Content Outline and Competencies:

I. Cloud Concepts

A. Describe the benefits of using cloud services.

B. Describe cloud service types.

C. Explain the differences between public, private and hybrid cloud models.

II. Azure Architecture and Services

A. List core architectural components.

B. Describe compute and networking services.

C. Explain storage services.

D. Configure identity, access and security.

III. Azure Management and Governance

A. Describe cost management.

B. Explain features and tools for governance and compliance.

C. Explain features and tools for managing and deploying Azure resources.

D. Use monitoring tools.

IV. Microsoft 365 Services

A. Identify core Microsoft 365 components.

B. Describe productivity solutions.

C. Explain collaboration solutions.

D. Describe endpoint modernization, management concepts and deployment options.

E. Discuss analytics capabilities.

V. Microsoft 365 Security, Compliance, Privacy and Trust

A. Describe security, compliance and identity concepts.

B. Explain zero-trust security principles.

C. Describe identity and access management solutions.

D. Discuss threat protection solutions.

E. Implement trust, privacy and compliance solutions.

VI. Cloud Pricing and Support

A. Plan, predict and compare pricing.

B. Identify licensing options.

C. Describe the Microsoft 365 service lifecycle.

D. Describe support offerings for Microsoft 365 services.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 175

  • Title: Cybersecurity Fundamentals*
  • Number: IT 175
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: (IT 120 or IT 205) and (IT 140 or IT 141).

Description:

This course is designed to provide students with the knowledge and skills required to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. Students will perform these tasks to support the principles of confidentiality, integrity and availability. 2 hrs. lecture, 2 hrs. lab, 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Identify threats, attacks and vulnerabilities.
  2. Implement security technologies and tools.
  3. Design security architecture.
  4. Implement identity and access management techniques.
  5. Understand risk management.
  6. Apply cryptography and public key infrastructure (PKI).

Content Outline and Competencies:

I. Threats, Attacks and Vulnerabilities

A. Analyze indicators of compromise and determine the type of malware.

B. Compare and contrast types of attacks.

C. Explain threat actor types and attributes.

D. Describe penetration testing concepts.

E. Identify vulnerability scanning concepts.

F. Explain the impact associated with types of vulnerabilities.

II. Technologies and Tools

A. Install and configure network components.

B. Assess the security posture of an organization.

C. Troubleshoot common security issues.

D. Interpret output from security technologies.

E. Deploy mobile devices securely.

F. Implement secure protocols.

III. Architecture and Design

A. Explain use cases, best practices, frameworks and secure configuration guides.

B. Implement secure network architecture concepts.

C. Implement secure systems design.

D. Explain the importance of secure staging deployment concepts.

E. Explain the security implications of embedded systems.

F. Summarize secure application development and deployment concepts.

G. Summarize cloud and virtualization concepts.

H. Explain how resiliency and automation strategies reduce risk.

I. Explain the importance of physical security controls.

IV. Identity and Access Management

A. Compare and contrast identity and access management concepts.

B. Install and configure identity and access services.

C. Implement identity and access management controls.

D. Differentiate common account management practices.

V. Risk Management

A. Explain the importance of policies, plans and procedures related to organizational security.

B. Summarize business impact analysis and concepts.

C. Explain risk management processes and concepts.

D. Follow incident response procedures.

E. Summarize basic concepts of forensics.

F. Explain disaster recovery and continuity of operation concepts.

G. Compare and contrast various types of controls.

H. Implement data security and privacy practices.

VI. Cryptography and PKI

A. Compare and contrast basic concepts of cryptography.

B. Explain cryptography algorithms and their basic characteristics.

C. Install and configure wireless security settings.

D. Understand public key infrastructure.

Method of Evaluation and Competencies:

20-30%    Quizzes
20-30%    Tests
40-50%    Lab Exercises

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 202

  • Title: IT Scripting*
  • Number: IT 202
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 231 .

Description:

The main objective of this course is to introduce students to writing scripts using Python. The course maps to the Python Institute PCAP (Python Certified Associate in Programming) certification exam with emphasis on networking programming. Topics covered in this course include lists, strings, dictionaries, functions, recursion, file processing, using modules, object-oriented programming and exception handling. 2 hrs. lecture, 2 hrs. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe and use Python literals, variables, strings and numerical operators.
  2. Explain and use decision, loops, lists and strings.
  3. Describe and write functions, tuples and dictionaries.
  4. Explain and use modules, packages, exception handling and string methods. 
  5. Explain and use object-oriented programming, methods, inheritance, exceptions and file processing

Content Outline and Competencies:

I. Python Literals, Operators and Variables 

A. Use Python literals int, float, string and Boolean. 

B. Use Python operators and variables.

II. Python Decision, Loops, Logic Operators and Lists 

A. Write scripts which use loops and decision. 

B. Write scripts which use logic operators. 

C. Write scripts which use lists. 

D. Use different list functions.

III. Functions, Scopes, Tuples and Dictionaries 

A. Explain and develop functions. 

B. Discuss the scopes of functions and variables. 

C. Discuss sequence types and mutability. 

D. Explain how to create and use dictionaries. 

E. Explain how to create and use tuples.

IV. Modules, Packages, Exception and String Methods 

A. Discuss how to use some of the most common Python modules. 

B. Explain how to make packages. 

C. Explain exception handling.  

D. Write scripts which use modules, and handle exception.

E. Explain strings and their methods, their similarities and differences compared to lists.

V. Object Oriented Programming, Methods, Inheritance, Exception, Generators and Processing Files 

A. Explain object-oriented programming implementation in Python including methods, classes, inheritance, abstraction, encapsulation and polymorphism. 

