WORKPLACE COMPETENCIES -- Effective workers can productively use:

Size: px
Start display at page:

Download "WORKPLACE COMPETENCIES -- Effective workers can productively use:"

Transcription

1 ITSY 2401 irewalls and Network Security DEL MAR OLLEGE IS DEPARTMENT I. ITSY 2401 irewalls and Network Security (3-3-4) Identify elements of firewall design, types of security threats and responses to security attacks. Use best practices to design, implement and monitor a network security plan. Learn security incident postmortem analysis and on going network security activities. Suggested prerequisite: ITNW 1325, ITNW 2301 and ITSY 2400 ourse IDEA Objectives: Essential: Gaining factual knowledge (terminology, classifications, methods, trends) Important: Learning to apply course material (to improve thinking, problem solving, and decision. Essential: Developing specific skills, competencies, and points of view needed by professionals in the field most closely related to this course. SANS (Secretary s ommission on Achieving Necessary Skills) competencies are integrated into this course curriculum to improve education by helping to better define and assess the proficiency skills needed for employment. Each course competency will implement several SANS to help you develop and reinforce employable skills. ompetencies are criterion referenced (ie. They are measured against predetermined levels of proficiency in skills for effective job performance). The know-how identified by SANS is made up of five competencies and a three-part foundation of skills and personal qualities that are needed for solid job performance. These are: WORKPLAE OMPETENIES -- Effective workers can productively use: Resources -- They know how to (1) allocate time, (2) money, ( 3) materials, and (4) staff Information --They can (5) acquire and evaluate data, (6) organize, and maintain files, (7) interpret and communicate, and (8) use computers to process information. Interpersonal Skills -- They can work on (9) teams, (10) teach others, (11) serve customers, (12) lead, (13) negotiate, and (14) work well with people from culturally diverse backgrounds. Systems -- They (15) understand social, organizational, and technological systems; (16) they can monitor and correct performance; and (17) they can design or improve systems. Technology -- They can (18) select equipment and tools, (19) apply technology to specific tasks, and (20) maintain and troubleshoot equipment. OUNDATION SKILLS -- ompetent workers in the high-performance workplace need: Basic Skills-- (1) reading, (2) writing, (3) arithmetic and (4) mathematics, (5) listening and (6) speaking. Thinking Skills-- (7) to think creatively, (8) to make decisions, (9) to solve problems, (10) to visualize, (11) the ability to learn, and (12) to reason. Personal Qualities --(13) individual responsibility, (14) self-esteem, (15) sociability, (16) self-management, and (17) integrity.

2 II. END-O-OURSE OUTOMES (and Texas Skill Standards): Texas Skill Standards Provide data/information assurance Ensure Infrastructure and Network Security Develop manage and enforce it Perform security education Develop and implement physical security, d t d Perform system analysis and design Skill Standard A1 Gather and document data/information assurance requirements A2 Develop data/information assurance plans and implementation strategies A3 Review and test plans and strategies for compliance with applicable regulations and standards A4 Implement data/information assurance plans and strategies A5 Monitor performance to ensure integrity and confidentiality A6 Maintain and update data/information assurance plans and strategies as appropriate B1 Gather data and analyze security requirements B2 Identify, analyze, and evaluate infrastructure and network vulnerabilities B3 Develop critical situation contingency plans and disaster recovery plan B4 Implement/test contingency and backup plans and coordinate with stakeholders B5 Monitor, report and resolve security problems 1 Perform research and analyze requirements 2 Develop, assess and document security policies, practices and procedures 3 Disseminate policies and implementation practices and procedures 4 Implement, enforces and monitor security polices, practices and procedures D1 Identify and assess education and training requirements for all constituents D2 Identify resource and support materials D3 Design and develop education and training plans and strategies D4 Deliver education and training D5 Assess results and determine follow up requirements E1 Identify and assess current and anticipated security risks and vulnerabilities E2 Research and evaluate alternative current and emerging practices, tools and technologies E3 Select and apply relevant tools to meet security goals and requirements E4 Monitor, evaluate and test security conditions and environment E5 Implement, extend, and refine physical security plans and practices 1 Define current systems-level requirements and forecast future needs and trends 2 Evaluate current and emerging tools and technologies 3 Evaluate organization s security strategies 4 Make recommendations regarding organization s investment in security 5 oordinate systems testing and integration 6 Audit and maintain systems performance and ensure future readiness ITSY OURSE 2401 A. The student will explain the basic functions of a firewall, list two types of firewalls comparing and contrasting their differences, and state the reasons why a firewall should be deployed. B. The student will analyze a hypothetical network security plan, select and document the firewall functions necessary to protect the network.

