...Tuesday’s, 5:45, Prince George’s Campus Instructor: Jason Powers Instructor Phone: 443-599-9525 Academic Office: 301-505-3332 / 301-505-3311 Instructor E-mail: Jason.Powers@strayer.edu Instructor Office Hours/Location: Tuesday’s from 3:30pm – 5:30pm. Online Academic Office Phone Number: 877-540-1733 http://icampus.strayer.edu Technical Support Contact Information: 877-642-2999 Backboard Helpdesk: 866-350-9427 Inclement Weather Policy In the event of inclement weather, consult the Strayer University student website at www.strayer.edu for information on University closings and delays. Be sure to monitor the website for updates as they occur. Additionally, the student is required to contact me at Jason.Powers@strayer.edu. |4/8/2013 |Term Start Date | | | | | | |Week 1 | |Week 7 | | | |4/9/2013 | |5/21/2013 | |Week 2 | |Week 8 | | | |4/16/2013 | |5/28/2013 | |Week 3 | |Week 9 | | | |4/23/2013 | |6/4/2013 | |Week 4 | |Week 10 | ...
Words: 6563 - Pages: 27
...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-364 Database Administration Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE FOR DEVELOPERS UDY F DEVELOPERS 98-364 Database Administration Fundamentals Authors Peggy Fisher (Web Development and Database Administration). Peggy teaches computer science at a rural high school in central, Pennsylvania. Indian Valley High School offers courses in programming (C#, VB, and Java for the AP course), and Web design (Expression Web, HTML, JavaScript, and CSS). Peggy worked for a large insurance company outside Philadelphia, Pennsylvania, prior to leaving the corporate world to join the field of education. She has been at IVHS for the past eight years and truly enjoys her new career. Peggy also teaches part-time at Pennsylvania State University in the Continuing Education program. Her goal in teaching is to instill the love of learning so that her students will graduate and become lifelong learners. Peggy is the co-author of the Web Development Exam Review Kit in the MTA Exam Review Kit series. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years...
Words: 11425 - Pages: 46
...(knowledge) • 3 scenario based questions (application). Exam approach – scenario based questions • Follow ISAC approach: Identify the legal issues State the relevant law Apply the law Conclude Core Areas of Syllabus • • • • Essential elements of the legal system The law of obligations Employment law The formation and constitution of business organisations Capital and the financing of companies Management, administration and regulation of companies Legal implications of companies in difficulty or in crisis Governance and ethical issues relating to business • • • • Chapter 1 The English legal system The English legal system • Criminal law vs Civil law The main English civil courts • • • • House of Lords Court of Appeal County Court High Court of Justice Other courts • • • • Magistrates’ Court Employment Appeal Tribunal European Court of Justice European Court of Human Rights Chapter 2 Sources of English law Sources of English Law Case law Common law Legislation Direct legislation Indirect legislation Equity Sources of English Law • Literal rule • Golden rule • Mischief rule Chapter 3 Human rights Human Rights Act 1998 Purpose Derogation Human Rights Act 1998 Convention law Incompatible with convention Chapter 4 Formation of contracts Definition of contract A valid contract is a legally binding agreement, formed by the mutual consent of two parties. Essentials of a contract ...
Words: 1428 - Pages: 6
...All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail by applying critical thinking and problem solving skills. 7. Present and defend a proposal or implementation in spoken, written, and panel formats in a professional manner. 8. Complete a comprehensive skills assessment for the program of study. LEARNING OUTCOMES 1. Apply important concepts...
Words: 7871 - Pages: 32
...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these...
Words: 21009 - Pages: 85
...SCIENCES Degree Programme in Business Information Technology Bachelor Thesis Autumn 2012 Jari-Pekka Koivisto Lahti University of Applied Sciences Degree Programme in Business Information Technology KOIVISTO, JARI-PEKKA: Network-attached storage for small companies Case: Design Foundation Finland Thesis in Degree Programme in Business Information Technology, 56 pages, 11 pages of appendices Autumn 2012 ABSTRACT This study focuses on finding the proper solution to create Network-attached storage (NAS) for a small company. This study was commissioned by Design Foundation Finland, aiming to improve the security and the management of the information. This research will be aiming to find the proper way to design and implement a network storage, which will be used as the main data storage within the company for creating an ideal solution for data maintenance, security and ease of access to all the data of the foundation. The outcome of the thesis is a solution, which is created from scratch, offering a design and implementation of an NAS in a small company with a relatively small budget. The case foundation is located in Lahti. The foundation was established in 2009, aimed to improve and support the education (of design), as well as research and development of design. Design Foundation Finland also has an own R&D group to improve the design of Finnish products in several industrial fields. The method used in this study is qualitative, based on the author’s own observation within...
Words: 10025 - Pages: 41
...[pic] [pic] |School of Science and Technology | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...
Words: 4918 - Pages: 20
...Your organization will need to decide which rules to define; this is an essential part of its security policy. If the appropriate sections related to firewalls do not pre-define what rules to define on a new firewall, then perform the following procedure: 1. Inventory all essential business processes and communications that will cross the checkpoint. 2. Determine the protocols, ports, and IP addresses of valid traffic for both internal and external hosts. 3. Write out the rules on paper or using a firewall rule designer/simulator. 4. Test the rules in a laboratory environment. 5. Obtain written approval for the rule sets from a change approval board. 6. Document the rules into a security policy procedure amendment and submit the amendment to the security policy management team for inclusion in the official document. Ultimately, this is the basic process for creating any new element of security. The goal always is to have a written security policy for every security component. If no current policy or procedure defining the steps to take for the deployment of a new security element exists, then you must write, test, and get approval for a new policy or procedure. Once a procedure exists, use it to judge successful deployment. The exact rules to add to a new firewall are completely dependent upon the business processes that are unique to every organization. However, some common types of rules are found on most firewalls. These include: • Access to insecure Internet...