B. Discuss how to process data from files. 

C. Explain how to create your own exception. 

Method of Evaluation and Competencies:

25-55%     Labs and Projects
10-25%     Quizzes
10-25%     Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 204

  • Title: Enterprise Networking, Security and Automation*
  • Number: IT 204
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145 or IT 150.

Description:

Enterprise Networking, Security, and Automation is the 3rd of 3 courses in the Cisco Certified Network Associate (CCNA) curriculum. The course describes the architectures and considerations related to designing, securing, operating and troubleshooting enterprise networks. The course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access along with the introduction of software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Configure and troubleshoot Single-area Open Shortest Path First (OSPFv2) to operate in both point-to-point and multi access networks. 
  2. Explain how vulnerabilities, threats and exploits can be mitigated to enhance network  security. 
  3. Implement Internet Protocol (IPv4) Access Control Lists (ACLs) to filter traffic and secure administrative access. 
  4. Configure Network Address Translation (NAT) services on the edge router to provide IPv4 address scalability. 
  5. Explain how WAN access technologies can be used to satisfy business requirements. 
  6. Explain how Virtual Private Networks (VPNs) secure site-to-site and remote access connectivity. 
  7. Explain how networking devices implement QoS. 
  8. Implement protocols to manage the network.
  9. Explain the characteristics of scalable network architectures.
  10. Troubleshoot enterprise networks. 
  11. Explain the purpose and characteristics of network virtualization. 
  12. Explain how network automation is enabled through Representational State Transfer (RESTful) APIs and configuration management tools. 

Content Outline and Competencies:

I. Single-Area OSPFv2 Concepts and Configuration

A. Explain how single-area OSPFv2 operates. 

B. Configure single-area OSPFv2. 

C. Configure the OSPF interface priority to influence the Designated Router/Backup Designated Router (DR/BDR) election in a multi-access network. 

D. Verify a single-area OSPFv2 implementation.

II. Network Security Concepts 

A. Describe the current state of cybersecurity and vectors of data loss. 

B. Describe tools used by threat actors to exploit networks. 

C. Describe malware types and common network attacks. 

D. Explain how IP, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) vulnerabilities are exploited by threat actors. 

E. Describe best practices for protecting a network.

III. ACL Concepts and Configuration 

A. Explain how ACLs filter traffic. 

B. Configure standard and extended IPv4 ACLs to filter traffic to meet network requirements. 

C. Compare standard and extended IPv4 ACLs.

IV. NAT for IPv4 

A. Explain the purpose and function of NAT. 

B. Configure static and dynamic NAT using the Command Line Interface (CLI). 

C. Describe NAT for IPv6.

V. WAN Concepts 

A. Explain the purpose of a WAN. 

B. Explain how WAN operate. 

C. Compare traditional and modern WAN connectivity options. 

D. Compare internet-based connectivity options.

VI. VPN and IPsec Concepts 

A. Describe the benefits of VPN technology. 

B. Describe different types of VPNs. 

C. Explain how the IPsec framework is used to secure network traffic.

VII. QoS Concepts 

A. Describe minimum network requirements for voice, video and data traffic. 

B. Describe the queuing algorithms used by networking devices. 

C. Describe the different QoS models. 

D. Explain how QoS uses mechanisms to ensure transmission quality.

VIII. Network Management

A. Use CDP and LLDP to map a network topology. 

B. Implement Network Time Protocol (NTP) between an NTP client and NTP server. 

C. Explain Simple Network Management Protocol (SNMP) and Syslog operations. 

D. Use Commands to backup and restore an Internetwork Operation System (IOS) configuration file. 

E. Implement protocols to manage the network.

IX. Network Design 

A. Explain how data, voice and video are converged in a switched network. 

B. Explain considerations for designing a scalable network. 

C. Explain how switch hardware features support network requirements. 

D. Describe the types of routers available for small to medium-sized business networks.

X. Network Troubleshooting 

A. Explain how network documentation is developed and used to troubleshoot network issues. 

B. Compare troubleshooting methods that use a systematic, layered approach. 

C. Describe different networking troubleshooting tools. 

D. Troubleshoot a network using the layered model.

XI. Network Virtualization 

A. Explain the importance of virtualization and cloud computing. 

B. Describe the virtualization of network devices and services. 

C. Describe software-defined networking. 

D. Describe controllers used in network programming.

XII. Network Automation 

A. Compare Java Script Object Notation (JSON), YAML Ain't Markup Language (YAML) and Extensible Markup Language (XML) data formats. 