3 . Describe various possible firewall topologies that might be deployed, compare and contrast the various possibilities, select one of the topologies, and support that choice in writing. D. The student will document system security skills through firewall implementation and testing; use system tools, practices, and relevant technologies to implement a firewallbased security plan. E. The student will document and present an appropriate firewall policy for a given topology.. The student will evaluate and present a report on the various practices, tools, and technologies that are used to identify security breaches, sources of attacks, and protect mission critical systems through the use of firewalls. G. The student will research, document, and present the required hardware and software components required in order to implement a firewall-based solution for a given set of security requirements. H. The student will research, document, and present a report on the use of relevant tools to secure a network, respond to and follow up on various types of attacks. I. The student will design, document, and implement appropriate packet filtering rules. J. The student will design and document a logging policy, select logging options for the packet filtering rules, and configure the alert mechanism. K. The student will create a test plan for the firewall implementation. L. The student will research, develop, and implement a firewall rules to establish an appropriate level of security based on an analysis of security logs.) M. Based on a specifications from a given security plan, the student will develop and follow his or her documented procedure for installing and configuring the firewall operating system using the recognized best practices and industry security standards, then test the firewall to create an audit report that shows compliance with the security plan. To facilitate mastery of the above-listed competencies, the instructor will be responsible for: 1) gaining student's attention 2) informing student of objectives 3) stimulating recall of prior knowledge 4) presenting new material 5) providing guided practice 6) eliciting performance 7) providing feedback 8) assessing performance 9) enhancing retention and transfer of knowledge.

4 Evaluation: To demonstrate mastery of the competencies listed above, the student will be responsible for: 1) ompleting class assignments using instructional material and lecture notes. 2) Maintaining complete written documentation of the lab activities. 3) Implementing a firewall plan 4) Submitting documents for an implementation plan 5) Attending class and participating in the discussion PROIIENY LEVELS OR SANS OMPETENIES: 1) Rarely performs task 2) task with moderate supervision 3) task with minimal supervision 4) task 5) task over and beyond designated task OMPETENY-BASED OUTOMES WITH WORKPLAE PROIIENY LEVELS Resources Information Interpersonal Skills Systems Technology A B D E G H I J K L M

5 OMPETENY-BASED OUTOMES WITH OUNDATION SKILLS LEVELS Basic Skills Thinking Skills Personal Qualities A B D E G H I J K L M rarely performs task task w/moderate supervision Routinely performs task w/minimal supervision task task over/ beyond designated task

Healthcare Software Analyst Program Application Packet

Healthcare Software Analyst Program Application Packet Healthcare Software Analyst Program 12800 Abrams Road Dallas, Texas 75243-2199 972.238.6950 www.richlandcollege.edu/hp Health Professions Division Healthcare Software Analyst Program Application Packet

More information

Computer and Information Science

Computer and Information Science Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer

More information

SOUTH TEXAS COLLEGE Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies Fall 2011

SOUTH TEXAS COLLEGE Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies Fall 2011 SOUTH TEXAS COLLEGE Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies Fall 2011 Chair s Information: 1. Name of Chair: Saeed Molki 2. Office Location: Information Technology

More information

Application Packet. Insurance Billing & Coding Program. Insurance Coding and Billing Insurance Billing and Coding Program