Words: 803 - Pages: 4
...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past 15 years. Previously, she worked for Digital Equipment Corporation (DEC) in Elk Grove, Illinois. She holds a Bachelor of Science from the University of Wisconsin-Parkside in Math and Economics with a minor in Computer Science and a MBA from the University of Wisconsin-Eau Claire. Shari’s current industry certifications include: Comptia Server+, Linux+, A+, Network+, and i-Net+. Her past certifications include: MCSE-NT 4.0, CCNA, and Pathworks for Macintosh. She is a Cisco Certified Instructor for Cisco’s Network Academy and teaches the CCNA curriculum. She is the author of Advanced WordPerfect Using Macro Power: A Guide for VMS and DOS Users from Digital Press. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft in...
Words: 12317 - Pages: 50
...[pic] [pic] |School of Science and Technology | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...
Words: 4921 - Pages: 20
... Introduction .............................................................................................................................. 3 2 -‐ Role of Business Intelligence ..................................................................................................... 3 2.1 -‐ Business Intelligence -‐ Overview ............................................................................................... 3 2.2 -‐ Business Intelligence Tools ........................................................................................................ 4 2.2.1 -‐ On-‐line Analytical Processing .............................................................................................. 4 2.2.2 -‐ Data Mining ........................................................................................................................ 5 2.2.3 – Dashboards ........................................................................................................................ 6 2.2.4 -‐ Data Visualisation ............................................................................................................... 6 3 -‐ Role of Business...
Words: 4854 - Pages: 20
...Chapter One Introduction 1.1 Introduction Risk is inherent in all aspects of a commercial operation; however for Banks and financial institutions, credit risk is an essential factor that needs to be managed. Credit risk is the possibility that a borrower or counter party will fail to meet its obligations in accordance with agreed terms. Credit risk, therefore, arises from the bank’s dealings with or lending to corporates, individuals, and other banks or financial institutions. Credit Risk Grading is an important tool for credit risk management as it helps a Bank to understand various dimensions of risk involved in different credit transactions. The aggregation of such grading across the borrower, activities and the lines of business can provide better assessment of the quality of credit portfolio of a bank or a branch. The credit risk grading system is vital to take decisions both at the pre-sanction stage as well as post-sanction stage. At the pre-sanction stage, credit grading helps the sanctioning authority to decide whether to or not to lend, what should be the pricing for a particular exposure, what should be the exposure, what should be the appropriate credit facility, what the various facilities are and what are the various risk mitigation tools to put a cap on the risk level. At the post-sanction stage, the bank can decide about the depth of the review, periodicity of the grading, and other precautions to be taken. Having considered the significance and necessity...
Words: 2666 - Pages: 11
...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...
Words: 15354 - Pages: 62
...Operating Systems: Course Syllabus Chapter 2: System Structures General OS task: resource mgmt Abstraction from details Sharing, fairness, ... Protection Interfaces: shells, API, system calls, ... Layered system design Microkernels Modularized approach Architecture of OSs Virtual Machines System Boot process Operating System Principles Syllabus.2 Silberschatz, Galvin and Gagne ©2005 Chapter 3: Processes Operating System Principles Syllabus.3 Silberschatz, Galvin and Gagne ©2005 Chapter 4: Threads Operating System Principles Syllabus.4 Silberschatz, Galvin and Gagne ©2005 Chapter 5: CPU Scheduling Operating System Principles Syllabus.5 Silberschatz, Galvin and Gagne ©2005 Chapter 6: Process Synchronization What is the problem? Give examples! Mutual exclusion Critical sections Different solutions, on different levels of abstraction „Correctness“ criteria (mut.ex., progress/non-starvation, fairness, bounded waiting) Busy wait vs. Sleep Classical synchronization problems Bounded Buffers Readers/writers Dining Philosophers Atomic transactions (cf. databases) Logging, UNDO/REDO recovery Concurrency Control, Serializability, Locking Time-Stamping Operating System Principles Syllabus.6 Silberschatz, Galvin and Gagne ©2005 Chapter 7: Deadlocks Define the problem, give necessary conditions! Graph-based models (single vs. multiple resources...
Words: 624 - Pages: 3
...demands and challenges of the time. Program: BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Program Objectives: The BS Information technology program includes the study of the utilization of both hardware and software technologies involving planning, installing, customizing, operating, managing and administering, and maintaining information technology infrastructure that provides computing solutions to address the needs of an organization. The program prepares graduates to address various users’ needs involving the selection, development, application, integration and management of computing technologies within an organization Course Title: Free Elective II (Information Assurance and Security) Course Description: This course provides a broad view of information assurance and security and its major subjects: protection of information assets; access to information system; hacking legislation and industrial standards. In addition this course will serve as a guideline for students to make their course selections. Course/Year and Section: BSIT...
Words: 1777 - Pages: 8