National CyberWatch Center Information Security Curricula

Size: px
Start display at page:

Download "National CyberWatch Center Information Security Curricula"

Transcription

1 Natonal CyberWatch Center Informaton Securty Currcula A Complete Soluton for Hgher Educaton Insttutons NATIONALCYBERWATCH.ORG

2 About Natonal CyberWatch Table of contents In October 2016, the Natonal Scence Foundaton (NSF) awarded Prnce George s Communty College a $4.8 mllon Natonal Advanced Technologcal Educaton (ATE) Center contnuaton grant for ts Natonal CyberWatch Center project. The grant allows Natonal CyberWatch to buld on a 10+-year foundaton of success, as evdenced by four successve NSF ATE grants snce Natonal CyberWatch has acheved major natonal mpact n cybersecurty educaton by establshng and valdatng natonal and Federal educaton and tranng standards; creatng an annual conference (Communty College Cyber Summt) focused on cybersecurty educaton at the communty college level; developng and valdatng cybersecurty sklls usng performance-based assessments, whch are scalable across many ndustry certfcatons, currcula, job roles, and vertcals; and buldng new cybersecurty currcula, the frst to algn nstructonal desgn, skll practce facltes, cybersecurty professonal job performance standards, natonal workforce frameworks, and ndustry needs, whch are desperately needed to gude responsble currculum development for the new generaton of Informaton Securty specalsts, to name just a few of the Center s more notable successes. The Center s strategc and leadershp role as the natonal ATE center for cybersecurty s to buld, promote, and coordnate: 1. Programs and servces desgned to attract large numbers of dverse populatons 2. Career readness programs 3. Sklls-based currcula ABOUT NATIONAL CYBERWATCH 02 THE CYBERWATCH DIFFERENCE 04 E-BOOKS 08 CLOUD BASED LAB SOLUTIONS 09 ABOUT THE 6 DEGREE PROGRAMS 10 ABOUT THE 10 CERTIFICATES 18 ABOUT THE 34 TECHNICAL COURSES Collaboraton among ndustry, government, and academa 5. Educatonal, tranng, and assessment standards for the burgeonng Informaton Securty 5. dscplne, and 6. Capacty development 2 3

3 Informaton Securty Currculum When CyberWatch started n 2005, qualty Informaton Securty currculum was n short supply, so the development of new currculum was a necessty. In 2006, CyberWatch, workng n conjuncton wth Anne Arundel Communty College, MD, developed model Informaton Assurance and Computer Forenscs currcula, whch supported the growth of cybersecurty educaton natonally, ncludng complete courses and multple degrees and certfcates. The CyberWatch Buldng on ts model currculum base, the Natonal CyberWatch Center expanded the reach of cybersecurty educaton currculum n several other ways, ncludng the sharng of stackable credental models. These specalzaton certfcates allow students to earn multple certfcates whle pursung ther degree and to earn ndustry credentals by sttng for ndustry certfcaton exams. Dfference 4 5

