CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Course Description A course designed to enable students to understand and work with network media and topologies, protocols and standards, network implementation and support. This course will help prepare the student for the CompTIA Network+ Certification. This course is one of the required courses for obtaining the NSTISSI 4011 and CNSSI 4013 certifications. NSTISSI 4011 Course Objectives NSTISSI 4011 Mapping Details CNSSI 4013 Course Objectives CNSSI 4013 Mapping Details General Course Objectives Textbook Network+ Guide to Networks. 5 th Edition. Dean, Course Technology, Fifth Edition, 2010. Labs Lab activities will be assigned throughout the semester. In order to receive credit for these activities, students will be required to turn in a lab summary, or complete a quiz that will measure a students understanding of the lab. The instructor will inform the students what will be required for each lab activity. Each student is expected to have all reading assignments and homework completed prior to coming to class. A 10% penalty per calendar day will be assessed for late labs/assignments. Labs summaries will be submitted through Elearn. Tests Test and quizzes will be given covering material from the text, handouts and class lectures. The tests may include multiplechoice, fill in the blank, short answer, matching, and essay questions. If it is necessary to miss an exam, it will be the student's responsibility to contact the instructor to arrange a time to make up the exam. Make-up exams may not be the same exam given during the regular exam date and must be taken prior to the final exam period. Quizzes will be of the take home variety and will be submitted via E-learn. Grading Policy Each student's final grade will be determined by the following: Labs...30% Tests and Quizzes...70%...(35% Tests and 35% Quizzes) Total...100% Grading Scale A...92-100 B...83-91 C...75-82 D...70-74 F...69 or below
Attendance Policy Students are expected to attend all classes. After three hours of missed class time, 1 point will be deducted from the student's final grade for each additional one-hour of class time missed. It will be the student's responsibility to obtain all information missed. Tardiness to class will result in the equivalent of a one hour absence for every tardy. Course Format This course will use problem-based learning as its primary mode of knowledge discovery. It will be the student's responsibility to learn based on problems presented. Some classroom discussion periods will be used to clarify what is to be learned. Academic Honesty Plagiarism, cheating, and other forms of academic dishonesty are prohibited. Any student who is caught cheating on a test, exam, lab assignment, etc. will be given a grade of F for the entire course. Other Comments Jackson State will make reasonable accommodations for persons with documented physical, mental or learning disabilities. Students should notify their instructor and the Coordinator of Disabled Student Services located in the Counseling Office in the Student Union Building - of any special needs. Instructors should be notified the first week of class. All discussions remain confidential. No children allowed in the classroom. Cell phones and pagers must be turned off in the classroom. Ringing cell phones and audible pagers will negatively impact the student s class participation grade.
Network Technician CIS 175 NSTISSI 4011 Course Objectives A1. List the advantages of networked computing relative to standalone computing A2. Distinguish between client/server and peer-to-peer networks A3. List elements common to all client/server networks A4. Describe several specific uses for a network A5. Identify some of the certifications available to networking professionals A6. Identify the kinds of skills and specializations that will help you excel as a networking professional A7. Identify organizations that set standards for networking A8. Describe the purpose of the OSI model and each of its layers A9. Explain specific functions belonging to each OSI model layer A10. Understand how two network nodes communicate through the OSI model A11. Discuss the structure and purpose of data packets and frames A12. Describe the two types of addressing covered by the OSI model A13. Explain basic data transmission concepts, including full duplexing, attenuation, latency, noise, asynchronous vs synchronous, digital vs analog, and radio frequency A14. Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media A15. Compare the benefits and limitations of different networking media A16. Explain the principles behind and uses for serial connector cables A17. Identify wiring standards and the best practices for cabling buildings and work areas A18. Identify and explain the functions of the core TCP/IP protocols A19. Explain how the TCP/IP protocols correlate to layers of the OSI model A20. Discuss addressing schemes for TCP/IP in IPv4 and IPv6 A21. Describe the purpose and implementation of DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) A22. Identify the well-known ports for key TCP/IP services A23. Describe common Application layer TCP/IP protocols A24. Describe the basic and hybrid LAN physical topologies, and their uses, advantages, and disadvantages A25. Describe the backbone structures that form the foundation for most LANs A26. Understand the transmission methods underlying Ethernet networks A27. Compare the different types of switching used in data transmission A28. Identify the functions of LAN connectivity hardware A29. Install, configure, and differentiate between network devices such as, NICs, hubs, bridges, switches, routers, and gateways A30. Explain the advanced features of a switch and understand popular switching techniques, including VLAN management A31. Explain the purposes and properties of routing A32. Describe common IPv4 and IPv6 routing protocols A33. Identify a variety of uses for WANs A34. Explain different WAN topologies, including their advantages and disadvantages A35. Compare the characteristics of WAN technologies, including their switching type, throughput, media, security, reliability, dedicated line and line of sight. A36. Describe several WAN transmission and connection methods, including PSTN, public switched network, ISDN, T-carriers, DSL, broadband cable, ATM, SONET, microwave and satellite. A37. Describe multiple methods for remotely connecting to a network G1. Explain basic data transmission concepts, including full duplexing, attenuation, latency, and noise G2. Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media including covert channel control (Crosstalk) and optical systems G3. Compare the benefits and limitations of different networking media
G4. Understand the transmission methods underlying Ethernet networks including CSMA/CD (including a discussion on how collision detection incorporates a jamming signals and random retransmission delays to prevent further collisions, CSMA/CA and Token Passing G5. Describe multiple methods for remotely connecting to a network including dial back options G6. Explain how nodes exchange wireless signals in addition to transmission security concepts/concerns including burst transmissions, directional signals, frequency hopping, line-of-sight, line authentication, low power, masking, protected wireline, screening and spread spectrum transmissions G7. Identify potential obstacles to successful wireless transmission and their repercussions, such as interference and reflection G8. Understand WLAN (wireless LAN) architecture G9. Specify the characteristics of popular WLAN transmission methods, including 802.11 a/b/g/n G10. Install and configure wireless access points and their clients G11. Describe wireless MAN and WAN technologies, including 802.16 and satellite communications
Network Technician CIS 175 NSTISSI 4011 Mapping Details (A) Communications Basics (A) Describe Vehicles of Transmission: Course objectives A7 A32 discusses vehicle of transmission, which include the OSI Model, TCP/IP, transmission media and intermediary devices such as hubs and switches, Ethernet and other network protocols. (A) Introduce the Evolution of Modern Communication Systems: Course objectives A1 A6, Lecture material covers the evolution of communication systems from Main Frames to today s PC-based networks over the past 50 plus years.. o o (A1a) Historical vs Current Methodology: Course objectives A1 A6. The listed objectives further support the current evolution from stand-alone PCs to client/server networks. This includes advantages and disadvantages between peer-to-peer and client/server networks. Also, common elements (terminology), such as servers, nodes, hosts, NICS, Topology, protocols and transmission media, are discussed. (A1b) Capabilities and limitations of various communications systems: Course objectives A13 and A15 discusses digital vs analog, radio frequency. Course objectives A33 A37 discusses asynchronous vs synchronous, dedicated line, line of sight, microwave, public switched network and satellite. (G) NSTISS Policies and Procedures o (G1i) Transmission Security: Course objectives G6 - G11 covers burst transmission, directional signals, frequency hopping, line-of-sight, line authentication, low power, masking, protected wireline, screening and spread spectrum transmissions. Course objectives G1 G3 discusses covert channel control (Crosstalk) and optical systems. Course objective G5 discusses dial back. Course objective G4 covers jamming.
Network Technician CIS 175 CNSSI 4013 Course Objectives F1B1 Define and Describe multiple methods for remotely connecting to a network including VPNs using PPTP and L2TP protocols F1B2 Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit F1B3 Define Describe the basic and hybrid LAN physical topologies, and their uses, advantages, and disadvantages, which will include Ethernet, FDDI and Token Ring and the physical LAN topologies bus, star, ring and mesh. F1B4 Define and Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media including a discussion/demonstration on wiring closets using patch panels and punch down blocks F1B5 Compare the benefits and limitations of different networking media F1B6 Understand the transmission methods underlying Ethernet networks F1B7 Identify, Install, configure, and differentiate between network devices such as, NICs, concentrators, hubs, bridges, switches, routers, and gateways F1B8 Describe characteristics common to all NOSs (network operating systems) F1B9 Compare and evaluate NOSs to select the right one for your network F1B10 Define the requirements for and features of the Windows Server 2008 NOS F1B11 Define the requirements for and features of UNIX and Linux NOSs F1B12 Identify the functions of LAN connectivity hardware F1B13 Distinguish between client/server and peer-to-peer networks F1B14 List elements common to all client/server networks including hardware, software, firmware and media F1B15 Describe the purpose of the OSI model and each of its layers F1B16 Explain specific functions belonging to each OSI model layer F1B17 Understand how two network nodes communicate through the OSI model F1B18 Discuss the structure and purpose of data packets and frames F1B19 Describe the two types of addressing covered by the OSI model F1B20 Explain basic data transmission concepts, including full duplexing, attenuation, latency, and noise F1B21 Identify and