WORKPLACE COMPETENCIES -- Effective workers can productively use:
|
|
- Edith Charles
- 8 years ago
- Views:
Transcription
1 ITSY 2401 irewalls and Network Security DEL MAR OLLEGE IS DEPARTMENT I. ITSY 2401 irewalls and Network Security (3-3-4) Identify elements of firewall design, types of security threats and responses to security attacks. Use best practices to design, implement and monitor a network security plan. Learn security incident postmortem analysis and on going network security activities. Suggested prerequisite: ITNW 1325, ITNW 2301 and ITSY 2400 ourse IDEA Objectives: Essential: Gaining factual knowledge (terminology, classifications, methods, trends) Important: Learning to apply course material (to improve thinking, problem solving, and decision. Essential: Developing specific skills, competencies, and points of view needed by professionals in the field most closely related to this course. SANS (Secretary s ommission on Achieving Necessary Skills) competencies are integrated into this course curriculum to improve education by helping to better define and assess the proficiency skills needed for employment. Each course competency will implement several SANS to help you develop and reinforce employable skills. ompetencies are criterion referenced (ie. They are measured against predetermined levels of proficiency in skills for effective job performance). The know-how identified by SANS is made up of five competencies and a three-part foundation of skills and personal qualities that are needed for solid job performance. These are: WORKPLAE OMPETENIES -- Effective workers can productively use: Resources -- They know how to (1) allocate time, (2) money, ( 3) materials, and (4) staff Information --They can (5) acquire and evaluate data, (6) organize, and maintain files, (7) interpret and communicate, and (8) use computers to process information. Interpersonal Skills -- They can work on (9) teams, (10) teach others, (11) serve customers, (12) lead, (13) negotiate, and (14) work well with people from culturally diverse backgrounds. Systems -- They (15) understand social, organizational, and technological systems; (16) they can monitor and correct performance; and (17) they can design or improve systems. Technology -- They can (18) select equipment and tools, (19) apply technology to specific tasks, and (20) maintain and troubleshoot equipment. OUNDATION SKILLS -- ompetent workers in the high-performance workplace need: Basic Skills-- (1) reading, (2) writing, (3) arithmetic and (4) mathematics, (5) listening and (6) speaking. Thinking Skills-- (7) to think creatively, (8) to make decisions, (9) to solve problems, (10) to visualize, (11) the ability to learn, and (12) to reason. Personal Qualities --(13) individual responsibility, (14) self-esteem, (15) sociability, (16) self-management, and (17) integrity.
2 II. END-O-OURSE OUTOMES (and Texas Skill Standards): Texas Skill Standards Provide data/information assurance Ensure Infrastructure and Network Security Develop manage and enforce it Perform security education Develop and implement physical security, d t d Perform system analysis and design Skill Standard A1 Gather and document data/information assurance requirements A2 Develop data/information assurance plans and implementation strategies A3 Review and test plans and strategies for compliance with applicable regulations and standards A4 Implement data/information assurance plans and strategies A5 Monitor performance to ensure integrity and confidentiality A6 Maintain and update data/information assurance plans and strategies as appropriate B1 Gather data and analyze security requirements B2 Identify, analyze, and evaluate infrastructure and network vulnerabilities B3 Develop critical situation contingency plans and disaster recovery plan B4 Implement/test contingency and backup plans and coordinate with stakeholders B5 Monitor, report and resolve security problems 1 Perform research and analyze requirements 2 Develop, assess and document security policies, practices and procedures 3 Disseminate policies and implementation practices and procedures 4 Implement, enforces and monitor security polices, practices and procedures D1 Identify and assess education and training requirements for all constituents D2 Identify resource and support materials D3 Design and develop education and training plans and strategies D4 Deliver education and training D5 Assess results and determine follow up requirements E1 Identify and assess current and anticipated security risks and vulnerabilities E2 Research and evaluate alternative current and emerging practices, tools and technologies E3 Select and apply relevant tools to meet security goals and requirements E4 Monitor, evaluate and test security conditions and environment E5 Implement, extend, and refine physical security plans and practices 1 Define current systems-level requirements and forecast future needs and trends 2 Evaluate current and emerging tools and technologies 3 Evaluate organization s security strategies 4 Make recommendations regarding organization s investment in security 5 oordinate systems testing and integration 6 Audit and maintain systems performance and ensure future readiness ITSY OURSE 2401 A. The student will explain the basic functions of a firewall, list two types of firewalls comparing and contrasting their differences, and state the reasons why a firewall should be deployed. B. The student will analyze a hypothetical network security plan, select and document the firewall functions necessary to protect the network.