4 Currculum Desgn Consderatons Currculum Standards Panel Answers to the followng queston drve our currculum efforts: What does effectve currculum look lke? It s: Relevant: to employers, students, and colleges/unverstes Desgned wth fundamentals n mnd: yes, the feld of Informaton Securty s rapdly changng; but there are stll fundamentals that can and should be taught. The Natonal Securty Agency s Knowledge Unts (KUs) are the start of ths foundaton and the frst semblance of a Common Body of Knowledge for the cybersecurty dscplne Algned to job roles: backed by nput from commercal and federal partners, as well as labor market demand sources The Natonal CyberWatch Currculum Standards Panel was establshed n The msson s to dentfy the learnng objectves, concepts, procedures, stuatonal judgments, and ntellectve abltes requred to successfully complete courses currently avalable as dgtal courseware from the Natonal CyberWatch Center. The frst project of the Natonal CyberWatch Center Currculum Standards Panel was the Cybersecurty Core Currculum Mappng Project. Ths project nvolved eght onlne workng sessons wth synchronous and asynchronous actvtes, wth over 100 faculty, ndustry professonals, and government representatves completng varous taks to determne the requrements to successfully complete fve Natonal CyberWatch Center courses: Focused on sklls valdaton: lab exercses algned wth ndustry recognzed competences, cybersecurty compettons, and faculty professonal development courses Specfcally named: whle puttng the Cyber label on anythng and everythng s en vogue, sayng you have a Cybersecurty program s not helpful for students lookng for tranng and educaton and employers lookng to hre students from two- and four-year programs. Is your program focus on Secure Codng, Network Securty, NCC 200 Networkng I: Networkng Fundamentals NCC 204 Lnux Server I: Lnux Fundamentals etc.? Name t. Agle: n regards to content development and mantenance/updates Consumable: n varous dgtal formats Modular: schools can adopt the degrees/certfcates en masse, or customze them based on ther needs/ NCC 210 Informaton Securty Fundamentals NCC 212 Scrptng Fundamentals goals/outcomes (e.g., replace the Natonal CyberWatch Center Networkng I and II courses wth Csco I and II) Mapped to federal and natonal standards (e.g., Natonal Intatve for Cybersecurty Educaton (NICE) Cybersecurty Workforce Framework, Natonal Securty Agency (NSA) Natonal Centers of Academc Excellence Knowledge Unts) NCC 214 Ethcal Hackng & Systems Defense Complant wth the Sharable Content Object Reference Model (SCORM) All dgtal: each techncal course comes wth a myrad of nstructonal materals: textbook recommendaton, hosted vrtual envronment wth requste vrtual machnes and lab exercses, syllabus, nstructor gude, assessments, and lecture sldes that can be purchased and plugged nto varous Learnng Management Systems Capped at 60 credts: updated and new degree offerngs do not exceed many state-mandated 60-credt Assocate of Appled Scence lmts Preparaton for professonal certfcatons (e.g., CompTIA, Csco, Mcrosoft, EC-Councl) Artculated wth four-year schools: so students wshng to contnue ther studes at a four-year unversty can The produced standards wll be the frst to algn nstructonal desgn, skll practce facltes, cybersecurty professonal job performance standards, natonal workforce frameworks, and ndustry needs, whch are desperately needed to gude responsble currculum development for the new generaton of Informaton Securty specalsts. The Cybersecurty Core Currculum Mappng Project wll be the frst of several planned ntatves from the Natonal CyberWatch Center to produce formatve credentalng solutons that ncrease the number of capable cybersecurty professonals protectng our naton from cyber ncurson and ncreasng the relablty and effectveness of the computng nfrastructure crtcal to our natonal securty and economc prosperty. Nomnate yourself or someone else to partcpate - nfo@natonalcyberwatch.org 6 7

5 e-books Complete Cloud-Based Lab Soluton The Natonal CyberWatch Center, n conjuncton wth Jones & Bartlett Learnng, have produced a seres of e-books. These e-books support the varous Natonal CyberWatch techncal courses. A hands-on, scalable, and customzable vrtual platform that proves sklls are the cornerstone of any degree, certfcate, tranng, or assessment program. ebooks.natonalcyberwatch.org Ths lab soluton solves faculty and student needs n the followng ways: e-books Include: Syllabus Lecture Sldes Testbank/Assessment Questons Project Answers Instructor s Gude Cloud-based nfrastructure, allowng schools to begn usng t mmedately No up-front cost to the school, nor any on-gong fees Hundreds of vrtual labs mapped to many Natonal CyberWatch courses, professonal certfcatons, and varous standards and frameworks Step-by-step lab tutorals wth correspondng vrtual machnes Capture the Flag-type Challenge Labs wth auto-scorng All HTML 5, no plugns needed Instructor analytcs allowng faculty to see the actvty of ther students Learnng Tools Integraton (LTI) nto the school s Learnng Management System (LMS), allowng for sngle-sgnon capablty Ablty to update and dstrbute content seamlessly, wthout effort from the school Tech support: 7 days a week (8am - Mdnght) To see a complete lst of labs, by Natonal CyberWatch course, or to request a demo, see lab.natonalcyberwatch.org 8 9