Application Packet. Insurance Billing & Coding Program. Insurance Coding and Billing Insurance Billing and Coding Program Insurance Billing & Coding Program 12800 Abrams Road Dallas, Texas 75243-2199 972.238.6920 or 972.238-6248 www.richlandcollege.edu/hp School of Math/Science/Health Professions SH205 Insurance Coding and

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

University of Central Florida Class Specification Administrative and Professional. Information Security Officer Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

Occupational Therapy Assistant Program

Occupational Therapy Assistant Program COURSE SYLLABUS Primary Instructor: Turquessa Francis, OTR, Ed.D Instructor Information: Name: Turquessa Francis, OTR, Ed.D Office Location: Coleman, HSC, Room 382 Contact: Office 713-718-7392 Email: turquessa.francis@hccs.edu

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

PAGE 3 VERNON COLLEGE SYLLABUS COURSE NUMBER AND TITLE: HITT 2340 Advanced Medical Billing and Reimbursement

PAGE 3 VERNON COLLEGE SYLLABUS COURSE NUMBER AND TITLE: HITT 2340 Advanced Medical Billing and Reimbursement VERNON COLLEGE SYLLABUS DIVISION: Allied Health and Human Services DATE: 2014-201 CREDIT HRS: HRS/WK LEC: 2 HRS/WK LAB: 2 LEC/LAB COMB: 4 I. VERNON COLLEGE GENERAL EDUCATION PHILOSOPHY STATEMENT General

More information

South Texas College Division of Nursing/Allied Health Occupational Therapy Assistant Program Master Syllabus Fall 2006

South Texas College Division of Nursing/Allied Health Occupational Therapy Assistant Program Master Syllabus Fall 2006 As of 8/28/06 Chair's Information: South Texas College Division of Nursing/Allied Health Occupational Therapy Assistant Program Master Syllabus Fall 2006 1. Name of Chair: Esperanza J. Brattin, OTR 2.

More information

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Occupational Therapy Assistant Program

Occupational Therapy Assistant Program COURSE SYLLABUS Instructor: Turquessa Francis, OTR, Ed.D Instructor Information: Name: Turquessa Francis, OTR, Ed.D Office Location: Coleman, HSC, Room 382 Contact: Office 713-718-7392 Email: turquessa.francis@hccs.edu

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Course Syllabus. Revision Date: December 2013

Course Syllabus. Revision Date: December 2013 Course Syllabus MDCA 1254 Medical Assisting Credentialling Exam Review Revision Date: December 2013 Catalog Description: A preparation for the Certified Medical Assistant (American Association of Medical

More information

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2

More information

Security Policy for External Customers

Security Policy for External Customers 1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration

More information

INSTRUCTIONAL GOALS AND PURPOSES

INSTRUCTIONAL GOALS AND PURPOSES Course Syllabus HITT 2261 Clinical Health Information Technology/Technician Revision Date: April 14, 2015 Catalog Description: A health-related work-based learning experience that enables the student to

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

ITNW 1325 Fundamentals of Networking Technologies

ITNW 1325 Fundamentals of Networking Technologies Course Syllabus ITNW 1325 Fundamentals of Networking Technologies Catalog Description: Instruction in networking technologies and their implementation. Topics include the OSI reference model, network protocols,

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course 10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 OVERVIEW About this Course This five-day, instructor-led course provides you with the knowledge and skills

More information

Frank Phillips College. ITSY1391 Computer Forensics II

Frank Phillips College. ITSY1391 Computer Forensics II Frank Phillips College ITSY1391 Computer Forensics II I. General Course Information Stephanie Mooney Spring 2010 ITSY1391 Computer Forensics II 3 Credit hours Prerequisite and/or Co-requisite: ITSY2343

More information

COURSE SYLLABUS INMT-1317 INDUSTRIAL AUTOMATION

COURSE SYLLABUS INMT-1317 INDUSTRIAL AUTOMATION COURSE SYLLABUS INMT-1317 INDUSTRIAL AUTOMATION Catalog Description: A study of the applications of industrial automation systems, including identification of system requirements, equipment integration,

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233 Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233 Course Outline Module 1: Introduction to Designing a Microsoft Exchange Server 2010 Deployment This

More information

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date COURSE SYLLABUS FIREWALLS & NETWORK SECURITY ITSY-2301 Number 2-3-3 Lecture - Lab - Credit ITSY-1342 Prerequisites April 16, 2015 Revision This syllabus has been reviewed and is current on the date indicated.