3 . Describe various possible firewall topologies that might be deployed, compare and contrast the various possibilities, select one of the topologies, and support that choice in writing. D. The student will document system security skills through firewall implementation and testing; use system tools, practices, and relevant technologies to implement a firewallbased security plan. E. The student will document and present an appropriate firewall policy for a given topology.. The student will evaluate and present a report on the various practices, tools, and technologies that are used to identify security breaches, sources of attacks, and protect mission critical systems through the use of firewalls. G. The student will research, document, and present the required hardware and software components required in order to implement a firewall-based solution for a given set of security requirements. H. The student will research, document, and present a report on the use of relevant tools to secure a network, respond to and follow up on various types of attacks. I. The student will design, document, and implement appropriate packet filtering rules. J. The student will design and document a logging policy, select logging options for the packet filtering rules, and configure the alert mechanism. K. The student will create a test plan for the firewall implementation. L. The student will research, develop, and implement a firewall rules to establish an appropriate level of security based on an analysis of security logs.) M. Based on a specifications from a given security plan, the student will develop and follow his or her documented procedure for installing and configuring the firewall operating system using the recognized best practices and industry security standards, then test the firewall to create an audit report that shows compliance with the security plan. To facilitate mastery of the above-listed competencies, the instructor will be responsible for: 1) gaining student's attention 2) informing student of objectives 3) stimulating recall of prior knowledge 4) presenting new material 5) providing guided practice 6) eliciting performance 7) providing feedback 8) assessing performance 9) enhancing retention and transfer of knowledge.
4 Evaluation: To demonstrate mastery of the competencies listed above, the student will be responsible for: 1) ompleting class assignments using instructional material and lecture notes. 2) Maintaining complete written documentation of the lab activities. 3) Implementing a firewall plan 4) Submitting documents for an implementation plan 5) Attending class and participating in the discussion PROIIENY LEVELS OR SANS OMPETENIES: 1) Rarely performs task 2) task with moderate supervision 3) task with minimal supervision 4) task 5) task over and beyond designated task OMPETENY-BASED OUTOMES WITH WORKPLAE PROIIENY LEVELS Resources Information Interpersonal Skills Systems Technology A B D E G H I J K L M
5 OMPETENY-BASED OUTOMES WITH OUNDATION SKILLS LEVELS Basic Skills Thinking Skills Personal Qualities A B D E G H I J K L M rarely performs task task w/moderate supervision Routinely performs task w/minimal supervision task task over/ beyond designated task
Healthcare Software Analyst Program Application Packet
Healthcare Software Analyst Program 12800 Abrams Road Dallas, Texas 75243-2199 972.238.6950 www.richlandcollege.edu/hp Health Professions Division Healthcare Software Analyst Program Application Packet
More informationComputer and Information Science
Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer
More informationSOUTH TEXAS COLLEGE Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies Fall 2011
SOUTH TEXAS COLLEGE Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies Fall 2011 Chair s Information: 1. Name of Chair: Saeed Molki 2. Office Location: Information Technology
More informationApplication Packet. Insurance Billing & Coding Program. Insurance Coding and Billing Insurance Billing and Coding Program
Insurance Billing & Coding Program 12800 Abrams Road Dallas, Texas 75243-2199 972.238.6920 or 972.238-6248 www.richlandcollege.edu/hp School of Math/Science/Health Professions SH205 Insurance Coding and