B. Explain how APIs enable computer to computer communications.

C. Compare the configuration management tools Puppet, Chef, Ansible and SaltStack.  

D. Explain how Cisco Digital Network Architecture (DNA) center enable intent-based networking. 

Method of Evaluation and Competencies:

25-55%    Labs and Projects
10-25%    Quizzes
10-25%    Skill Assessment
10-35%   Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 206

  • Title: Network Security Fundamentals*
  • Number: IT 206
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 145 or IT 150.

Description:

This course is designed to provide an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality and availability of data and devices. Topics covered include network threats, mitigation techniques, securing network devices, implementing firewall technologies, implementing intrusion prevention, securing local area networks (LANs), implementing virtual private networks (VPNs), and managing a secure network. Hands-on exercises will be used to reinforce the concepts. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain network threats, mitigation techniques and the basics of securing a network.
  2. Secure administrative access with Authentication, Authorization and Accounting (AAA).
  3. Implement firewall technologies to secure the network perimeter.
  4. Configure Intrusion Prevention System (IPS) to mitigate attacks on the network.
  5. Describe LAN security considerations and implement endpoint and layer 2 security features.
  6. Describe methods for implementing data confidentiality and integrity.
  7. Implement secure VPNs.
  8. Create and implement a comprehensive security policy based on enterprise security needs.

Content Outline and Competencies:

I. Network Threats and Mitigation Techniques

A. Explain network threats, mitigation techniques and the basics of securing a network.

B. Describe Trojan Horse attacks.

C. Identify computer viruses and worms.

D. Identify denial of service attacks.

II. Administrative Access to Network Devices

A. Explain physical security and its implementation.

B. Disable unused services to minimize the attack surface.

C. Implement enhanced login security methods.

D. Implement server-based AAA authentication using Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System (TACACS) protocols.

III. Firewall Technologies

A. Describe the operation of firewalls.

B. Configure packet filtering using access control lists.

C. Implement a router-based firewall to protect the perimeter of the network.

D. Implement a dedicated firewall appliance to protect the perimeter of the network.

IV. IPS

A. Explain how network-based IPS is used to help secure a network.

B. Explain how signatures are used to detect malicious network traffic.

C. Configure Cisco IPS operations.

V. LAN Security

A. Compare and contrast internal and external network threats.

B. Implement layer 2 security measures to mitigate internal threats.

C. Configure port security on a network switch.

D. Explain common technologies used to enhance endpoint security.

VI. Confidentiality and Integrity

A. Describe common public and symmetric key encryption algorithms.

B. Describe common hashing algorithms used in data integrity.

C. Explain the functions of digital certificates in e-commerce transactions.

D. Describe the framework of Public Key Infrastructure (PKI).

E. Explain steganography technology and its applications.

VII. VPNs

A. Describe encryption protocols used in VPN applications.

B. Compare site-to-site and remote access VPN technologies.

C. Implement site-to-site VPN using Internet Protocol Security (IPSec) architecture.

D. Implement remote access VPN using Secure Socket Layer (SSL) protocols.

VIII. Security Policies

A. Analyze internal and external security risks.

B. Define disaster recovery procedures.

C. Develop an action plan.

D. Write a formal security plan.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 207

  • Title: AWS Cloud Operations*
  • Number: IT 207
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 153.

Description:

This course teaches students the skills to successfully manage cloud operations of Amazon Web Services (AWS). Topics include creating automatable and repeatable deployments of networks and systems using AWS features and tools for configuration and deployment. 2 hrs. lecture/2 hrs. lab/1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain AWS systems operations.

  2. Describe AWS tooling and automation.

  3. Manage, secure and scale compute instances and configurations on AWS.

  4. Manage, troubleshoot and secure AWS networking.

  5. Configure and manage storage options using AWS storage services.

  6. Monitor and maintain secure infrastructure using AWS tools.

  7. Manage resource consumption in AWS using tags, Amazon CloudWatch and AWS Trusted Advisor.

  8. Create and configure automated and repeatable deployments with AWS tools.

Content Outline and Competencies:

I. Systems Operations

A. Describe system operations in the cloud related to automated and repeatable deployments.

B. Explain AWS regions and edge locations, and criteria for selecting them.

C. Describe core services related to system operations, including services for network, compute and access.

D. Explain how AWS Identity and Access Management (IAM) provides security over AWS account resources.

E. Describe AWS Command Line Interface (AWS CLI) features.

II. Tooling and Automation

A. Describe the purpose and function of AWS Systems Manager and its related features.

B. Explain AWS Tools for PowerShell.

C. Identify development tools used for tooling and automation.

D. Explain how Amazon Simple Storage Service (Amazon S3) can be used to host a static website.

III. Compute Instances and Configuration

A. Describe Amazon Elastic Compute Cloud (Amazon EC2) virtualization.

B. Differentiate between instance types, storage options and networking components with EC2 instances.

C. Explain Amazon EC2 user data and metadata.

D. Create Amazon EC2 instances.

E. Describe Elastic Load Balancing features.

F. Use EC2 Auto Scaling.

G. Configure failover routing.

H. Explain the purpose of AWS Lambda.

I. Describe the purpose and function of application programing interfaces (APIs), including RESTful APIs.

J. Explain containers and the AWS services that support container usage.

K. Differentiate the types of managed database services offered by Amazon Web Services (AWS) and identify their recommended use.