explain the functions of the core TCP/IP protocols F1B22 Explain how the TCP/IP protocols correlate to layers of the OSI model F1B23 Discuss addressing schemes for TCP/IP in IPv4 and IPv6 F1B24 Understand WLAN (wireless LAN) architecture F1B25 Specify the characteristics of popular WLAN transmission methods, including 802.11 a/b/g/n F1B26 Install and configure wireless access points and their clients F1B27 Identify security risks in LANs and WANs and design security policies that minimize risks F1B28 Demonstrate how to secure WAN links and what procedures need to be in place to implement WAN security F1B29 Explain how physical security contributes to network security F1B30 Discuss hardware- and design-based security techniques F1B31 Use network operating system techniques to provide basic security including network layer security using IPSEC F1B32 Understand wireless security protocols, such as WEP, WPA, and 802.11i F1B33 Describe multiple methods for remotely connecting to a network F1B34 Describe several WAN transmission and connection methods, including PSTN, ISDN, T-carriers, DSL, modems broadband cable, ATM, and SONET and a discussion of multiplexers F1B35 Identify organizations that set standards for networking F1B36 Describe the purpose of the OSI model and each of its layers F1B37 Explain specific functions belonging to each OSI model layer F1B38 Understand how two network nodes communicate through the OSI model F1B39 Discuss the structure and purpose of data packets and frames F1B40 Describe the two types of addressing covered by the OSI model
F4A1 Understand wireless security protocols, such as WEP, WPA, and 802.11i F4A2 Identify security risks in LANs and WANs and design security policies that minimize risks
Network Technician CIS 175 CNSSI 4013 Mapping Details (F1B) General Procedures o (F1B1) Network Software: Course textbook - Defines and describes transport control protocol/internet protocol (TCP/IP), transport layer security (i.e., secure socket layer [SSL]), tunneling protocol (PPTP), layer 2 tunneling protocol (L2TP), virtual private network (VPN) (i.e., SSH2, SOCKS), secure e-mail (i.e., PGP, S/MIME), secure systems operations procedures. Course objectives F1B1 and F1B2 o (F1B21) Network, General: Course textbook - Defines and describes network architecture/topologies (i.e., ETHERNET, FDDI, bus, star, mesh, etc.), network components (hardware, firmware, software, and media), network layer security, network protocols, network types, wireless security and WAN security procedures. A student lab activity will be used to demonstrate the practice of WAN security procedures. Course objectives F1B1 F1B32 o (F1B22) Network Hardware: Course textbook Defines and Describes cable characteristics (i.e., twisted pair, fiber), concentrators, front-end processors, hubs, modems, multiplexers, gateways and routers, patch panels, routers, switches, and identify gateways and routers. Course objectives F1B4 F1B5, F1B7, F1B34 o (F1B26) OSI (Open Systems Interconnect): Course textbook defines and describes OSI model, transport control protocol/ internet protocol (TCP/IP), application layer security protocols (i.e., secure electronic transactions, secure hypertext, secure remote procedure call), presentation layer, session layer, transport layer security (i.e., secure socket layer [SSL]), network layer security, tunneling protocol (PPTP), layer 2 tunneling protocol (l2tp), data link layer security, physical layer. Course objectives F1B1 - F1B2, F1B21 F1B23, F1B35 F1B40 (F4A7) Network: The course textbook describes wireless and LAN/WAN security. Course objective F4A1 and F4A2
Network Technician CIS 175 General Course Objectives 1. Compare and evaluate NOSs to select the right one for your network 2. Compare the benefits and limitations of different networking media 3. Compare the characteristics of WAN technologies, including their switching type, throughput, media, security, reliability, dedicated line and line of sight. 4. Compare the different types of switching used in data transmission 5. Create users and groups and assign file permissions on systems running Windows Server 2008 and UNIX 6. Define and Describe multiple methods for remotely connecting to a network including VPNs using PPTP and L2TP protocols 7. Define and Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media including a discussion/demonstration on wiring closets using patch panels and punch down blocks 8. Define Describe the basic and hybrid LAN physical topologies, and their uses, advantages, and disadvantages, which will include Ethernet, FDDI and Token Ring and the physical LAN topologies bus, star, ring and mesh. 9. Define the requirements for and features of the Windows Server 2008 NOS 10. Define the requirements for and features of UNIX and Linux NOSs 11. Demonstrate how to secure WAN links and what procedures need to be in place to implement WAN security 12. Describe characteristics common to all NOSs (network operating systems) 13. Describe common Application layer TCP/IP protocols 14. Describe common IPv4 and IPv6 routing protocols 15. Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function 16. Describe multiple methods for remotely connecting to a network including dial back options 17. Describe protocols used between mail clients and mail servers, including SMTP, POP3, and IMAP4 18. Describe several specific uses for a network 19. Describe several WAN transmission and connection methods, including PSTN, public switched network, ISDN, T-carriers, DSL, broadband cable, ATM, SONET, microwave and satellite. 