powered by
Center for Curriculum and Transfer Articulation
Major: 5908
First Term: 2018 Fall   
Award: CCL  
Total Credits: 17
CIP Code: 11.1003
Occupational Area: Information Technology

Instructional Council: Computer Information Systems (12)
GPA: 2.5
SOC Code:

Description: The Certificate of Completion (CCL) in Network and Cyber Fundamentals program is designed to focus on the necessary skills required to design and secure a network including the security of various systems and network devices. Emphasis is placed on developing the theoretical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of essential security disciplines. The Network and Cyber Fundamentals program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry and government. An Associate in Applied Science (AAS) is also available in this area.

Suggested Course Plan Sequenced by Semester

Required Courses
CIS126DL Linux Operating System 3
MST150++ Microsoft Windows (any MST150 level suffixed course) 3
CNT140AA Introduction to Networks 4
+CNT150AA Cisco-Routing and Switching Essentials 4

+CIS270 Essentials of Network and Information Security (3) OR
+ITS110 Information Security Fundamentals (3) 3
Credits: 17

Program Competencies
1. Experiment with file and directory systems, file and directory permissions, text editors, file processing, and basic shell programming of the Linux operating system. (CIS126DL)
2. Install, configure, administer, use, and maintain a UNIX/Linux operating system. (CIS126DL)
3. Execute day-to-day administration tasks in a UNIX/Linux-based network. (CIS126DL)
4. Manage the Linux Operating Systems including sophisticated manipulation of file structures, backup systems, printing processes, troubleshooting, user account management, hard disk maintenance and configuration, process monitoring and prioritizing, kernel customization, and system resource control. (CIS126DL)
5. Perform day-to-day administration tasks in a UNIX/Linux-based network. (CIS126DL)
6. Perform and explain day-to-day administration tasks in a Microsoft Windows-based network. (MST150++)
7. Apply basic security techniques such as password protection and access control lists (ACLs). (MST150++)
8. Configure basic network devices, design IP addressing schemes and test various network standards, protocols and technologies. (CNT140AA)
9. Troubleshoot using the Open Systems Interconnection (OSI) model as a guide. (CNT140AA, CNT150AA)
10. Formulate and test appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network. (CNT140AA)
11. Install, configure, customize, maintain and troubleshoot Cisco routers utilizing Advanced Internet Protocol (IP) addressing techniques, Variable Length Subnet Masking (VLSM), distance vector and Link State dynamic routing protocols, Routing Information Protocol version 1 (RIPv1) and version 2 (RIPv2), Enhanced Interior Gateway Routing Protocol (EIGRP), Single-area Open Shortest Path First (OSPF), and understanding the structure and behavior of routing tables. (CNT150AA)
12. Minimize threats to the security of information systems by using authentication methods, access control, cryptography, Public Key Infrastructure (PKI), hardening of operating systems, infrastructure security, network security (including remote access and wireless), and the use of basic security tools. (ITS110, CIS270)
13. Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs. (ITS110)
14. Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices
and security peripherals. (ITS110)
15. Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device
hardening, securing remote access and wireless technologies including viruses and worms (ITS110)
MCCCD Governing Board Approval Date: June 26, 2018

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.