IV. Networking 

A. Explain the foundational role of an Amazon virtual private cloud (VPC) in AWS Cloud networking.

B. Identify the networking components inside of a VPC and their purpose.

C. Differentiate the options for VPC connectivity.

D. Describe the layered network defense model inside a VPC, such as network Access Control Lists (network ACLs), security groups, and bastion hosts.

E. List the steps to troubleshoot common VPC network issues.

F. Configure a VPC.

V. Storage Management

A. Differentiate the AWS data storage options and explain their purpose and benefits.

B. Create and manage Amazon EBS snapshots.

C. Store, retrieve, and archive Amazon S3 objects.

D. Identify AWS data migration services.

VI. Monitoring and Security

A. Describe Amazon CloudWatch monitoring features, including metrics and alarm details.

B. Describe Amazon CloudWatch log features and benefits.

C. Explain the purpose and function of AWS CloudTrail.

D. Describe AWS Config features and benefits.

E. Use Amazon CloudWatch to monitor applications and infrastructure.

VII. Managing Resource Consumption

A. Explain the purpose and function of tagging in AWS.

B. Describe the cost management strategies associated with tagging.

C. Enforce tagging using Identity and Access Management (IAM) policies.

D. Identify some of the cost benefits of the cloud.

E. Explain the purpose and function of the AWS Trusted Advisor service.

F. Manage resources with tagging.

VIII. Automated and Repeatable Deployments

A. Identify some of the AWS services for configuration management.

B. Describe the challenges associated with cloud deployments and potential solutions for remedy.

C. Discuss infrastructure as code and the value it creates.

D. Explain the purpose of AWS CloudFormation.

E. Describe types of errors with AWS CloudFormation and their remedies.

F. Implement best practices using AWS CloudFormation.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total:       100%
 

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 223

  • Title: Azure Administration*
  • Number: IT 223
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 155 or IT 221.

Description:

This course teaches students the fundamentals of Azure Administration. Students will implement, manage and monitor a Microsoft Azure environment, including virtual networks, storage, compute, identity, security and governance. Students will also implement security controls that protect identity, access, data, applications and networks in cloud and hybrid environments as part of an end-to-end infrastructure. 2 hrs. lecture, 2 hrs. lab, and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Manage Azure identities and governance.
  2. Implement and manage storage.
  3. Deploy and manage Azure compute resources.
  4. Configure and manage virtual networking.
  5. Monitor and backup Azure resources.
  6. Manage identity and access.
  7. Implement platform protection.
  8. Manage security operations.
  9. Secure data and applications.

Content Outline and Competencies:

I. Identities and Governance

A. Manage Azure Active Directory (Azure AD) objects.

B. Implement access control.

C. Manage subscriptions and governance.

II. Storage

A. Configure access to storage.

B. Manage data in Azure storage accounts.

C. Configure Azure files and Azure Blob Storage.

III. Compute Resources

A. Automate deployment of resources by using templates.

B. Create and configure virtual machines (VMs).

C. Manage containers.

D. Configure an Azure App Service.

IV. Virtual Networking

A. Implement, manage, secure and monitor virtual networks.

B. Configure load balancing.

V. Backup Resources

A. Monitor resources using Azure Monitor.

B. Implement backup and recovery.

VI. Identity and Access

A. Manage Azure AD identities.

B. Configure secure access using Azure AD.

C. Manage application access.

D. Implement access control.

VII. Platform Protection

A. Implement advanced network security.

B. Configure advanced security for compute.

VIII. Security Operations

A. Configure centralized policy management.

B. Manage threat protection.

C. Monitor security solutions.

IX. Data and Applications Security

A. Configure security for storage.

B. Manage security for data.

C. Implement Azure Key Vault

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 224

  • Title: Microsoft 365 Administration*
  • Number: IT 224
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 155 or IT 221.

Description:

This course teaches students the fundamentals of deploying, configuring, protecting, managing, and monitoring devices and client applications in a Microsoft 365 environment. Students will manage identity, security, access, policies, updates, and apps for endpoints. They will implement solutions for efficient deployment and management of endpoints on various operating systems, platforms, and device types. They will also perform Microsoft 365 tenant-level implementation and administration of cloud and hybrid environments. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Deploy Windows client.