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationUniversity of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
More informationJOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
More informationOccupational Therapy Assistant Program
COURSE SYLLABUS Primary Instructor: Turquessa Francis, OTR, Ed.D Instructor Information: Name: Turquessa Francis, OTR, Ed.D Office Location: Coleman, HSC, Room 382 Contact: Office 713-718-7392 Email: turquessa.francis@hccs.edu
More informationT141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
More informationPAGE 3 VERNON COLLEGE SYLLABUS COURSE NUMBER AND TITLE: HITT 2340 Advanced Medical Billing and Reimbursement
VERNON COLLEGE SYLLABUS DIVISION: Allied Health and Human Services DATE: 2014-201 CREDIT HRS: HRS/WK LEC: 2 HRS/WK LAB: 2 LEC/LAB COMB: 4 I. VERNON COLLEGE GENERAL EDUCATION PHILOSOPHY STATEMENT General
More informationSouth Texas College Division of Nursing/Allied Health Occupational Therapy Assistant Program Master Syllabus Fall 2006
As of 8/28/06 Chair's Information: South Texas College Division of Nursing/Allied Health Occupational Therapy Assistant Program Master Syllabus Fall 2006 1. Name of Chair: Esperanza J. Brattin, OTR 2.
More informationCENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationSENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationOccupational Therapy Assistant Program
COURSE SYLLABUS Instructor: Turquessa Francis, OTR, Ed.D Instructor Information: Name: Turquessa Francis, OTR, Ed.D Office Location: Coleman, HSC, Room 382 Contact: Office 713-718-7392 Email: turquessa.francis@hccs.edu
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationCourse Syllabus. Revision Date: December 2013
Course Syllabus MDCA 1254 Medical Assisting Credentialling Exam Review Revision Date: December 2013 Catalog Description: A preparation for the Certified Medical Assistant (American Association of Medical
More informationPDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2
More informationSecurity Policy for External Customers
1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration
More informationINSTRUCTIONAL GOALS AND PURPOSES
Course Syllabus HITT 2261 Clinical Health Information Technology/Technician Revision Date: April 14, 2015 Catalog Description: A health-related work-based learning experience that enables the student to
More informationBusiness Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
More informationITNW 1325 Fundamentals of Networking Technologies
Course Syllabus ITNW 1325 Fundamentals of Networking Technologies Catalog Description: Instruction in networking technologies and their implementation. Topics include the OSI reference model, network protocols,
More informationInformation Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Course 10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 OVERVIEW About this Course This five-day, instructor-led course provides you with the knowledge and skills
More informationFrank Phillips College. ITSY1391 Computer Forensics II
Frank Phillips College ITSY1391 Computer Forensics II I. General Course Information Stephanie Mooney Spring 2010 ITSY1391 Computer Forensics II 3 Credit hours Prerequisite and/or Co-requisite: ITSY2343
More informationCOURSE SYLLABUS INMT-1317 INDUSTRIAL AUTOMATION
COURSE SYLLABUS INMT-1317 INDUSTRIAL AUTOMATION Catalog Description: A study of the applications of industrial automation systems, including identification of system requirements, equipment integration,
More information---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233 Course Outline Module 1: Introduction to Designing a Microsoft Exchange Server 2010 Deployment This
More informationCOURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date
COURSE SYLLABUS FIREWALLS & NETWORK SECURITY ITSY-2301 Number 2-3-3 Lecture - Lab - Credit ITSY-1342 Prerequisites April 16, 2015 Revision This syllabus has been reviewed and is current on the date indicated.
More informationInstructional Goals and Purposes: The purpose of this course is to teach students the importance of and principles of records management.
Course Syllabus POFT 1319 RECORDS AND INFORMATION MANAGEMENT I Revision Date: 09/02/2013 Catalog Description: Records and Information Management I is an introduction to basic records and information management.
