...Physical Networking: Syllabus NT1310 NT1310 Physical Networking SYLLABUS Credit hours: 4.5 Contact /Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite(s):NT1210 Introduction to Networking or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 03/02/2012 NT1310 Physical Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installations, testing and troubleshooting techniques for a computer network. MAJOR INSTRUCTIONAL AREAS 1. 2. 3. 4. 5. 6. 7. 8. 9. Telecommunications Cabling Specifications and Constraints Cabling Tools and Media Network Equipment for Wired and Wireless Networks Cable Testing Fiber Optics and Light Principles Fiber-Optic Cables, Splicing and Connectors Fiber-Optic Light Sources, Detectors and Receivers Fiber-Optic Considerations and Testing COURSE OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Distinguish between bandwidth, frequency, and data rate in a data network Explain the importance of codes, standards, and specifications. Compare and contrast network topologies ...
Words: 1770 - Pages: 8
...LATEST DEVICES IN NETWORKIG The basic network devices includes NIC adapters, routers, hubs, switches, modems, communication cables, LAN/WAN routers, gateway and other devices. Due to rapidly changing technology these devices keep changing or being modified. While at the same time others emerge, the following are some of the latest devices used in networking (these latest devices are mostly used by reputable companies due to their high cost); 1. Nuage Networks' Virtualized Services Platform Alcatel-Lucent's SDN arm, Nuage, made a splash in the burgeoning SDN space when it unveiled its Virtualized Services Platform, a software overlay for data center networks. The value of VSP is that it helps automate and accelerate the connection of virtual machines to data center networks after those machines are instantiated. VSP works by essentially creating “tunnels” between virtual machines—whether they are on the same server rack, a different rack or even in a different data center—so the network can be available instantly, regardless of where an application is running. 2. Ixia Anue GTP Session Controller In an effort to help 4G LTE mobile carriers keep closer tabs on their networks, Ixia launched its Anue GTP Session Controller, which helps carriers piece together data coming from multiple cell towers and drill down to gain visibility into an individual subscriber"s activity on each mobile device that user owns. The built-in monitoring tools have the ability to distribute...
Words: 943 - Pages: 4
...PROJECT GOVERNANCE SURVEY 2015 Dear Survey Participant, Thank you for your willingness to participating in this research project on Project Management Success versus Project Governance. Below is more information regarding this project: Why are we doing this? The aim of the project is to examine the correlation between Project Management Success and Project Governance used ensuring control, accountability and responsibility over project management activities. Since 2003, the department of AIS, University of Johannesburg has been conducting regular surveys to identify issues that pertain to the management of level in South Africa. Who are the researchers? The study is presently being carried out by Mr. Kwete Nyandongo from the University of Johannesburg. Other academics and senior students will also be involved. What do we request of you in the study? Participation in this survey is voluntary and anonymous. By completing and returning this questionnaire, you agreed to participate in this research and to the publication of the results with the understanding that anonymity will be preserved. Although this is an anonymous survey, space is provided at the end of the questionnaire for contact details of people who would be prepared to make themselves available for short follow-up interviews. The questionnaire will take you, at most, 30 minutes to complete. The majority of questions are in multiple choice format and we ask that you select the most appropriate answer...
Words: 2735 - Pages: 11
...Inventory of Assets Introduction Inventory of assets is the accounting of information technology and systems, both hardware and software, that is necessary for maintaining a stable and accurate support in order to provide information security and assurance, disaster recovery, as well as to avoid service interruption. In any organization, it is important to have an organized list of all assets including hardware and software, as well as licensing. Company-issued laptops, smartphones, tablets, and other mobile devices can be an easy target of cyber attackers. It is ideal to have an organized way of keeping track of company assets (i.e. spreadsheets or database). Quick references such as spreadsheets/workbooks or databases can easily provide reports of asset inventory containing type of equipment, count, value, asset tag information, software license number, license expiration, employee ID to whom assets are issued to, etc. As an employee of any company or organization, the company issued laptops, devices and other peripherals should be the responsibility of the employee that the item(s) is issued to. A stolen laptop could cause the company a huge amount because it does not only require the replacement cost, but has serious security concerns involved. According to Mitnick and Simon, “Even when security is being well handled within a company, there is too often a tendency to overlook the corporate network, leaving an opening that attacker(s) can take advantage of. Laptops and...