  2. Manage identity and compliance.

  3. Manage, maintain, and protect devices.

  4. Manage applications.

  5. Deploy and manage a Microsoft 365 tenant.

  6. Implement and manage identity and access in Azure AD.

  7. Manage security and threats by using Microsoft 365 Defender.

  8. Manage compliance by using Microsoft Purview.

Content Outline and Competencies:

I. Windows Client

A. Prepare for a Windows client deployment.

B. Plan and implement a Windows client deployment by using Windows Autopilot.

C. Manage a Windows client deployment by using the Microsoft Deployment Toolkit (MDT).

D. Configure remote management.

II. Identity and Compliance

A. Manage identity.

B. Implement compliance policies for all supported device platforms by using Intune.

III. Devices

A. Manage the device lifecycle in Intune.

B. Manage device configuration.

C. Monitor devices.

D. Configure device updates.

E. Implement endpoint protection.

IV. Applications

A. Deploy and update apps.

B. Plan and implement app protection and app configuration policies.

V. Microsoft 365 Tenant

A. Implement and manage a Microsoft 365 tenant.

B. Manage users and groups.

C. Manage roles in Microsoft 365.

VI. Azure AD Identity and Access

A. Implement and manage identity synchronization with Azure AD.

B. Manage authentication.

C. Configure secure access.

VII. Security and Threats

A. Manage security reports and alerts by using the Microsoft 365 Defender portal.

B. Manage email and collaboration protection by using Microsoft Defender for Office 365.

C. Implement endpoint protection by using Microsoft Defender for Endpoint.

VIII. Compliance

A. Implement Microsoft Purview information protection and data lifecycle management.

B. Configure Microsoft Purview data loss prevention (DLP).

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Exams

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 230

  • Title: Linux Fundamentals
  • Number: IT 230
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Description:

This course is designed to provide students with a fundamental understanding of the Linux operating system environment. Students successfully completing this course will be able to perform Linux installation and package management; execute common Linux commands and utilities; and accomplish different system tasks such as navigating the filesystem and utilizing the resources of a basic Linux system.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Interact with shells and commands using the command line.

  2. Perform basic file management and locate system files.

  3. Perform basic text file tasks and manage processes.

  4. Perform advanced file management tasks.

  5. Describe and configure the Linux boot process and install a boot manager.

  6. Design hard disk layout and create partitions and filesystems.

  7. Manage disk quotas and maintain the integrity of filesystems.

  8. Describe and use package management.

Content Outline and Competencies:

I. Shell Configuration

A. Work on the command line.

B. Process text streams using filters.

C. Use streams, pipes and redirects.

II. Basic File Management

A. Perform basic file management.

B. Locate system files and place files in the correct location.

III. Text Processing

A. Search Text Files using regular expressions.

B. Perform basic file editing operations using the vi editor.

C. Create, monitor and kill processes.

D. Modify process execution priorities.

IV.  Advanced File Management

A. Manage file permission and ownership.

B. Create and change hard and symbolic links.

C. Create and manage archives.

V. Boot Process

A. Determine and configure hardware settings.

B. Change runlevels and shutdown or reboot system.

C. Boot the system and install a boot manager.

VI. Partitions

A. Design hard disk layout.

B. Create partitions and filesystems.

C. Control mounting and unmounting of filesystems.

VII. Filesystems Administration

A. Maintain the integrity of filesystems.

B. Manage disk quotas.

VIII. System Software

A. Use Red Hat package management.

B. Use Debian package management.

C. Manage shared libraries.

Method of Evaluation and Competencies:

40-60%    Quizzes/Projects/Assignments
40-60%    Tests

Total: 100%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 231

  • Title: Linux Administration*
  • Number: IT 231
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 230.

Description:

This course is designed to provide students with the necessary knowledge and skills to perform competently as a Linux system administrator. Students successfully completing this course should be able to perform basic system administration tasks including configuring the graphical user interface, managing user accounts, managing system logging, configuring basic networking, writing shell scripts and maintaining system security.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Customize the shell environment and write shell scripts.
  2. Configure X Windows and set up a display manager.
  3. Manage user accounts and automate system administration tasks.
  4. Maintain system time and system logging.
  5. Configure basic networking.
  6. Describe and configure system security features.

Content Outline and Competencies:

I. Advanced Shell Features

A. Customize and use the shell environment.

B. Customize or write simple scripts.

C. Configure and use Structured Query Language (SQL) data management.

II. Display Administration

A. Install and configure X11.

B. Set up a display manager.

C. Configure accessibility, localization and internationalization.

III. System Administration

A. Manage user and group accounts and related system files.

B. Automate system administration tasks by scheduling jobs.

IV. Essential System Services

A. Configure and maintain network time synchronization.

B. Configure and manage system logging.

C. Configure basic mail transfer agent.

D. Configure and manage printers and printing.

V. Network Fundamentals

A. Describe the fundamentals of Internet Protocols.

B. Configure the network interface.

C. Utilize troubleshooting commands and utilities.

D. Configure client-side Domain Name System (DNS).

VI. System Security Features

A. Perform security administration tasks.

B. Describe and utilize methods of host security.

C. Describe and perform data encryption.

Method of Evaluation and Competencies:

40-60%    Quizzes/Projects/Assignments
40-60%    Tests

Total: 100% 

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 238

  • Title: Digital Forensics*
  • Number: IT 238
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: (IT 120 or IT 205) and IT 230.

Description:

This course will cover the fundamentals of computer and cyber forensics. Students will learn different aspects of digital evidence and methods to uncover illegal activities left on storage media. Various forensics tools, techniques and procedures will be used in a lab environment to perform forensic investigations. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the fundamentals of digital forensics.
  2. Explore Windows and Linux file systems.
  3. Utilize various forensic acquisition tools.
  4. Describe procedures to safeguard digital forensics artifacts.
  5. Perform web browser forensics.
  6. Perform email forensics.
  7. Create understandable and accurate digital forensics reports.
  8. Implement anti-forensics methods.

