ITS - Information Technology Systems

ITS 110  Introduction to Networking and Cabling: 3 Credits (2 Lec, 1 Lab)

Provides student current and emerging network technology information and hands-on exposure to networking skills, that will empower them to enter employment or further education and training in the computer networking field.

View Course Outcomes:

  1. Describe fundamental concepts and design of network communication;
  2. Set up a personal computer system, including the operating system, interface cards, ;peripheral devices and basic network design;
  3. Plan and apply a home or small business network and connect it to the Internet;
  4. Define general terminology associated with networking and data transmission ;including topologies, media, protocols and architecture;
  5. Compute and assign IP addresses in a sub-netted network;
  6. Configure basic IP services through a GUI;
  7. Analyze and troubleshoot network and Internet connectivity;
  8. Detect and mitigate security threats to a home network.

ITS 125  Fundamentals of Voice and Data Cabling: 3 Credits (2 Lec, 1 Lab)

(F) This course covers cabling issues related to data and voice connections. Students will learn about industry and worldwide standards, types of media and cabling, physical and logical networks, and signal transmission in preparation for the BICSI Registered Installer exam.

View Course Outcomes:

  1. Perform various types of terminations on Category 5 cable
  2. Demonstrate ability to pull cable down a prescribed path and fish cable through a wall or conduit
  3. Demonstrate proper use of voltage testers, cable certifiers, toners and testers
  4. Demonstrate dressing cable in trays and applying wire management procedures
  5. Model a punch down of Category 5 and 6 patch panels
  6. Demonstrate how visual inspection methods are used to determine potential problems troubleshooting and support

ITS 142  CCNA 2: Discovery: 4 Credits (2 Lec, 2 Lab)

Students will learn basic design, configuration, and troubleshooting of routers and switches to resolve common issues in small to medium networks. Students learn how to configure a router and a switch for basic functionality.

View Course Outcomes:

  1. Describe the structure of the Internet and how communication occurs between hosts;
  2. Install, configure, and troubleshoot Cisco IOS devices;
  3. Plan a basic wired infrastructure to support network traffic;
  4. Configure a server to share resources and provide common web services;
  5. Implement basic WAN connectivity using Telco services;
  6. Demonstrate proper disaster-recovery procedures and perform server backups.

ITS 163  Windows and Configuration: 4 Credits (2 Lec, 2 Lab)

Intensive introduction to multitasking operating systems and network operating systems. Operating system upgrades/configuration, installation procedures, security issues, backup procedures, remote access, command line, and graphical user interfaces. Second of a two-course sequence covering the A+ certification objectives.

View Course Outcomes:

  1. Install, configure, and maintain notebook computer components
  2. Detect problems, troubleshoot, and repair/replace notebook computer components
  3. Select and use proper computer repair and maintenance tools
  4. Detect and resolve common printer issues
  5. Select appropriate commands and options to troubleshoot problems
  6. Differentiate between Windows Operating System directory structures
  7. Troubleshoot post installation issues using appropriate tools
  8. Apply System Recovery techniques
  9. Evaluate , install and configure a Windows Operating Systems
  10. Prevent, troubleshoot, and remove viruses and malware
  11. Implement security and troubleshoot common issues
  12. Update antivirus software
  13. Administer user and group accounts
  14. Compare and contrast different Windows operating systems (O.S.)
  15. Demonstrate proper use of user interfaces
  16. Explain the process and steps to install and configure the Windows OS
  17. Explain the basics of boot sequences and startup utilities

ITS 164  Networking Fundamentals: 3 Credits (2 Lec, 1 Lab)

This course is an introduction to networking fundamentals with both lecture and hands-on activities. Topics include the OSI model and industry standards, network topologies, IP addressing (including subnet masks), and basic network design. Concepts are reinforced with lab activities using equipment in live and simulated environments.