6 Based on nput from the Natonal CyberWatch Currculum Standards Panels, ndustry, labor market demand research, and over 10+ years of content development experence, the Natonal CyberWatch degree programs help prepare students for the cuttng-edge jobs of the knowledge economy. In addton, where approprate, techncal courses have been mapped to effectve nstructonal desgn practces, skll practce facltes, the Natonal Securty Agency/Dept. of Homeland Securty Centers of Academc Excellence n Cyber Defense (CAE-CD) Knowledge Unts (KUs), the Natonal Intatve for Cybersecurty Educaton (NICE) Cybersecurty Workforce Framework (NIST Specal Publcaton ), and ndustry competency and capablty maturty models. For more nformaton: degrees.natonalcyberwatch.org CYBER DEFENSE (A.A.S.) The 11 techncal courses n ths degree combne both networkng and systems admnstraton fundamentals, wth a focus on defensve strateges to securng networks and systems. About the 6 Degree Programs 10 11

7 CYBER DEFENSE (A.A.S.) [CONT.] NETWORK FORENSICS (A.A.S.) [CONT.] Students completng ths degree can apply for jobs as: Computer Network Defense Analyst Computer Network Defense Infrastructure Support Computer User Support Customer Servce and Techncal Support Intruson Detecton System (IDS) Techncan Network Admnstrator Network Defense Techncan Network Servces Network Support Network Support Specalst Red Team Techncan Systems Admnstrator In addton, students can st for the followng ndustry certfcatons: CompTIA Network+ CompTIA Lnux+ CompTIA Securty+ Csco Certfed Entry Networkng Techncan (CCENT) Mcrosoft Certfed Professonal (MCP) NETWORK FORENSICS (A.A.S.) Students completng ths degree can apply for jobs as: Computer Forensc Analyst Computer Network Defense Analyst Computer Network Defense Forensc Analyst Computer Network Defense Infrastructure Support Computer Network Support Specalst Computer User Support Customer Servce and Techncal Support Dgtal Forenscs Analyst Dgtal Meda Collector Forensc Analyst Forensc Techncan Incdent Handler Incdent Responder Intruson Analyst Intruson Detecton System (IDS) Techncan Network Admnstrator Red Team Techncan Systems Admnstrator In addton, students can st for the followng ndustry certfcatons: CompTIA A+ CompTIA Network+ CompTIA Securty+ The 11 techncal courses n ths degree program combnes hardware, operatng systems, Dgtal Forenscs, and network fundamentals wth the requste securty concepts requred to detect and respond to system and network ntrusons

8 NETWORK SECURITY ADMINISTRATION (A.A.S) SECURE SOFTWARE DEVELOPMENT (A.S.) The 11 techncal courses n ths degree program combnes networkng fundamentals wth the requste network securty concepts and effectve practces requred to mplement and admnster secure network envronments. The 5 techncal courses n ths degree combnes Computer Scence fundamentals wth secure codng concepts. It s also desgned as a transfer degree nto baccalaureate programs of study n Computer Scence. Students completng ths degree can apply for jobs as: Computer Network Defense Analyst Computer Network Defense Infrastructure Support Computer Network Support Specalst Customer Servce and Techncal Support Computer User Support Intruson Detecton System (IDS) Techncan Network Admnstrator Network Analyst Network Defense Techncan Network Servces Network Support Network Systems and Data Communcatons Analyst Red Team Techncan Systems Admnstrator Students completng ths degree can apply for jobs as: Developer Programmer Coder Computer Programmer Applcaton Developer Software Developer In addton, students can st for the followng ndustry certfcatons: CompTIA Network+ CompTIA Securty+ Csco Certfed Entry Networkng Techncan (CCENT) 14 15

9 SECURE SOFTWARE DEVELOPMENT (A.A.S.) SYSTEMS SECURITY ADMINISTRATION (A.A.S) The 12 techncal courses n ths degree combnes computer programmng, software assurance, and database development fundamentals and s ntended to provde students wth fundamental sklls n software assurance. The 11 techncal courses n ths degree program combnes systems admnstraton fundamentals wth the requste securty concepts and effectve practces requred to mplement, admnster, and harden operatng systems. Students completng ths degree can apply for jobs as: Developer Programmer Coder Computer Programmer Applcaton Developer Software Developer Students completng ths degree can apply for jobs as: Customer Servce and Techncal Support Computer Support Specalst Computer User Support Systems Admnstrator Systems Analyst In addton, upon completon of ths degree, students can st for the followng professonal certfcatons: CompTIA A+ CompTIA Network+ CompTIA Securty+ CompTIA Lnux+ Powered by LPI Mcrosoft Certfed Professonal (MCP) Mcrosoft Certfed Solutons Assocate (MCSA) 16 17