Content Outline and Competencies:

 I. Digital Forensics Fundamentals

A. Plan the investigation case.

B. Prepare the computer forensics workstation and software.

C. Acquire, validate, extract and analyze digital evidence.

D. Complete the investigation case.

II. File Systems

A. Describe the filing system and disk structures for Windows.

B. Explain the structure of the Windows registry.

C. Describe the filing system and disk structures for Linux.

D. Explain the boot process for Linux.

III. Forensics Tools

A. Identify the need for computer forensics tools.

B. Evaluate the requirements for common forensics tools.

C. Validate and test common forensics tools.

 

IV. Forensics Artifacts

A. Summarize the Chain of Custody process.

B. Describe procedures used to protect digital evidence.

C. Verify compliance with common laws regarding search and seizure of digital evidence.

V. Web Browser Forensics

A. Extract evidence from common web browser activities.

B. Reconstruct browsing index.dat files.

C. Compare the security configurations of common web browsers.

VI. Email Forensics

A. Explore the roles of the client and server in email.

B. Investigate email crimes and violations.

C. Implement specialized email forensics tools.

D. Contrast the operation of common email systems.

VII. Forensics Reports

A. Explain digital forensics reporting guidelines.

B. Review examples of local forensics reports.

C. Create a digital forensics report.

VIII. Anti-Forensics Methods

A. Implement steganography to obscure evidence.

B. Describe methods used to overwrite data and metadata.

C. Implement techniques to recover damaged digital evidence.

Method of Evaluation and Competencies:

60-80%    Quizzes/Projects/Assignments
20-40%    Tests

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 239

  • Title: Ethical Hacking*
  • Number: IT 239
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: (IT 145 or IT 150) and IT 230.

Description:

This course introduces students to common computer vulnerabilities as well as exploits and techniques used by hackers. Students will develop countermeasures to mitigate attacks and strengthen system security. Topics covered include vulnerability scanning, social engineering, denial of service attacks, intrusion detection, buffer overflow and penetration testing. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Perform reconnaissance and footprinting procedures to collect information about potential targets.
  2. Describe common social engineering attacks and policies to mitigate them. 
  3. Demonstrate password-cracking techniques and develop measures to strengthen passwords.
  4. Deploy Metasploit framework to perform penetration testing on various systems.
  5. Attack web applications using cross-site scripting (XSS), command injection and client-side exploitations.
  6. Perform network analysis using common sniffing tools.
  7. Install backdoors to compromise access privileges and system integrity.
  8. Describe common attacks against cryptographic security measures. 

Content Outline and Competencies:

I. Reconnaissance and Footprinting

A. Use Network Mapper (Nmap) to outline the attack surface of potential targets.

B. Use Wireshark and Transport Control Protocol Dump (tcpdump) to identify system vulnerabilities.

C. Perform network enumeration to discover remote hosts, open ports and fingerprints of installed operating systems and applications.

II. Social Engineering

A. List common social engineering techniques.

B. Identify policies to train users to recognize social engineering attacks.

C. Describe impersonation methods used to compromise social networking accounts.

D. Identify countermeasures to protect against identity theft.

III. Passwords Attacks

A. Describe password-cracking techniques including dictionary, brute force and rainbow tables.

B. Extract password hashes from computer filing systems.

C. Perform password cracking using John the Ripper and Hashcat.

D. Develop strong password policies to mitigate unauthorized access.

IV. Penetration Testing

A. Describe Metasploit and Meterpreter frameworks.

B. Configure and launch system hacks using Metasploit.

C. Analyze antivirus evasion techniques to bypass installed security measures.

D. Implement pivoting strategies to expand attacks from the target environment.

V. Web Attacks

A. Probe web applications for potential vulnerabilities.

B. Perform web penetration testing with Nikto and Zed Attack Proxy (ZAP).

C. Hack web applications using XSS, Cross-Site Request Forgery (XSRF) and command injection.

VI. Network Analysis

A. Compare common network sniffing tools.

B. Configure Wireshark filters to capture specific network traffic.

C. Analyze captured packets in Transmission Control Protocol (TCP) stream to locate sensitive data.

D. Install measures to avoid intrusion detection systems and firewalls.

VII. Backdoors

A. Install a Virtual Network Computing (VNC) backdoor to compromise remote access.

B. Configure NetCat as a backdoor on remote systems.

C. Scan hosts on the network for potential backdoors.

VIII. Cryptography

A. Contrast symmetric and asymmetric encryption algorithms.

B. Create and install Secure Socket Layer (SSL) certificates.

C. Describe the framework of Public Key Infrastructure (PKI).

D. Use cryptanalysis tools to launch cryptographic attacks.

 

Method of Evaluation and Competencies:

25-55%    Hands-on labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 257

  • Title: Cybersecurity Operations*
  • Number: IT 257
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 5
  • Lecture Hours: 2
  • Lab Hours: 2
  • Other Hours: 1

Requirements:

Prerequisites: IT 175 and (IT 150 or IT 145) and IT 230.