View Course Outcomes:

  1. Identify functions of the OSI and TCP/IP reference models and related protocols;
  2. Define, name, and identify networking media and understand how it is integrated into local area networks (LAN) and wide area networks (WAN) ;
  3. Describe network hardware including layer 1, 2, and 3 devices;
  4. Differentiate physical and logical network topologies;
  5. Analyze and apply IP addressing;
  6. Identify subnetting and how subnets are calculated and applied;
  7. Explain the relationship between ports, protocols, and firewall configurations;
  8. Outline network operating systems;
  9. Prepare and execute connectivity testing using ping and tracert;
  10. Perform LAN setup and connectivity testing;
  11. Complete small WAN setup and testing using static and dynamic routing protocols.

ITS 170  Microsoft Windows Serve: 4 Credits (2 Lec, 2 Lab)

This course gives you in-depth coverage of the 70-740 certification exam objectives and focuses on the skills you need to install and configure Windows Server 2016. After you finish this course, you’ll have an in-depth knowledge of Windows Server 2016, including installation, local and remote management, file and storage services, Active Directory, group policies, TCP/IP, networking services, and Hyper-V virtualization.

View Course Outcomes:

  1. Select appropriate Server Edition
  2. Perform initial installation
  3. Perform Post installation tasks
  4. Determine appropriate upgrade path
  5. Determine appropriate Server Roles
  6. Determine number of serves needed
  7. Estimate storage requirements
  8. Assign permissions
  9. Configure Volume Shadow Copy
  10. Configure Storage Pools
  11. Install Hyper-V
  12. Use Hyper-V Manager
  13. Create Virtual Machine
  14. Create virtual disk
  15. Understand Active Directory Architecture
  16. Install Active Directory Domain Services Role
  17. Configure Global Catalog
  18. Make use of Active Directory Administrative Center
  19. Describe Group Policy
  20. Make use of Group Policy Console
  21. Create GPO's (Group Policy Objects)
  22. Configure Security Policies using Group Policy and
  23. Perform User account administrative tasks.

ITS 191  Special Topics: Salesforce Operations: 3 Credits (3 Lec)

PREREQUISITES: ITS 100 Salesforce Fundamentals
ITS 200 Salesforce Operations is the second of two Salesforce courses offered by Gallatin College. This course provides students skills to communicate the technical capabilities within the Salesforce platform. After students explore the seven course objectives, they will select two technologies to gain an in-depth study. The course curriculum incorporates hands-on introduction and training to the Salesforce platform, including configuration, reporting, and use. Students who enroll in this course will learn the fundamentals of the Salesforce platform, data-driven optimization and solutions, effective reporting, and more.

ITS 218  Network Security: 3 Credits (1 Lec, 2 Lab)

Security baselines, network infrastructure security, web security, cryptography, operations security, and security management. CompTIA Security+ certification objectives.

View Course Outcomes:

  1. 1. Define foundational computer and information security terms and concepts.
     Define information security
     Explain the importance of information security
     Describe the CompTIA Security+ exam requirements
     Describe information security careers
    2. Explain computer and information security principles.
     Identify who is responsible for information security
     Describe effective authentication methods
     Explain access control methods
     Describe information security schemes
    3. Describe the processes required for establishing security baselines.
     Explain how to disable nonessential services
     Describe the process of hardening an operating system
     Describe the process of hardening an application
     Describe the process of hardening a network
    4. Define the process of securing a network infrastructure.
     Explain the process of securing a network cable plant
     Describe how to secure removable media
     Design secure network topologies
    5. Identify the processes required for protecting advanced communications.
     Describe the process of securing email systems
     Identify World Wide Web vulnerabilities and security methods
     Describe how to harden the File Transport Protocol
     Describe how to provide secure remote access
     Describe how to protect directory services
     Describe how to secure wireless local area networks
    6. Describe the process of cryptography and key management.
     Define cryptography
     Explain hashing algorithms
     Differentiate between symmetric and asymmetric encryption
     Explain how to use cryptography
     Define public key infrastructure
     Explain digital certificates
     Describe key management processes
    7. Explain system security management processes.
     Describe the access control methods used for physical security
     Explain social engineering
     Define disaster recovery and business continuity planning
     Describe the security policy cycle
     Explain risk identification and management
     Define compliance monitoring and evaluation
     Define identity and privilege management