More information

Instructional Goals and Purposes: The purpose of this course is to teach students the importance of and principles of records management.

Instructional Goals and Purposes: The purpose of this course is to teach students the importance of and principles of records management. Course Syllabus POFT 1319 RECORDS AND INFORMATION MANAGEMENT I Revision Date: 09/02/2013 Catalog Description: Records and Information Management I is an introduction to basic records and information management.

More information

Course Syllabus. HITT 2346- Advanced Medical Coding. Revision Date: August 21, 2013

Course Syllabus. HITT 2346- Advanced Medical Coding. Revision Date: August 21, 2013 Course Syllabus HITT 2346- Advanced Medical Coding Revision Date: August 21, 2013 Catalog Description: In-depth coverage of ICD and CPT coding rubrics, conventions, principles, and updates as they apply

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Course 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day,

More information

How To Be A Data Security Analyst

How To Be A Data Security Analyst DATE ISSUED: 08/15 JOB DESCRIPTION TITLE Data Security Analyst JOB SUMMARY The Data Security Analyst performs two core functions for the enterprise. The first is the day-today operations of the in-place

More information

INSTRUCTIONAL GOALS AND PURPOSES:

INSTRUCTIONAL GOALS AND PURPOSES: Course Syllabus HITT 1211 - Health Information Systems Revision Date: August 19, 2013 CATALOG DESCRIPTION: Introduction to the concepts of computer technology related to health care and the tools and techniques

More information

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Implementing Cisco Intrusion Prevention System 7.0 (IPS) Implementing Cisco Intrusion Prevention System 7.0 (IPS) Course Overview: The Implementing Cisco Intrusion Prevention System (IPS) v7.0 course is a five-day course aims at providing network security engineers

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

How To Audit Telecommunication Services And Enterprise Security

How To Audit Telecommunication Services And Enterprise Security EXECUTIVE DIGEST TELECOMMUNICATION SERVICES AND ENTERPRISE SECURITY INTRODUCTION This report, issued in March 2002, contains the results of our performance audit* of Telecommunication Services and Enterprise

More information

Course Syllabus. MDCA 2264 Practicum- Medical/Clinical Assistant. Revision Date: August 2015

Course Syllabus. MDCA 2264 Practicum- Medical/Clinical Assistant. Revision Date: August 2015 Course Syllabus MDCA 2264 Practicum- Medical/Clinical Assistant Revision Date: August 2015 Catalog Description: Practical, general workplace training supported by an individualized learning plan developed

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

2356) Prerequisit. cies. environment. (SCANS: C1, C3, that supports F8, F9, F10, interviews

2356) Prerequisit. cies. environment. (SCANS: C1, C3, that supports F8, F9, F10, interviews Designing a Network Directory Infrastructure (ITNW 2356) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisit te/co-requisite: None Course Description Design, implement, and support

More information

HIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond

HIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond HIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond I. Domain: Health Data Management A. Data Structure 1. Evaluate reference terminologies to satisfy organizational information

More information

Course Syllabus. CDEC 1313 Curriculum Resources for Early Childhood Programs. Revision Date: April 19, 2016

Course Syllabus. CDEC 1313 Curriculum Resources for Early Childhood Programs. Revision Date: April 19, 2016 Course Syllabus CDEC 1313 Curriculum Resources for Early Childhood Programs Revision Date: April 19, 2016 Catalog Description: A study of the fundamentals of developmentally-appropriate curriculum design