Description:

Cybersecurity Operations is designed to map to the Cisco Certified CyberOps Associate certification. The course covers knowledge and skills needed to successfully handle the tasks, duties and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Topics covered include investigating endpoint vulnerabilities and attacks, evaluating network security alerts and applying incident response models to manage network security incidents. 2 hrs. lecture, 2 hrs. lab and 1 hr. open lab/wk.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  2. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  3. Explain the features and characteristics of the Linux Operating System.
  4. Analyze the operation of network protocols and services.
  5. Explain the operation of the network infrastructure.
  6. Classify the various types of network attacks.
  7. Use network monitoring tools to identify attacks against network protocols and services.
  8. Use various methods to prevent malicious access to computer networks, hosts and data.
  9. Explain the impacts of cryptography on network security monitoring.
  10. Explain how to investigate endpoint vulnerabilities and attacks.
  11. Evaluate network security alerts.
  12. Analyze network intrusion data to identify compromised hosts and vulnerabilities.
  13. Apply incident response models to manage network security incidents.

Content Outline and Competencies:

I. Cybersecurity and the Security Operations Center

A. Explain why networks and data are attacked.

B. Explain how to prepare for a career in Cybersecurity operations.

II. Windows Operating System

A. Explain the operation of the Windows Operating System.

B. Explain how to secure Windows endpoints.

III. Linux Operating System

A. Perform basic operations in the Linux shell.

B. Perform basic Linux administration tasks.

C. Perform basic security-related tasks on a Linux host.

IV. Network Protocols and Services

A. Explain how protocols enable network operations.

B. Explain how the Ethernet and IP protocols support network communication.

C. Use common testing utilities to verify and test network connectivity.

D. Explain how the address resolution protocol enables communication on a network.

E. Explain how transport layer protocols and network services support network functionality.

F. Explain how network services enable network functionality.

V. Network Infrastructure

A. Explain how network devices enable wired and wireless network communication.

B. Explain how devices and services are used to enhance network security.

C. Explain how networks and network topologies are represented.

VI. Principles of Network Security

A. Explain how networks are attacked.

B. Explain the various types of threats and attacks.

VII. Network Attacks: A Deeper Look

A. Explain network traffic monitoring.

B. Explain how Transport Control Protocol/Internet Protocol (TCP/IP) vulnerabilities enable network attacks.

C. Explain how common network applications and services are vulnerable to attack.

VIII. Protecting the Network

A. Explain approaches to network security defense.

B. Explain access control as a method of protecting a network.

C. Explain how firewalls and other devices prevent network intrusions.

D. Explain how content filtering prevents unwanted data from entering the network.

E. Use various intelligence sources to locate current security threats.

IX. Cryptography and the Public Key Infrastructure

A. Use tools to encrypt and decrypt data.

B. Explain how the public key infrastructure (PKI) supports network security.

X. Endpoint Security and Analysis

A. Use a tool to generate a malware analysis report.

B. Classify endpoint vulnerability assessment information.

XI. Security Monitoring

A. Explain how security technologies affect security monitoring.

B. Explain the types of log files used in security monitoring.

XII. Intrusion Data Analysis

A. Explain how security-related data is collected.

B. Arrange a variety of log files in preparation for intrusion data analysis.

C. Analyze intrusion data to determine the source of an attack.

XIII. Incident Response and Handling

A. Apply incident response models to an intrusion event.

B. Apply standards specified in National Institute of Standards and Technology (NIST) 800-61r2 to a computer security incident.

C. Given a set of logs, isolate a threat actor and recommend an incident response plan.

Method of Evaluation and Competencies:

25-55%    Hands-on Labs
10-25%    Quizzes
10-25%    Skill Assessment
10-35%    Final

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 271

  • Title: Information Technology Internship I*
  • Number: IT 271
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: (IT 120 or IT 140 or IT 141 or IT 205 or IT 230) and Department approval.

Description:

This course affords the student the opportunity to apply classroom knowledge to a real-world environment. Students will gain advanced information technology experience working with local employers, under instructional oversight, which will promote the student's career goals. Student will work a total of 300 hours/semester at an approved job site.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable level of preparedness, personally and professionally, for a career. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job

A. Describe job-related activities accomplished while at the workplace.

B. Keep a log-book of weekly activities or tasks performed while at the workplace.

C. Furnish activity log compiled for each week of work to the instructor at the end of the course.

II. Company, Products and Services

A. Describe the company where the internship duties are performed, including the company’s mission or goals.

B. Provide a general outline of the organizational structure of the company and where the student fits into that structure.