ITS 221  Project Management: 3 Credits (2 Lec, 1 Lab)

(Sp) Covers ten project management knowledge areas and five process groups to information technology projects. Project management includes project integration, scope, time, cost, quality, human resources, communication, risk, procurement, and stakeholder management. Process groups cover initiating, planning, executing, monitoring/controlling, and closing.

View Course Outcomes:

  1. Describe the genesis of project management and its importance to improving the success of information technology projects
  2. Explain and apply knowledge of project management theory, terms, and techniques
  3. Apply project management concepts using Microsoft Project and other software to help plan and manage a small project

ITS 224  Introduction to Linux: 4 Credits (2 Lec, 2 Lab)

(F, Sp) Cybersecurity students only. This course is intended for students who want to learn about the Linux operating system and prepare to pass the Linux+ certification exam from CompTIA (Powered by LPI). It does not assume any prior knowledge of Linux and is geared toward those interested in systems administration as well as those who will use or develop programs for Linux systems. The course provides comprehensive coverage of topics related to Linux certification, including Linux distributions, installation, administration, X-Windows, networking, and security.

View Course Outcomes:

  1. Identify issues related to a Unix account
  2. Make use of a Linux account
  3. Use a Linux system
  4. Modify files and directories using basic commands
  5. Make use of the terminal window
  6. Use the help features
  7. Identify the Linux file system
  8. Describe concepts related to the Windows operating system
  9. Demonstrate use of graphical interfaces
  10. Use a graphical login
  11. Use basic system administration commands
  12. Maintain file systems on a Linux server
  13. Manage Linux server processes using basic commands
  14. Make use of the proc/file system to learn about system status
  15. Use the ps (process status) and related commands to control how processes use system resources
  16. Analyze physical and virtual memory usage
  17. Locate and relieve system bottlenecks
  18. Explain how the printing system operates
  19. Monitor printing using command line utilities
  20. Manage printing on a busy system

ITS 250  CCNA 3: Exploration: 3 Credits (2 Lec, 1 Lab)

PREREQUISITE: ITS 142. (F) Offered fall (first 8 weeks). Covers router configurations including advanced IP addressing techniques, variable length subnet masking, intermediate routing protocols, Ethernet switching, virtual LANs, spanning-tree protocol, and VLAN trucking protocol

View Course Outcomes:

  1. Configure and troubleshoot DHCP and DNS operations for IPv4 and IPv6
  2. Describe the operations and benefits of the Spanning Tree Protocol (STP)
  3. Configure and troubleshoot STP operations
  4. Describe the operations and benefits of link aggregation and Cisco VLAN Trunk Protocol (VTP)
  5. Configure and troubleshoot STP, and RSTP
  6. Configure and troubleshoot basic operations of routers in a complex routed network for IPv4 and IPv6 using single-area OSPF, multi-area OSPF, and EIGRP
  7. Configure and troubleshoot advanced operations of routers and implement RIP, OSPF, and\\nEIGRP routing protocols for IPv4 and IPv6\\n
  8. Manage Cisco IOS software licensing and configuration files

ITS 252  CCNA 4: Exploration: 3 Credits (2 Lec, 1 Lab)

(F) Project-based course in wide-area networking including advanced IP addressing techniques, network address translation, port address translation, DHCP, WAN technology and terminology, PPP, ISDN, DDR, Frame Relay, network management, and introduction to optical networking.