Words: 2212 - Pages: 9
...CECOM FSB Instructor Course Student Guide 15.03.23 PREPARATION 1 Instructor and Classroom Preparation 3 Classroom Management 17 Course Introduction 33 LESSON PLANNING AND PRESENTATION 41 Introduction to Lesson Planning 43 Anticipatory Set 51 Learning Objectives Writing Questions and Objectives Using Bloom’s Taxonomy 57 Input and Modeling Implications of Short-Term Memory Research Implications of Long-Term Memory Research Presentation Skills: Verbal, Vocal, Visual Presentation Skills: Questioning 77 93 105 113 Guided Practice Cooperative Learning Learning Styles/Modalities: Multiple Intelligences 121 135 Independent Practice Differentiated Instruction Assessment 153 161 Closure 171 REFERENCES 177 1 2 3 4 5 6 Course Overview Lesson Planning • • • • • • • • • • • Class Schedule • Start Time • Lunch • Dismissal • Breaks Class Agenda: what topics are taught on what days Review Anticipatory Set Objectives Purpose Input and Modeling Check for Understanding Guided Practice Closure Independent Practice (Sousa, 2011) The instructor is given what to teach, and he/she chooses how to teach it. We intend not to overwhelm students with information, and we will learn why in later lessons on memory. 7 Reliable Sources • • • • Quick reference guides Training manuals Manufacturer’s website...
Words: 11421 - Pages: 46
...Green computing 1 Green computing Green computing, green IT or ICT Sustainability, refers to environmentally sustainable computing or IT. In the article Harnessing Green IT: Principles and Practices, San Murugesan defines the field of green computing as "the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems — efficiently and effectively with minimal or no impact on the environment."[1] The goals of green computing are similar to green chemistry; reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. Many corporate IT department have Green Computing initiatives to reduce the environmental impacts of their IT operations.[2] Research continues into key areas such as making the use of computers as energy-efficient as possible, and designing algorithms and systems for efficiency-related computer technologies. Origins In 1992, the U.S. Environmental Protection Agency launched Energy Star, a voluntary labeling program that is designed to promote and recognize energy-efficiency in monitors, climate control equipment, and other technologies. This resulted in the widespread adoption of sleep mode among consumer electronics. Concurrently, the Swedish organization TCO Development launched the TCO...
Words: 6214 - Pages: 25
...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...
Words: 125224 - Pages: 501
...56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...
Words: 10839 - Pages: 44
...to transition from school or other fields into Information Security roles. Ours is a healthy job market and we do need qualified and motivated applicants. The jobs exist, but we repeatedly see candidates being given false advice to get them. With tremendous and very much appreciated help from many of my colleagues and friends in the field, I have endeavored to compile a comprehensive blog about starting an InfoSec career. This is a very lengthy blog broken into sections that may help people as parts or as a whole. We want you to succeed in our field. As always, please feel free to ask questions or leave comments / gripes / suggestions. Chapter 1: The Fundamentals Unfortunately, for all the interminable hacking tool tutorials and security guides floating around the internet, many InfoSec job candidates haven’t grasped two fundamental concepts: * To hack something (or defend it from hacking), you must have a solid understanding of how that thing works. And, * InfoSec is not a career that can be put in a box once you go home from work or school. You must be passionate enough about the field to be continually learning and aware of quickly changing current events. If you want a career that you can forget about once you go home at 5:00 PM, InfoSec is probably not the right choice. The really intriguing thing about InfoSec and hacking in general is how they draw heavily from knowledge of all sorts of IT subjects. It’s difficult to understand attacks,...
Words: 11232 - Pages: 45
...Information Technology Project Management, Third Edition ISBN 0-619-159847 Course Technology MIS Series Companion Web Site: www.course.com/mis/schwalbe Kathy Schwalbe, Ph.D., PMP Table of Contents CHAPTER 1 1 CHAPTER 2 3 CHAPTER 3 7 CHAPTER 4 9 CHAPTER 5 13 CHAPTER 6 18 CHAPTER 7 22 CHAPTER 8 27 CHAPTER 9 31 CHAPTER 10 35 CHAPTER 11 38 CHAPTER 12 41 APPENDIX A 44 APPENDIX B 49 APPENDIX C 51 List of solution files available with the Instructor Resource material: CHAPTER 1 Introduction to Project Management Discussion Questions 1. Why is there a new or renewed interest in the field of project management? More and more projects are being done by a variety of organizations. The projects are more complex and often involve the use of new technologies. Organizations are struggling to find better ways to manage their projects. 2. What is a project? How is it different from what most people do in their day-to-day jobs? A project is “a temporary endeavor undertaken to create a unique product or service” (PMBOK( Guide, 2000, p. 4). Projects are different from day-to-day activities primarily because they have focused goals and definite beginning and ending dates. 3. What is project management? Briefly describe the project management framework. Project management is “the application of knowledge, skills, tools, and techniques to project activities in order to meet project requirements” (PMBOK( Guide, 2000, p. 6). The project management framework graphically...
