ITS - Information Technology Systems
ITS 110 Introduction to Networking and Cabling: 3 Credits (2 Lec, 1 Lab)
Provides student current and emerging network technology information and hands-on exposure to networking skills, that will empower them to enter employment or further education and training in the computer networking field.
View Course Outcomes:
- Describe fundamental concepts and design of network communication;
- Set up a personal computer system, including the operating system, interface cards, ;peripheral devices and basic network design;
- Plan and apply a home or small business network and connect it to the Internet;
- Define general terminology associated with networking and data transmission ;including topologies, media, protocols and architecture;
- Compute and assign IP addresses in a sub-netted network;
- Configure basic IP services through a GUI;
- Analyze and troubleshoot network and Internet connectivity;
- Detect and mitigate security threats to a home network.
ITS 125 Fundamentals of Voice and Data Cabling: 3 Credits (2 Lec, 1 Lab)
(F) This course covers cabling issues related to data and voice connections. Students will learn about industry and worldwide standards, types of media and cabling, physical and logical networks, and signal transmission in preparation for the BICSI Registered Installer exam.
View Course Outcomes:
- Perform various types of terminations on Category 5 cable
- Demonstrate ability to pull cable down a prescribed path and fish cable through a wall or conduit
- Demonstrate proper use of voltage testers, cable certifiers, toners and testers
- Demonstrate dressing cable in trays and applying wire management procedures
- Model a punch down of Category 5 and 6 patch panels
- Demonstrate how visual inspection methods are used to determine potential problems troubleshooting and support
ITS 142 CCNA 2: Discovery: 4 Credits (2 Lec, 2 Lab)
Students will learn basic design, configuration, and troubleshooting of routers and switches to resolve common issues in small to medium networks. Students learn how to configure a router and a switch for basic functionality.
View Course Outcomes:
- Describe the structure of the Internet and how communication occurs between hosts;
- Install, configure, and troubleshoot Cisco IOS devices;
- Plan a basic wired infrastructure to support network traffic;
- Configure a server to share resources and provide common web services;
- Implement basic WAN connectivity using Telco services;
- Demonstrate proper disaster-recovery procedures and perform server backups.
ITS 163 Windows and Configuration: 4 Credits (2 Lec, 2 Lab)
Intensive introduction to multitasking operating systems and network operating systems. Operating system upgrades/configuration, installation procedures, security issues, backup procedures, remote access, command line, and graphical user interfaces. Second of a two-course sequence covering the A+ certification objectives.
View Course Outcomes:
- Install, configure, and maintain notebook computer components
- Detect problems, troubleshoot, and repair/replace notebook computer components
- Select and use proper computer repair and maintenance tools
- Detect and resolve common printer issues
- Select appropriate commands and options to troubleshoot problems
- Differentiate between Windows Operating System directory structures
- Troubleshoot post installation issues using appropriate tools
- Apply System Recovery techniques
- Evaluate , install and configure a Windows Operating Systems
- Prevent, troubleshoot, and remove viruses and malware
- Implement security and troubleshoot common issues
- Update antivirus software
- Administer user and group accounts
- Compare and contrast different Windows operating systems (O.S.)
- Demonstrate proper use of user interfaces
- Explain the process and steps to install and configure the Windows OS
- Explain the basics of boot sequences and startup utilities
ITS 164 Networking Fundamentals: 3 Credits (2 Lec, 1 Lab)
This course is an introduction to networking fundamentals with both lecture and hands-on activities. Topics include the OSI model and industry standards, network topologies, IP addressing (including subnet masks), and basic network design. Concepts are reinforced with lab activities using equipment in live and simulated environments.
View Course Outcomes:
- Identify functions of the OSI and TCP/IP reference models and related protocols;
- Define, name, and identify networking media and understand how it is integrated into local area networks (LAN) and wide area networks (WAN) ;
- Describe network hardware including layer 1, 2, and 3 devices;
- Differentiate physical and logical network topologies;
- Analyze and apply IP addressing;
- Identify subnetting and how subnets are calculated and applied;
- Explain the relationship between ports, protocols, and firewall configurations;
- Outline network operating systems;
- Prepare and execute connectivity testing using ping and tracert;
- Perform LAN setup and connectivity testing;
- Complete small WAN setup and testing using static and dynamic routing protocols.
ITS 170 Microsoft Windows Serve: 4 Credits (2 Lec, 2 Lab)
(F, Sp) Cybersecurity students only. This course gives you in-depth coverage of the 70-740 certification exam objectives and focuses on the skills you need to install and configure Windows Server 2016. After you finish this course, you’ll have an in-depth knowledge of Windows Server 2016, including installation, local and remote management, file and storage services, Active Directory, group policies, TCP/IP, networking services, and Hyper-V virtualization.
View Course Outcomes:
- Operate Windows Server 2012/R2.
- Install Windows Server 2012/R2 onto various systems.
- Structure Local and Remote Server Management.
- Configure Server Storage.
- Set up File and Printer Services.
- Summarize Active Directory.