View Course Outcomes:

  1. Describe different WAN technologies and their benefits
  2. Describe the operations and benefits of virtual private networks (VPNs) and tunneling
  3. Configure and troubleshoot serial connections
  4. Configure and troubleshoot broadband connections
  5. Configure and troubleshoot IPSec tunneling operations
  6. Monitor and troubleshoot network operations using syslog, SNMP, and Netflow\\n
  7. Design borderless networks
  8. Design data centers and virtualization
  9. Design collaboration technology and solutions

ITS 271  Securing Desktop/Mobile Devices: 4 Credits (2 Lec, 2 Lab)

This course is an introduction to technologies, terminology, and skills used in the world of mobile security. Students will learn to apply best practices, examine security trends, and secure mobile device within the network.

View Course Outcomes:

  1. Evaluate and apply best practices in client/server security, including but not limited to authentication, transmission, operating system hardening, auditing, access control, and encryption
  2. Identify and classify malware by threat type, method of introduction, and protection strategies
  3. Evaluate the advantages and exposures of current communication technologies, including wired, wireless, remote access, and protocol-level choices
  4. Assess the strengths and weaknesses of cloud-based computing technologies, including public, private, and hybrid configurations
  5. Examine security trends and vulnerabilities in mobile computing devices· Develop best-practices toolkits for effective management of devices.

ITS 272  Cyber Defense: 3 Credits (2 Lec, 1 Lab)

Information security and risk management, access controls, application security, disaster recovery planning, cryptography, capstone project and legal aspects of information security.

ITS 274  Ethical Hacking and Network Defense: 3 Credits (2 Lec, 1 Lab)

This course provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking.

View Course Outcomes:

  1. By understanding of mindset of a hacker, students will be able to anticipate the routes and methods used to penetrate to computer system or network.
  2. Understand and apply network protocols to evaluate how hackers exploit vulnerabilities.
  3. Develop custom tools and utilize existing security tools to identify security weakness.
  4. Identify specific weaknesses in operating systems and how to exploit the weaknesses.
  5. Conduct Reconnaissance, Gaining Access, Enumeration, and Maintain Access to systems.
  6. Identify threats and determine the source of the threat.
  7. Develop reports and diagrams to effectively communicate threats and security weaknesses to management.
  8. Use security tools to identify potentials vulnerabilities.
  9. Capture network packets and identifies patterns that may suggest specific threats
  10. Review operating systems accessibility and ensure account enumeration is blocked
  11. Identify social engineering threats.
  12. Use Linux Kali to better understand penetration testing and how exploits are delivered.

ITS 279  Cloud Systems: 3 Credits (2 Lec, 1 Lab)

(Sp) This course is designed to introduce foundational cloud-based learning and provide the skills needed to manage and configure Microsoft on-premises servers. From there, students will learn how to integrate their on-premises environment with Microsoft Azure cloud services.

View Course Outcomes:

  1. Explain cloud concepts including architectures, networking and storage technologies, cloud services, and use cases
  2. Explain cloud business and financial models, their benefits and challenges\\n
  3. Create and provision cloud resources including data storage, server resources, user and resource access, and monitor access and use
  4. Explain cloud security including weaknesses and tools to evaluate security
  5. Utilize security tools to evaluate cloud security

ITS 280  Computer Repair Maintenance: 4 Credits (4 Lec)

(F) This course teaches advanced hardware theory and practical application with the emphasis on individual computer components. Successful students will know how to identify and install appropriate computer hardware.

ITS 291  Special Topics: 1-4 Credits ()

Repeatable up to 15 credits.

ITS 299  Capstone: 3 Credits (2 Lec, 1 Lab)

(Sp) The capstone course allows students to integrate previously completed coursework for associate degrees in Networking Technology or Cyber-Security. Students will complete approved academic projects and reports that demonstrate mastery of their program of study in accordance with required degree outcomes.

View Course Outcomes:

  1. Apply project management concepts using appropriate software to help plan and manage a small project
  2. Demonstrate understanding and apply knowledge of documentation, devices and VLANs, IP addresses, rack heights, make/ label cables
  3. Demonstrate understanding and apply knowledge of network theory, Linux servers, DHCP and DNS, Routers OSPF, Switches VLANS, Port Security and Firewall structures