Words: 31210 - Pages: 125
...are in charge of identifying better ways in which the organization’s systems can meet their needs in a better and more reliable way. IT auditors can basically design new systems by configuring hardware and software programs and they also test the systems to make sure they are working properly. Most IT auditors work in offices, obviously with computer systems. Some IT auditors work with the same company for years making sure the information systems and internal controls work properly. Some other IT auditors work for CPA firms that provide auditing services, and are required to travel to evaluate the information systems of clients. For the most part IT auditors work independently, but when they are assigned to larger and/or complicated projects, they use the collaboration of other peers. James Reinhard, CPA, CIA, CISA, manager of Simon Property Group Inc. who has more than 20 years’ experience in IT and integrated auditing states that “The ideal IT auditor should be able to discuss IP routing with the network folks in one hour and financial statement disclosures with the controller in the next” (Scharf, 2008). To become the ideal IT auditor IT audit certifications are the best option. IT audit certifications have become preferred requirements from employers and government organizations because of reliability, reason why employers put more emphasis in recruiting IT auditors with a professional certificate. When preparing to obtain a certification, students learn about standards...
Words: 5614 - Pages: 23
...IT1115 Introduction to Information Technology Syllabus Credit hours: 6.0 Contact/Instructional hours: 70 (50 Theory, 20 Lab) IT1115 Introduction to Information Technology Syllabus COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections...
Words: 12527 - Pages: 51
...Project Management Project Management Assembled by Carter McNamara, MBA, PhD | Applies to nonprofits and for-profits unless noted Leaders Circles peer-training/coaching groups (nonprofits) | Authenticity Circles peertraining/coaching (for-profits) First-timers | Library home page | Library index of topics | Contact us Project management is a carefully planned and organized effort to accomplish a specific (and usually) one-time effort, for example, construct a building or implement a new computer system. Project management includes developing a project plan, which includes defining project goals and objectives, specifying tasks or how goals will be achieved, what resources are need, and associating budgets and timelines for completion. It also includes implementing the project plan, along with careful controls to stay on the "critical path", that is, to ensure the plan is being managed according to plan. Project management usually follows major phases (with various titles for these phases), including feasibility study, project planning, implementation, evaluation and support/maintenance. (Program planning is usually of a broader scope than project planning, but not always.) Categories of information include Overviews of Project Management Useful Skills -- Team Building and Group Leadership General Resources Related Library Links (including many other types of planning) On-Line Discussion Groups Various Perspectives What is Project Management? Overview...
Words: 46068 - Pages: 185
...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past 15 years. Previously, she worked for Digital Equipment Corporation (DEC) in Elk Grove, Illinois. She holds a Bachelor of Science from the University of Wisconsin-Parkside in Math and Economics with a minor in Computer Science and a MBA from the University of Wisconsin-Eau Claire. Shari’s current industry certifications include: Comptia Server+, Linux+, A+, Network+, and i-Net+. Her past certifications include: MCSE-NT 4.0, CCNA, and Pathworks for Macintosh. She is a Cisco Certified Instructor for Cisco’s Network Academy and teaches the CCNA curriculum. She is the author of Advanced WordPerfect Using Macro Power: A Guide for VMS and DOS Users from Digital Press. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft in...
Words: 12317 - Pages: 50
...ork2012 - 2013 Catalog A Message from the President “Sullivan University is truly a unique and student success focused institution.” I have shared that statement with numerous groups and it simply summarizes my basic philosophy of what Sullivan is all about. When I say that Sullivan is “student success focused,” I feel as President that I owe a definition of this statement to all who are considering Sullivan University. First, Sullivan is unique among institutions of higher education with its innovative, career-first curriculum. You can earn a career diploma or certificate in a year or less and then accept employment while still being able to complete your associate, bachelor’s, master’s or doctoral degree by attending during the day, evenings, weekends, or online. Business and industry do not expand or hire new employees only in May or June each year. Yet most institutions of higher education operate on a nine-month school year with almost everyone graduating in May. We remained focused on your success and education, and continue to offer our students the opportunity to begin classes or to graduate four times a year with our flexible, year-round full-time schedule of classes. If you really want to attend a school where your needs (your real needs) come first, consider Sullivan University. I believe we can help you exceed your expectations. Since words cannot fully describe the atmosphere at Sullivan University, please accept my personal invitation to visit and experience...
Words: 103133 - Pages: 413