C. Identify and describe the products and services produced by the company.

D. Provide a detailed description of products and services the student was directly involved with during the internship.

III. Classroom Experience to Work Assignments

A. Install and/or maintain equipment for a local area network (LAN).

B. Install and/or support software for a local area network.

C. Administer user accounts and access rights for a local area network.

D. Install and/or support a local web server and website.

E. Provide PC and network support for end-users.

IV. Workplace Skills

A. Follow written and oral instructions.

B. Demonstrate effective oral communication.

C. Create and present technical information in written format.

D. Compile and maintain records, logs or other documents.

E. Demonstrate interpersonal skills appropriate to a business environment.

F. Solve problems in a logical and reasonable manner.

G. Participate in team or group project.

H. Manage time and resources effectively.

I. Follow employee rules, regulations and policies.

J. Demonstrate effective work ethics appropriate to a business environment.

Method of Evaluation and Competencies:

20-30%    Instructor's evaluations
20-30%    Weekly work log
40-60%    Evaluation of the student by the work supervisor

Total: 100%

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 272

  • Title: Information Technology Internship II*
  • Number: IT 272
  • Effective Term: 2024-25
  • Credit Hours: 3
  • Contact Hours: 15
  • Lecture Hours:
  • Other Hours: 15

Requirements:

Prerequisites: IT 271 and department approval.

Description:

This course is a continuation of IT 271, Internship I. It provides the student additional opportunity to apply classroom knowledge to an actual work environment. Students will work a total of 300 hours per semester at an approved job site.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Describe the work activities accomplished on-the-job.
  2. Provide an accurate description of the company, its products and services.
  3. Apply classroom experience in the execution of work assignments.
  4. Demonstrate an acceptable preparedness, personally and professionally, for a career position. 

Content Outline and Competencies:

I. Work Activities Accomplished On-the-Job
   A. Describe job related activities accomplished while at the workplace.
   B. Keep a log book of weekly activities or tasks performed while at the workplace.
   C. Furnish activity log compiled for each week of work to the instructor at the end of the course.

II. Description of Company, Products and Services
   A. Describe the company or business for which the internship duties were performed. This shall include company’s mission and goals.
   B. Provide a general outline of the organizational structure of the
company and where the student fits into that structure.
   C. Identify and describe the products and services the company produces.
   D. Provide a detailed description of products and services the student was directly involved with during the internship.

III. Apply Classroom Experience to Work Assignments
   A. Install and/or maintain equipment for a local area network (LAN).
   B. Install and/or support software for a local area network.
   C. Administer user accounts and access rights for a local area network.
   D. Install and/or support a local web server and website.
   E. Provide PC and network support for end-users.

IV. Demonstrate Workplace Skills
   A. Follow written and oral instructions.
   B. Demonstrate effective oral communication.
   C. Create and present technical information in written format.
   D. Compile and maintain records, logs or other documents.
   E. Demonstrate interpersonal skills appropriate to a business environment.
   F. Solve problems in a logical and reasonable manner.
   G. Participate in team or group project.
   H. Manage time and resources effectively.
   I. Follow employee rules, regulations and policies.
   J. Demonstrate effective work ethics appropriate to a business environment.

Method of Evaluation and Competencies:

Instructor's on-site visits and evaluations 20%
Weekly work log 20%
Evaluation of the student by the work supervisor 60%

Grade Criteria:

90 – 100% = A
80 – 89% = B
70 – 79% = C
60 – 69% = D
0 – 59% = F

Caveats:

Transportation to work site is the responsibility of the student. 

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).

IT 292

  • Title: Special Topics:*
  • Number: IT 292
  • Effective Term: 2024-25
  • Credit Hours: 1 - 3
  • Contact Hours: 2 - 6
  • Lecture Hours: 1 - 3
  • Lab Hours: 1 - 3

Requirements:

Prerequisites: Department approval.

Description:

This course periodically presents specialized topics in computer networking that are not available in the regularly offered curriculum. Special Topics may be repeated for credit, but only on different topics. This is a repeatable course and may be taken more than once for credit.

Supplies:

Refer to the instructor's course syllabus for details about any supplies that may be required.

Objectives

  1. Appropriately use terminology related to the special topic. 

  2. Solve problems by using content related to the special topic.

  3. Demonstrate conceptual understanding of the special topic.

  4. Use software and hardware related to the special topic.

Content Outline and Competencies:

Because of the nature of a Special Topics course, the course Content Outline and Competencies will vary, depending on the Special Topic being offered. The Special Topics course outlines must be designed in the standard format for all JCCC-approved courses and must include the standard course objectives for a Special Topics class. The course Content Outline and Competencies must be written in outcome-based language. In order to maintain course consistency, rigor, and uniqueness, each section of this course first must be reviewed and approved by the Information Technology faculty and division curriculum committee prior to its being offered. Any specific Special Topics topic may not be repeated within a standard four-semester sequence.

Method of Evaluation and Competencies:

Evaluation will be based on typical assignments such as readings, discussion, written assignments (such as critical reviews or research papers), web-based research, individual or group projects, etc., dependent upon the needs of the topic and the instructor.
 

Grade Criteria:

90 - 100% = A
80 - 89% = B
70 - 79% = C
60 - 69% = D
0 - 59% = F

Caveats:

Student Responsibilities:

Disabilities:

JCCC provides a range of services to allow persons with disabilities to participate in educational programs and activities. If you are a student with a disability and if you are in need of accommodations or services, it is your responsibility to contact Access Services and make a formal request. To schedule an appointment with an Access Advisor or for additional information, you may send an email or call Access Services at (913)469-3521. Access Services is located on the 2nd floor of the Student Center (SC 202).