Course Number and Title: ELC 206 Computer Networks and Systems II
This course is a continuation of data communications and computer network principles and applications in which students configure, troubleshoot, and secure networks and related peripherals.
USB flash-drive for lab work and Internet access
- Explain the characteristics of network support and management. (CCC 2, 3, 4, 5; PGC 1, 2)
- Explain the concepts of basic network security. (CCC 2, 3, 4, 5; PGC 1, 2)
- Implement and administer network security. (CCC 2, 3, 4, 5; PGC 1, 2)
- Explain networking operating systems and server based networking. (CCC 2, 3, 4, 5; PGC 1, 2)
- Describe the basic concepts of networking with Unix/Linux operating systems. (CCC 2, 3, 4, 5; PGC 1, 2)
- Secure networks using cryptograph techniques. (CCC 2, 3, 4, 5; PGC 1, 2)
- Employ environmental controls to prevent network disruptions. (CCC 2, 3, 4, 5; PGC 1, 2)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Explain the characteristics of network support and management.
- Explain network and project management.
- Describe the use of hardware and software troubleshooting tools.
- Explain the troubleshooting process, backups, and baselines.
- Explain performance and fault management.
- Perform network monitoring to identify performance and connectivity issues.
- Explain the concepts of basic network security.
- Give examples of network security concerns.
- Identify the characteristics of a firewall, proxy server, and antivirus software.
- Resolve security problems using firewalls, routers, switches, hubs, and modems.
- Prepare an effective security policy.
- Examine the issues involved in network operating system security.
- Differentiate between wired and wireless network security.
- Implement and administer network security.
- Explain different data formats used to present and secure data.
- Use security configuration and analysis tools to analyze and configure local system security.
- Design and build secure networks using simulation software.
- Use a network analyzer to troubleshoot and analyze data on a network.
- Explain networking operating systems and server based networking.
- Describe the Windows Server memory model.
- Describe the Windows Server file systems.
- Explain the Microsoft memory console (MMC).
- Explain the active directory.
- Install and configure server software.
- Create group and user accounts.
- Harden the network against common attacks like back door, spoofing, replay, man-in-the-middle, transmission control protocol/Internet protocol (TCP/IP), hijacking, and password guessing attacks.
- Protect the network from viruses, Trojan horses, logic bombs, and worms.
- Describe the basic concepts of networking with Unix/Linux operating systems.
- Explain Unix/Linux multiprocessing.
- Explain the Unix/Linux kernel.
- Explain the Unix/Linux memory model.
- Explain the Unix/Linux file and directory structure.
- Use basic Unix/Linux commands using command line interface.
- Explain file permissions.
- Write simple shell scripts.
- Configure Linux.
- Explain Linux administration.
- Setup groups and users.
- Secure networks using cryptograph techniques.
- Describe hash, symmetric, and asymmetric cryptographic algorithms.
- Explain the various ways in which cryptography is used.
- Define digital certificates.
- Explain the various types of digital certificates and how they are used.
- Describe the components of public key infrastructure (PKI).
- Describe the tasks associated with key management.
- Describe the different transport encryption algorithms.
- Employ environmental controls to prevent network disruptions.
- Describe the components of redundancy planning.
- Describe disaster recovery procedures.
- Describe incident response procedures.
- Explain how to control risk.
- Explain types of security policies.
- Describe how awareness and training can provide increased security.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Perform the duties of an entry-level technician using the skills, modern tools, theory, and techniques of the electronics engineering technology.
- Design or improve electrical/electronics systems using critical thinking, theoretical knowledge, and practical understanding.
- Conduct, analyze, and interpret experiments using analysis tools and troubleshooting methods.
- Demonstrate basic management, organizational, and leadership skills.
- Explain the importance of engaging in self-directed continuing professional development.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.