- Manage OUs and Active Directory Accounts.
- Configure Group Policies.
- Configure TCP/IP.
- Configure DNS.
- Configure Dynamic Host Configuration Protocol.
- Configure Virtualization with Hyper-V.
ITS 191 Special Topics: Salesforce Operations: 3 Credits (3 Lec)
PREREQUISITES: ITS 100 Salesforce Fundamentals
ITS 200 Salesforce Operations is the second of two Salesforce courses offered by Gallatin College. This course provides students skills to communicate the technical capabilities within the Salesforce platform. After students explore the seven course objectives, they will select two technologies to gain an in-depth study. The course curriculum incorporates hands-on introduction and training to the Salesforce platform, including configuration, reporting, and use. Students who enroll in this course will learn the fundamentals of the Salesforce platform, data-driven optimization and solutions, effective reporting, and more.
ITS 218 Network Security: 3 Credits (1 Lec, 2 Lab)
Security baselines, network infrastructure security, web security, cryptography, operations security, and security management. CompTIA Security+ certification objectives.
View Course Outcomes:
- <p>1. Define foundational computer and information security terms and concepts.<br /> Define information security<br /> Explain the importance of information security<br /> Describe the CompTIA Security+ exam requirements<br /> Describe information security careers<br /> 2. Explain computer and information security principles.<br /> Identify who is responsible for information security<br /> Describe effective authentication methods<br /> Explain access control methods<br /> Describe information security schemes<br /> 3. Describe the processes required for establishing security baselines.<br /> Explain how to disable nonessential services<br /> Describe the process of hardening an operating system<br /> Describe the process of hardening an application<br /> Describe the process of hardening a network<br /> 4. Define the process of securing a network infrastructure.<br /> Explain the process of securing a network cable plant<br /> Describe how to secure removable media<br /> Design secure network topologies<br /> 5. Identify the processes required for protecting advanced communications.<br /> Describe the process of securing email systems<br /> Identify World Wide Web vulnerabilities and security methods<br /> Describe how to harden the File Transport Protocol<br /> Describe how to provide secure remote access<br /> Describe how to protect directory services<br /> Describe how to secure wireless local area networks<br /> 6. Describe the process of cryptography and key management.<br /> Define cryptography<br /> Explain hashing algorithms<br /> Differentiate between symmetric and asymmetric encryption<br /> Explain how to use cryptography<br /> Define public key infrastructure<br /> Explain digital certificates<br /> Describe key management processes<br /> 7. Explain system security management processes.<br /> Describe the access control methods used for physical security<br /> Explain social engineering<br /> Define disaster recovery and business continuity planning<br /> Describe the security policy cycle<br /> Explain risk identification and management<br /> Define compliance monitoring and evaluation<br /> Define identity and privilege management</p>
ITS 221 Project Management: 3 Credits (2 Lec, 1 Lab)
(Sp) Covers ten project management knowledge areas and five process groups to information technology projects. Project management includes project integration, scope, time, cost, quality, human resources, communication, risk, procurement, and stakeholder management. Process groups cover initiating, planning, executing, monitoring/controlling, and closing.
View Course Outcomes:
- Describe the genesis of project management and its importance to improving the success of information technology projects
- Explain and apply knowledge of project management theory, terms, and techniques
- Apply project management concepts using Microsoft Project and other software to help plan and manage a small project
ITS 224 Introduction to Linux: 4 Credits (2 Lec, 2 Lab)
(F, Sp) Cybersecurity students only. This course is intended for students who want to learn about the Linux operating system and prepare to pass the Linux+ certification exam from CompTIA (Powered by LPI). It does not assume any prior knowledge of Linux and is geared toward those interested in systems administration as well as those who will use or develop programs for Linux systems. The course provides comprehensive coverage of topics related to Linux certification, including Linux distributions, installation, administration, X-Windows, networking, and security.
View Course Outcomes:
- Learn how to login to a Linux server, making use of a Linux account, and using a Linux system as well as identify issues related to a Unix account.
- Run a Linux system by modifying files and directories using basic commands, making use of the terminal window, and using the help features.
- Use graphical systems by describing concepts related to the Windows operating system, demonstrating use of graphical interfaces, and using a graphical login.
- Manage administration tasks, including basic system administration commands, maintaining file systems on a Linux server, and managing Linux server processes using basic commands.
- Manage system resources by making use of the proc/file system, understanding system status, using the ps (process status) and related commands to control how processes use system resources, analyzing physical and virtual memory usage, and locate and relieve system bottlenecks.
- Operate a printing system by using command line utilities on a busy system.