More informationCourse Syllabus. HITT 2346- Advanced Medical Coding. Revision Date: August 21, 2013
Course Syllabus HITT 2346- Advanced Medical Coding Revision Date: August 21, 2013 Catalog Description: In-depth coverage of ICD and CPT coding rubrics, conventions, principles, and updates as they apply
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Course 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day,
More informationHow To Be A Data Security Analyst
DATE ISSUED: 08/15 JOB DESCRIPTION TITLE Data Security Analyst JOB SUMMARY The Data Security Analyst performs two core functions for the enterprise. The first is the day-today operations of the in-place
More informationINSTRUCTIONAL GOALS AND PURPOSES:
Course Syllabus HITT 1211 - Health Information Systems Revision Date: August 19, 2013 CATALOG DESCRIPTION: Introduction to the concepts of computer technology related to health care and the tools and techniques
More informationImplementing Cisco Intrusion Prevention System 7.0 (IPS)
Implementing Cisco Intrusion Prevention System 7.0 (IPS) Course Overview: The Implementing Cisco Intrusion Prevention System (IPS) v7.0 course is a five-day course aims at providing network security engineers
More informationTERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
More informationHow To Audit Telecommunication Services And Enterprise Security
EXECUTIVE DIGEST TELECOMMUNICATION SERVICES AND ENTERPRISE SECURITY INTRODUCTION This report, issued in March 2002, contains the results of our performance audit* of Telecommunication Services and Enterprise
More informationCourse Syllabus. MDCA 2264 Practicum- Medical/Clinical Assistant. Revision Date: August 2015
Course Syllabus MDCA 2264 Practicum- Medical/Clinical Assistant Revision Date: August 2015 Catalog Description: Practical, general workplace training supported by an individualized learning plan developed
More informationNOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
More information2356) Prerequisit. cies. environment. (SCANS: C1, C3, that supports F8, F9, F10, interviews
Designing a Network Directory Infrastructure (ITNW 2356) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisit te/co-requisite: None Course Description Design, implement, and support
More informationHIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond
HIM Master s Degree Competencies* Domains, Subdomains, and Tasks 2007 and Beyond I. Domain: Health Data Management A. Data Structure 1. Evaluate reference terminologies to satisfy organizational information
More informationCourse Syllabus. CDEC 1313 Curriculum Resources for Early Childhood Programs. Revision Date: April 19, 2016
Course Syllabus CDEC 1313 Curriculum Resources for Early Childhood Programs Revision Date: April 19, 2016 Catalog Description: A study of the fundamentals of developmentally-appropriate curriculum design
More informationsecurity policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationCore Solutions of Microsoft Exchange Server 2013 MOC 20341
Core Solutions of Microsoft Exchange Server 2013 MOC 20341 Course Outline Module 1: Deploying and Managing Exchange Server 2013 This module explains how to plan and perform deployment and management of
More informationJOB DESCRIPTION. Director of e-learning. Strathalbyn and Murray Bridge PURPOSE OF THE POSITION
JOB DESCRIPTION Title ICT Officer Career Group ICT Classification Level 5.1 (18-20) Line Manager Director of e-learning Sub-school / Location Strathalbyn and Murray Bridge Reporting to Director of e-learning
More informationSpecific Course Objectives (includes SCANS): After studying all materials and resources presented in the course, the student will be able to:
Course Syllabus ITSC 1405 PC Operating Systems Revision Date: 08/19/2014 Catalog Description: This course is an introduction to personal computer operating systems including installation, configuration,
More informationINFORMATION TECHNOLOGY PLAN. THE ENLARGED CITY SCHOOL DISTRICT OF TROY, NEW YORK 2920 Fifth Avenue, Troy, NY 12180 2012-2015
INFORMATION TECHNOLOGY PLAN for the THE ENLARGED CITY SCHOOL DISTRICT OF TROY, NEW YORK 2920 Fifth Avenue, Troy, NY 12180 2012-2015 Revised by the District Technology Committee TABLE OF CONTENTS Overview:
More informationCenter of Excellence - Business Department Chair - Dr. Marina Grau Program Coordinator - Charles Lewis. Instructor Hong Phan, CPA
ACNT 1331 Fall 2015 - Hong Phan, CPA Page 1 of 9 Center of Excellence - Business Department Chair - Dr. Marina Grau Program Coordinator - Charles Lewis Instructor Hong Phan, CPA SYLLABUS ACNT 1331-0002