More information

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy. Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Core Solutions of Microsoft Exchange Server 2013 MOC 20341

Core Solutions of Microsoft Exchange Server 2013 MOC 20341 Core Solutions of Microsoft Exchange Server 2013 MOC 20341 Course Outline Module 1: Deploying and Managing Exchange Server 2013 This module explains how to plan and perform deployment and management of

More information

JOB DESCRIPTION. Director of e-learning. Strathalbyn and Murray Bridge PURPOSE OF THE POSITION

JOB DESCRIPTION. Director of e-learning. Strathalbyn and Murray Bridge PURPOSE OF THE POSITION JOB DESCRIPTION Title ICT Officer Career Group ICT Classification Level 5.1 (18-20) Line Manager Director of e-learning Sub-school / Location Strathalbyn and Murray Bridge Reporting to Director of e-learning

More information

Specific Course Objectives (includes SCANS): After studying all materials and resources presented in the course, the student will be able to:

Specific Course Objectives (includes SCANS): After studying all materials and resources presented in the course, the student will be able to: Course Syllabus ITSC 1405 PC Operating Systems Revision Date: 08/19/2014 Catalog Description: This course is an introduction to personal computer operating systems including installation, configuration,

More information

INFORMATION TECHNOLOGY PLAN. THE ENLARGED CITY SCHOOL DISTRICT OF TROY, NEW YORK 2920 Fifth Avenue, Troy, NY 12180 2012-2015

INFORMATION TECHNOLOGY PLAN. THE ENLARGED CITY SCHOOL DISTRICT OF TROY, NEW YORK 2920 Fifth Avenue, Troy, NY 12180 2012-2015 INFORMATION TECHNOLOGY PLAN for the THE ENLARGED CITY SCHOOL DISTRICT OF TROY, NEW YORK 2920 Fifth Avenue, Troy, NY 12180 2012-2015 Revised by the District Technology Committee TABLE OF CONTENTS Overview:

More information

Center of Excellence - Business Department Chair - Dr. Marina Grau Program Coordinator - Charles Lewis. Instructor Hong Phan, CPA

Center of Excellence - Business Department Chair - Dr. Marina Grau Program Coordinator - Charles Lewis. Instructor Hong Phan, CPA ACNT 1331 Fall 2015 - Hong Phan, CPA Page 1 of 9 Center of Excellence - Business Department Chair - Dr. Marina Grau Program Coordinator - Charles Lewis Instructor Hong Phan, CPA SYLLABUS ACNT 1331-0002

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

Course Syllabus. HITT 2346- Advanced Medical Coding

Course Syllabus. HITT 2346- Advanced Medical Coding Course Syllabus HITT 2346- Advanced Medical Coding Catalog Description: In-depth coverage of ICD and CPT coding rubrics, conventions, principles, and updates as they apply to accurate coding of complex

More information

South Texas College Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies CITP 3320 Database Management Fall 2007

South Texas College Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies CITP 3320 Database Management Fall 2007 1 South Texas College Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies CITP 3320 Database Management Fall 2007 Instructor s Information: Name of Instructor: Office

More information

Frank Phillips College. ITSY 2359: Security Assessment & Auditing

Frank Phillips College. ITSY 2359: Security Assessment & Auditing Frank Phillips College ITSY 2359: Security Assessment & Auditing I. General Course Information Stephanie Mooney Summer I 2010 ITSY 2359 Security Assessment & Auditing 3 Credit hours Prerequisite and/or

More information

Course Syllabus. MDCA 1360 Clinical- Clinical/Medical Assistant. Revision Date: August 2015

Course Syllabus. MDCA 1360 Clinical- Clinical/Medical Assistant. Revision Date: August 2015 Course Syllabus MDCA 1360 Clinical- Clinical/Medical Assistant Revision Date: August 2015 Catalog Description: A health-related work-based learning experience that enables the student to apply specialized

