College Catalog 2018-19
EAST CENTRAL COMMUNITY COLLEGE
semester hours: two-hour lecture, four hour lab. IST 1163 — DATABASE & SQL CONCEPTS — This course is an introduction to the design and manipulation of relational databases. Emphasis is placed on creation, manipulation, extraction, and display of data from existing databases. QBE and SQL are explored. Three semester hours: two hour lecture, two hour lab. IST 1213 — CLIENT INSTALLATION AND CONFIGURATION — This course is designed to help the student install, support, and troubleshoot a current client operating system. Emphasis will be placed on common user operations as well as the network administrator’s support of the client. Three semester hours: two hour lecture, two hour lab. IST 1223 — NETWORK COMPONENTS — This course presents local area network and wide area network connectivity. It focuses on architectures, topologies, protocols, and transport methods of a network. Three semester hours: two hour lecture, two hour lab. Prerequisite: IST 1134 Fundamentals of Data Communications or CNT 1414. IST 1234 — NETWORK ADMINISTRATION USING NOVELL — This course focuses on the management of a computer network using the Novell network operating system. Emphasis will be placed on daily administrative tasks performed by a network administrator. Four semester hours: two-hour lecture, four hour lab. IST 1244 —NETWORKADMINISTRATION USING MICROSOFT WINDOWS SERVER — This course focuses on the management of a computer network using the Microsoft Windows Server network operating system. Emphasis will be placed on daily administrative tasks performed by a network administrator. Four semester hours: two-hour lecture, four hour lab. IST 1254 — NETWORK ADMINISTRATION USING LINUX — This course focuses on the management of a computer network using the Linux operating system. Emphasis is placed on installation, configuration, implementation, and administrative tasks of a functional server. Four semester hours: two-hour lecture, four hour lab. IST 1314 — VISUAL BASIC PROGRAMMING LANGUAGE — This introduction to the Visual BASIC programming language introduces the student to object-oriented programming and a graphical integrated development environment. Four semester hours: two-hour lecture, four hour lab. IST 1514—SQLPROGRAMMING—This course is the first of a two-part series that offers students an extensive introduction to data server technology, covering the concepts of both relational and object relational databases and the Structured Query Language (SQL). Students are taught to store, retrieve, and manipulate data. Four semester hours: two-hour lecture, four hour lab. IST 1613—COMPUTERFORENSICS—This course is an introduction to the various technical and administrative aspects of computer forensics and the laws pertaining to the cybercrime. This course provides the foundation for understanding the key issues associated with computer forensic investigations, understanding the boot processes, and disk structure for multiple operating systems, and understanding the processes related to data acquisition during investigations (3 sch: 2 hr lecture, 2 hr lab). IST 1623 —NETWORK SECURITY FUNDAMENTALS —This course provides the fundamental understanding of network security principles, implementations and the technologies and principles involved in creating a secure computer network environment. Topics include authentication, types of attacks and malicious code against Web applications, e-mail, and file and print services (4 sch: 2 hr lecture, 2 hr lab). (Prerequisites: Instructor Approved). IST 1633 — WIRELESS SECURITY AND PRIVACY — This course provides the fundamental understanding of wireless architecture, security principles, and the technologies and principles involved in creating a secure wireless computer network environment. Topics include wireless hardware, protocols, encryption, and how to prevent weaknesses in wireless technology (3 sch: 2 hr lecture, 2 hr lab). (Prerequisite: InstructorApproved). IST 1643 — NETWORK DEFENSE AND COUNTERMEASURES — This course provides a solid foundation of network security and the understanding of the process to create a network defense and countermeasure policy obtained from intrusion detection. Topics include NetworkAddress Translation, packet filtering, proxy
170
Made with FlippingBook - Online catalogs