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationCLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
More informationCourse Syllabus. HITT 2346- Advanced Medical Coding
Course Syllabus HITT 2346- Advanced Medical Coding Catalog Description: In-depth coverage of ICD and CPT coding rubrics, conventions, principles, and updates as they apply to accurate coding of complex
More informationSouth Texas College Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies CITP 3320 Database Management Fall 2007
1 South Texas College Bachelor Programs Bachelor of Applied Technology Computer and Information Technologies CITP 3320 Database Management Fall 2007 Instructor s Information: Name of Instructor: Office
More informationFrank Phillips College. ITSY 2359: Security Assessment & Auditing
Frank Phillips College ITSY 2359: Security Assessment & Auditing I. General Course Information Stephanie Mooney Summer I 2010 ITSY 2359 Security Assessment & Auditing 3 Credit hours Prerequisite and/or
More informationCourse Syllabus. MDCA 1360 Clinical- Clinical/Medical Assistant. Revision Date: August 2015
Course Syllabus MDCA 1360 Clinical- Clinical/Medical Assistant Revision Date: August 2015 Catalog Description: A health-related work-based learning experience that enables the student to apply specialized
More informationPHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
More informationIT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
More informationPage 1 of 5 Position Code #P10260. Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters
Page 1 of 5 Position Code #P10260 POSITION TITLE: Computer Forensics DEPT./DIV.: Investigative Services Support Technician REPORTS TO: Sergeant, Technological Crimes Unit BRANCH: Forensic Identification
More informationEXECUTIVE BEHAVIORAL INTERVIEW GUIDE
EXECUTIVE BEHAVIORAL INTERVIEW GUIDE INTERVIEW GUIDE INSTRUCTIONS: This Interview Guide is intended to help hiring executives conduct behavioral interviews for executive classifications covered by the
More informationSIN 132-51, SIN 132-51 STLOC, 132-51RC - INFORMATION TECHNOLOGY (IT) PROFESSIONAL SERVICES
AUTHORIZED FEDERAL ACQUISITION SERVICE INFORMATION TECHNOLOGY SCHEDULE PRICELIST GENERAL PURPOSE COMMERCIAL INFORMATION TECHNOLOGY EQUIPMENT, SOFTWARE AND SERVICES SIN 132-51, SIN 132-51 STLOC, 132-51RC
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationSchedule A. MITA Career Level based on Responsibility Level (SFIA v5 Responsibility Levels) https://www.sfiaonline.org/v501/en/busskills.
PROFILE TITLE MITA Career Level based on Responsibility Level (SFIA v5 Responsibility Levels) https://www.sfiaonline.org/v501/en/busskills.html SUMMARY STATEMENT TECHNICAL SERVICES OFFICER 3 Administers
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationINTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE CAPABILITY PLANNING, PROTECTION AND OPTIMIZATION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a
More informationBig Data Engineer Position Description
Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
More informationThe Technology Trilogy:
The Technology Trilogy: Security, Disaster Recovery, & Business Continuity Information Technology Services for Colleges and Universities www.thinkeduserve.com The Technology Trilogy: Security, Disaster
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Microsoft Exchange About this Course This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Server 2010. This course describes how
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationState Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
More informationIT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
More informationCourse Description. Course Outline. Duration: 5 days Course Price: $2,975. Software Assurance Eligible. About this Course
10165 - Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1 Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Designing and Deploying Messaging Solutions with Microsoft Exchange Service Pack 2 Course Details Course Code: Duration: Notes: 10233B 5 days This course syllabus should be used to determine whether the
More informationEmployability Skills Summary
s Summary Monday, 22 November 2010 10:55 AM Version 1.2 s Summary Page 2 Table of Contents BSB10107 Certificate I in Business... 3 BSB20107 Certificate II in Business... 4 BSB30107 Certificate III in Business...