More information

PHASE 5: DESIGN PHASE

PHASE 5: DESIGN PHASE PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed

More information

IT Risk & Security Specialist Position Description

IT Risk & Security Specialist Position Description Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

Page 1 of 5 Position Code #P10260. Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Page 1 of 5 Position Code #P10260. Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters Page 1 of 5 Position Code #P10260 POSITION TITLE: Computer Forensics DEPT./DIV.: Investigative Services Support Technician REPORTS TO: Sergeant, Technological Crimes Unit BRANCH: Forensic Identification

More information

EXECUTIVE BEHAVIORAL INTERVIEW GUIDE

EXECUTIVE BEHAVIORAL INTERVIEW GUIDE EXECUTIVE BEHAVIORAL INTERVIEW GUIDE INTERVIEW GUIDE INSTRUCTIONS: This Interview Guide is intended to help hiring executives conduct behavioral interviews for executive classifications covered by the

More information

SIN 132-51, SIN 132-51 STLOC, 132-51RC - INFORMATION TECHNOLOGY (IT) PROFESSIONAL SERVICES

SIN 132-51, SIN 132-51 STLOC, 132-51RC - INFORMATION TECHNOLOGY (IT) PROFESSIONAL SERVICES AUTHORIZED FEDERAL ACQUISITION SERVICE INFORMATION TECHNOLOGY SCHEDULE PRICELIST GENERAL PURPOSE COMMERCIAL INFORMATION TECHNOLOGY EQUIPMENT, SOFTWARE AND SERVICES SIN 132-51, SIN 132-51 STLOC, 132-51RC

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Schedule A. MITA Career Level based on Responsibility Level (SFIA v5 Responsibility Levels) https://www.sfiaonline.org/v501/en/busskills.

Schedule A. MITA Career Level based on Responsibility Level (SFIA v5 Responsibility Levels) https://www.sfiaonline.org/v501/en/busskills. PROFILE TITLE MITA Career Level based on Responsibility Level (SFIA v5 Responsibility Levels) https://www.sfiaonline.org/v501/en/busskills.html SUMMARY STATEMENT TECHNICAL SERVICES OFFICER 3 Administers

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE CAPABILITY PLANNING, PROTECTION AND OPTIMIZATION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a

More information

Big Data Engineer Position Description

Big Data Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

The Technology Trilogy:

The Technology Trilogy: The Technology Trilogy: Security, Disaster Recovery, & Business Continuity Information Technology Services for Colleges and Universities www.thinkeduserve.com The Technology Trilogy: Security, Disaster

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Microsoft Exchange About this Course This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Server 2010. This course describes how

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Course Description. Course Outline. Duration: 5 days Course Price: $2,975. Software Assurance Eligible. About this Course

Course Description. Course Outline. Duration: 5 days Course Price: $2,975. Software Assurance Eligible. About this Course 10165 - Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1 Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Designing and Deploying Messaging Solutions with Microsoft Exchange Service Pack 2 Course Details Course Code: Duration: Notes: 10233B 5 days This course syllabus should be used to determine whether the

More information

Employability Skills Summary

Employability Skills Summary s Summary Monday, 22 November 2010 10:55 AM Version 1.2 s Summary Page 2 Table of Contents BSB10107 Certificate I in Business... 3 BSB20107 Certificate II in Business... 4 BSB30107 Certificate III in Business...

More information

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course: 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Description: About this Course This five-day, instructor-led course provides you with the knowledge and skills

More information

Exam 1 - CSIS 3755 Information Assurance

Exam 1 - CSIS 3755 Information Assurance Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

CTN286 - Virtualization and the Cloud 2

CTN286 - Virtualization and the Cloud 2 CTN286 - Virtualization and the Cloud 2 Document Type: Proposal Type: Requester(s): College: Origination Approved: District Master Course Outline New Course Carol Koepke David Herman South 08/21/2012-9:06

More information

Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Course 10165; 5 Days, Instructor-led

Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Course 10165; 5 Days, Instructor-led Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Course 10165; 5 Days, Instructor-led Course Description There are two main reasons for the course.