20. Describe several WAN transmission and connection methods, including PSTN, ISDN, T-carriers, DSL, modems broadband cable, ATM, and SONET and a discussion of multiplexers 21. Describe the backbone structures that form the foundation for most LANs 22. Describe the basic and hybrid LAN physical topologies, and their uses, advantages, and disadvantages 23. Describe the components of a useful disaster recovery plan and the options for disaster contingencies 24. Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media including covert channel control (Crosstalk) and optical systems 25. Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media 26. Describe the purpose and implementation of DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) 27. Describe the purpose of the OSI model and each of its layers 28. Describe the steps involved in an effective troubleshooting methodology 29. Describe the two types of addressing covered by the OSI model 30. Describe VoIP and video-over-ip signaling and transport protocols, including SIP, H.323, and RTP 31. Describe wireless MAN and WAN technologies, including 802.16 and satellite communications 32. Discuss addressing schemes for TCP/IP in IPv4 and IPv6 33. Discuss hardware- and design-based security techniques 34. Discuss issues related to network backup and recovery strategies 35. Discuss the structure and purpose of data packets and frames 36. Distinguish between client/server and peer-to-peer networks 37. Document symptoms, solutions, and results when troubleshooting network problems
38. Employ multiple TCP/IP utilities for network discovery and troubleshooting 39. Explain basic data transmission concepts, including full duplexing, attenuation, latency, noise, asynchronous vs synchronous, digital vs analog, and radio frequency 40. Explain different WAN topologies, including their advantages and disadvantages 41. Explain how nodes exchange wireless signals in addition to transmission security concepts/concerns including burst transmissions, directional signals, frequency hopping, line-of-sight, line authentication, low power, masking, protected wireline, screening and spread spectrum transmissions 42. Explain how physical security contributes to network security 43. Explain how the TCP/IP protocols correlate to layers of the OSI model 44. Explain network- and system-level fault-tolerance techniques 45. Explain specific functions belonging to each OSI model layer 46. Explain the advanced features of a switch and understand popular switching techniques, including VLAN management 47. Explain the differences between public and private TCP/IP networks 48. Explain the principles behind and uses for serial connector cables 49. Explain the purposes and properties of routing 50. Explain video-over-ip services and their user interfaces 51. Explain VoIP (voice over IP) services and their user interfaces 52. Follow a systematic troubleshooting process to identify and resolve networking problems 53. Identify a variety of uses for WANs 54. Identify and explain the functions of the core TCP/IP protocols 55. Identify organizations that set standards for networking 56. Identify potential obstacles to successful wireless transmission and their repercussions, such as interference and reflection 57. Identify security risks in LANs and WANs and design security policies that minimize risks 58. Identify some of the certifications available to networking professionals 59. Identify the characteristics of a network that keep data safe from loss or damage 60. Identify the functions of LAN connectivity hardware 61. Identify the kinds of skills and specializations that will help you excel as a networking professional 62. Identify the reasons for and elements of an asset management system 63. Identify the well-known ports for key TCP/IP services 64. Identify wiring standards and the best practices for cabling buildings and work areas 65. Identify, Install, configure, and differentiate between network devices such as, NICs, concentrators, hubs, bridges, switches, routers, and gateways 66. Install and configure wireless access points and their clients 67. Install, configure, and differentiate between network devices such as, NICs, hubs, bridges, switches, routers, and gateways 68. List elements common to all client/server networks including hardware, software, firmware and media 69. List the advantages of networked computing relative to standalone computing 70. Manage a network s performance using SNMP-based network management software, system and event logs, and traffic-shaping techniques 71. Plan and follow regular hardware and software maintenance routines 72. Protect an enterprise-wide network from viruses 73. Specify the characteristics of popular WLAN transmission methods, including 802.11 a/b/g/n 74. Understand how two network nodes communicate through the OSI model 75. Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit 76. Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation 77. Understand network management and the importance of documentation, baseline measurements, policies, and regulations to assess and maintain a network s health 78. Understand QoS (quality of service) assurance methods critical to converged networks, including RSVP and DiffServ
79. Understand the transmission methods underlying Ethernet networks including CSMA/CD (including a discussion on how collision detection incorporates a jamming signals and random retransmission delays to prevent further collisions, CSMA/CA and Token Passing 80. Understand wireless security protocols, such as WEP, WPA, and 802.11i 81. Understand WLAN (wireless LAN) architecture 82. Use a variety of software and hardware tools to diagnose problems 83. Use network operating system techniques to provide basic security including network layer security using IPSEC 84. Use terminology specific to converged networks