More information10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Course: 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Description: About this Course This five-day, instructor-led course provides you with the knowledge and skills
More informationExam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
More informationFundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
More informationCTN286 - Virtualization and the Cloud 2
CTN286 - Virtualization and the Cloud 2 Document Type: Proposal Type: Requester(s): College: Origination Approved: District Master Course Outline New Course Carol Koepke David Herman South 08/21/2012-9:06
More informationUpdating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Course 10165; 5 Days, Instructor-led
Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Course 10165; 5 Days, Instructor-led Course Description There are two main reasons for the course.
More informationCatalog Description: Application of basic coding rules, principles, guidelines, and conventions. Introduction to ICD-10-CM/PCS.
Course Syllabus HITT 1341- Coding and Classification Systems Revision Date: August 19, 2013 Catalog Description: Application of basic coding rules, principles, guidelines, and conventions. Introduction
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
More informationExpert Panel Sample Booklet. Workforce Education Implementation Evaluation. SRI International
Expert Panel Sample Booklet Workforce Education Implementation Evaluation SRI International Introduction Welcome to the Expert Panel. During this session you will rate different qualities of classroom
More informationCourse 10233:Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Course 10233:Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Type:Course Audience(s):IT Professionals Technology:Microsoft Exchange Level:200 This Revision:B
More informationBusiness Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
More informationMidland College Syllabus. ITNW 2413 Networking Hardware 2014-2015
Midland College Syllabus ITNW 2413 Networking Hardware 2014-2015 Course Description: Exploration of hardware devices including cables, servers, and workstations, network connectivity devices and uninterruptible
More informationMCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007
MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course
More informationMCITP: Enterprise Messaging Administrator 2010 Boot Camp
MCITP: Enterprise Messaging Administrator 2010 Boot Camp Validate your Exchange Server skills with the MCITP: Enterprise Messaging Administrator certification. In an intensive and immersive hands-on learning
More informationTrainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010
Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 1 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010
More informationRelease: 1. BSBCCO407A Administer customer contact technology
Release: 1 BSBCCO407A Administer customer contact technology BSBCCO407A Administer customer contact technology Modification History Release Release 1 Comments This version first released with BSB07 Business
More informationIT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
More informationNORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290
NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290 Class Code(s): 0117 0118 SCOPE OF WORK: INFORMATION SYSTEMS SECURITY ANALYST Work involves the completion of technical
More informationPOFT 2312 BUSINESS CORRESPONDENCE & COMMUNICATION
Course Syllabus POFT 2312 BUSINESS CORRESPONDENCE & COMMUNICATION Revision Date: 10/1/2015 Catalog Description: Development of writing and presentation skills to produce effective business communications.
More informationThis course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.
10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge
More informationDirector, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
More informationBRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2405: NETWORK ADMINISTRATION COMPUTER TECHNOLOGY & OFFICE ADMINISTRATION DEPARTMENT
BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2405: NETWORK ADMINISTRATION COMPUTER TECHNOLOGY & OFFICE ADMINISTRATION DEPARTMENT CATALOG DESCRIPTION ITNW 2405 Network Administration. CIP 1109010007
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Course: 10233 Length: 5 Days
About this Course Designing and Deploying Messaging Solutions with This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Microsoft
More informationCourse Syllabus. ITNW 1337 Introduction to the Internet
Course Syllabus ITNW 1337 Introduction to the Internet Catalog Description: Introduction to the Internet with emphasis on using the World Wide Web to locate, transfer, and publish information. Survey of
More informationImplementing and Managing Microsoft Exchange (ITMT 2350)
Implementing and Managing Microsoft Exchange (ITMT 2350) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Updating and supporting a reliable,
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
More informationBUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
More informationCourse 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005
Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led
More information