More information

Catalog Description: Application of basic coding rules, principles, guidelines, and conventions. Introduction to ICD-10-CM/PCS.

Catalog Description: Application of basic coding rules, principles, guidelines, and conventions. Introduction to ICD-10-CM/PCS. Course Syllabus HITT 1341- Coding and Classification Systems Revision Date: August 19, 2013 Catalog Description: Application of basic coding rules, principles, guidelines, and conventions. Introduction

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines

More information

Expert Panel Sample Booklet. Workforce Education Implementation Evaluation. SRI International

Expert Panel Sample Booklet. Workforce Education Implementation Evaluation. SRI International Expert Panel Sample Booklet Workforce Education Implementation Evaluation SRI International Introduction Welcome to the Expert Panel. During this session you will rate different qualities of classroom

More information

Course 10233:Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2

Course 10233:Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Course 10233:Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Type:Course Audience(s):IT Professionals Technology:Microsoft Exchange Level:200 This Revision:B

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Midland College Syllabus. ITNW 2413 Networking Hardware 2014-2015

Midland College Syllabus. ITNW 2413 Networking Hardware 2014-2015 Midland College Syllabus ITNW 2413 Networking Hardware 2014-2015 Course Description: Exploration of hardware devices including cables, servers, and workstations, network connectivity devices and uninterruptible

More information

MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007

MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course

More information

MCITP: Enterprise Messaging Administrator 2010 Boot Camp

MCITP: Enterprise Messaging Administrator 2010 Boot Camp MCITP: Enterprise Messaging Administrator 2010 Boot Camp Validate your Exchange Server skills with the MCITP: Enterprise Messaging Administrator certification. In an intensive and immersive hands-on learning

More information

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 1 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

More information

Release: 1. BSBCCO407A Administer customer contact technology

Release: 1. BSBCCO407A Administer customer contact technology Release: 1 BSBCCO407A Administer customer contact technology BSBCCO407A Administer customer contact technology Modification History Release Release 1 Comments This version first released with BSB07 Business

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290

NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290 NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290 Class Code(s): 0117 0118 SCOPE OF WORK: INFORMATION SYSTEMS SECURITY ANALYST Work involves the completion of technical

More information

POFT 2312 BUSINESS CORRESPONDENCE & COMMUNICATION

POFT 2312 BUSINESS CORRESPONDENCE & COMMUNICATION Course Syllabus POFT 2312 BUSINESS CORRESPONDENCE & COMMUNICATION Revision Date: 10/1/2015 Catalog Description: Development of writing and presentation skills to produce effective business communications.

More information

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise. 10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2405: NETWORK ADMINISTRATION COMPUTER TECHNOLOGY & OFFICE ADMINISTRATION DEPARTMENT

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2405: NETWORK ADMINISTRATION COMPUTER TECHNOLOGY & OFFICE ADMINISTRATION DEPARTMENT BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2405: NETWORK ADMINISTRATION COMPUTER TECHNOLOGY & OFFICE ADMINISTRATION DEPARTMENT CATALOG DESCRIPTION ITNW 2405 Network Administration. CIP 1109010007

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Course: 10233 Length: 5 Days

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Course: 10233 Length: 5 Days About this Course Designing and Deploying Messaging Solutions with This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Microsoft

More information

Course Syllabus. ITNW 1337 Introduction to the Internet

Course Syllabus. ITNW 1337 Introduction to the Internet Course Syllabus ITNW 1337 Introduction to the Internet Catalog Description: Introduction to the Internet with emphasis on using the World Wide Web to locate, transfer, and publish information. Survey of

More information

Implementing and Managing Microsoft Exchange (ITMT 2350)

Implementing and Managing Microsoft Exchange (ITMT 2350) Implementing and Managing Microsoft Exchange (ITMT 2350) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Updating and supporting a reliable,

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led

More information