ITS 250 CCNA 3: Exploration: 3 Credits (2 Lec, 1 Lab)
PREREQUISITE: ITS 142. (F) Offered fall (first 8 weeks). Covers router configurations including advanced IP addressing techniques, variable length subnet masking, intermediate routing protocols, Ethernet switching, virtual LANs, spanning-tree protocol, and VLAN trucking protocol
View Course Outcomes:
- Configure and troubleshoot DHCP and DNS operations for IPv4 and IPv6
- Describe the operations and benefits of the Spanning Tree Protocol (STP)
- Configure and troubleshoot STP operations
- Describe the operations and benefits of link aggregation and Cisco VLAN Trunk Protocol (VTP)
- Configure and troubleshoot STP, and RSTP
- Configure and troubleshoot basic operations of routers in a complex routed network for IPv4 and IPv6 using single-area OSPF, multi-area OSPF, and EIGRP
- Configure and troubleshoot advanced operations of routers and implement RIP, OSPF, andEIGRP routing protocols for IPv4 and IPv6
- Manage Cisco IOS software licensing and configuration files
ITS 252 CCNA 4: Exploration: 3 Credits (2 Lec, 1 Lab)
(F) Project-based course in wide-area networking including advanced IP addressing techniques, network address translation, port address translation, DHCP, WAN technology and terminology, PPP, ISDN, DDR, Frame Relay, network management, and introduction to optical networking.
View Course Outcomes:
- Describe different WAN technologies and their benefits
- Describe the operations and benefits of virtual private networks (VPNs) and tunneling
- Configure and troubleshoot serial connections
- Configure and troubleshoot broadband connections
- Configure and troubleshoot IPSec tunneling operations
- Monitor and troubleshoot network operations using syslog, SNMP, and Netflow
- Design borderless networks
- Design data centers and virtualization
- Design collaboration technology and solutions
ITS 271 Securing Desktop/Mobile Devices: 4 Credits (2 Lec, 2 Lab)
This course is an introduction to technologies, terminology, and skills used in the world of mobile security. Students will learn to apply best practices, examine security trends, and secure mobile device within the network.
View Course Outcomes:
- Evaluate and apply best practices in client/server security, including but not limited to authentication, transmission, operating system hardening, auditing, access control, and encryption
- Identify and classify malware by threat type, method of introduction, and protection strategies
- Evaluate the advantages and exposures of current communication technologies, including wired, wireless, remote access, and protocol-level choices
- Assess the strengths and weaknesses of cloud-based computing technologies, including public, private, and hybrid configurations
- Examine security trends and vulnerabilities in mobile computing devices· Develop best-practices toolkits for effective management of devices.
ITS 272 Cyber Defense: 3 Credits (2 Lec, 1 Lab)
Information security and risk management, access controls, application security, disaster recovery planning, cryptography, capstone project and legal aspects of information security.
ITS 274 Ethical Hacking and Network Defense: 3 Credits (2 Lec, 1 Lab)
This course provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking.
View Course Outcomes:
- By understanding of mindset of a hacker, students will be able to anticipate the routes and methods used to penetrate to computer system or network.
- Understand and apply network protocols to evaluate how hackers exploit vulnerabilities.
- Develop custom tools and utilize existing security tools to identify security weakness.
- Identify specific weaknesses in operating systems and how to exploit the weaknesses.
- Conduct Reconnaissance, Gaining Access, Enumeration, and Maintain Access to systems.
- Identify threats and determine the source of the threat.
- Develop reports and diagrams to effectively communicate threats and security weaknesses to management.
- Use security tools to identify potentials vulnerabilities.
- Capture network packets and identifies patterns that may suggest specific threats
- Review operating systems accessibility and ensure account enumeration is blocked
- Identify social engineering threats.
- Use Linux Kali to better understand penetration testing and how exploits are delivered.
ITS 279 Cloud Systems: 3 Credits (2 Lec, 1 Lab)
(Sp) This course is designed to introduce foundational cloud-based learning and provide the skills needed to manage and configure Microsoft on-premises servers. From there, students will learn how to integrate their on-premises environment with Microsoft Azure cloud services.
View Course Outcomes:
- Explain cloud concepts including architectures, networking and storage technologies, cloud services, and use cases
- Explain cloud business and financial models, their benefits and challenges
- Create and provision cloud resources including data storage, server resources, user and resource access, and monitor access and use
- Explain cloud security including weaknesses and tools to evaluate security
- Utilize security tools to evaluate cloud security
ITS 280 Computer Repair Maintenance: 4 Credits (4 Lec)
(F) This course teaches advanced hardware theory and practical application with the emphasis on individual computer components. Successful students will know how to identify and install appropriate computer hardware.
ITS 291 Special Topics: 1-4 Credits ()
Repeatable up to 15 credits.
ITS 299 Capstone: 3 Credits (2 Lec, 1 Lab)
(Sp) The capstone course allows students to integrate previously completed coursework for associate degrees in Networking Technology or Cyber-Security. Students will complete approved academic projects and reports that demonstrate mastery of their program of study in accordance with required degree outcomes.
View Course Outcomes:
- Apply project management concepts using appropriate software to help plan and manage a small project
- Demonstrate understanding and apply knowledge of documentation, devices and VLANs, IP addresses, rack heights, make/ label cables
- Demonstrate understanding and apply knowledge of network theory, Linux servers, DHCP and DNS, Routers OSPF, Switches VLANS, Port Security and Firewall structures