10 About the 10 Certfcates These specalzed certfcates prepare students for ndustry-recognzed certfcaton exams and cuttng-edge jobs of the knowledge economy. Students can also earn credts, whch can be appled towards an Assocate s degree. In addton, certfcates can be stacked on top of each other, provdng a pathway toward more advanced study and other certfcates. More nformaton: CYBER DEFENSE certfcates.natonalcyberwatch.org The 11 techncal courses n ths certfcate combne both networkng and systems admnstraton fundamentals, wth a focus on defensve strateges to securng networks and systems. CYBER DEFENSE (CONT.) In addton, students can st for the followng ndustry certfcatons: CompTIA Network+ CompTIA Lnux+ CompTIA Securty+ Csco Certfed Entry Networkng Techncan (CCENT) Mcrosoft Certfed Professonal (MCP) CYBER FOUNDATIONS The 5 techncal courses n ths certfcate provde the IT foundaton to branch nto any number of Informaton Securty specalzatons. These courses also algn wth the core Knowledge Unts (KUs) necessary for the twoand four-year Natonal Securty Agency/Dept. of Homeland Securty Center of Academc Excellence n Cyber Defense (CAE-CD) desgnaton. Students completng ths certfcate can apply for jobs as: Computer Network Defense Analyst Computer Network Defense Infrastructure Support Computer User Support Customer Servce and Techncal Support Intruson Detecton System (IDS) Techncan Network Admnstrator Network Defense Techncan Network Servces Network Support Network Support Specalst Red Team Techncan Systems Admnstrator 18 19

11 NETWORK FORENSICS NETWORK SECURITY ADMINISTRATION The 11 techncal courses n ths certfcate program combnes hardware, operatng systems, Dgtal Forenscs, and network fundamentals wth the requste securty concepts requred to detect and respond to system and network ntrusons. The 11 techncal courses n ths certfcate program combnes networkng fundamentals wth the requste network securty concepts and effectve practces requred to mplement and admnster secure network envronments. There are 3 Network Securty Admnstraton certfcates that can be stacked on top of each other, and also provde the foundaton for other certfcates (e.g., Systems Securty Admnstraton). Students completng ths degree can apply for jobs as: Computer Forensc Analyst Computer Network Defense Analyst Computer Network Defense Forensc Analyst Computer Network Defense Infrastructure Support Computer Network Support Specalst Computer User Support Customer Servce and Techncal Support Dgtal Forenscs Analyst Dgtal Meda Collector Forensc Analyst Forensc Techncan Incdent Handler Incdent Responder Intruson Analyst Intruson Detecton System (IDS) Techncan Network Admnstrator Red Team Techncan Systems Admnstrator In addton, students can st for the followng ndustry certfcatons: CompTIA A+ CompTIA Network+ CompTIA Securty+ Students completng ths degree can apply for jobs as: Computer Network Defense Analyst Computer Network Defense Infrastructure Support Computer Network Support Specalst Customer Servce and Techncal Support Computer User Support Intruson Detecton System (IDS) Techncan Network Admnstrator Network Analyst Network Defense Techncan Network Servces Network Support Network Systems and Data Communcatons Analyst Red Team Techncan Systems Admnstrator In addton, students can st for the followng ndustry certfcatons: CompTIA Network+ CompTIA Securty+ Csco Certfed Entry Networkng Techncan (CCENT) 20 21

12 SECURE SOFTWARE DEVELOPMENT SYSTEMS SECURITY ADMINISTRATION The 12 techncal courses n ths certfcate program combnes computer programmng, software assurance, and database development fundamentals and s ntended to provde students wth fundamental sklls n software assurance. The 11 techncal courses n ths certfcate program combnes systems admnstraton fundamentals wth the requste securty concepts and effectve practces requred to mplement, admnster, and harden operatng systems. There are 3 Systems Securty Admnstraton certfcates that can be stacked on top of each other, and also provde the foundaton for other certfcates (e.g., Network Securty Admnstraton). Students completng ths degree can apply for jobs as: Developer Programmer Coder Computer Programmer Applcaton Developer Software Developer Students completng ths degree can apply for jobs as: Customer Servce and Techncal Support Computer Support Specalst Computer User Support Systems Admnstrator Systems Analyst In addton, upon completon of ths degree, students can st for the followng professonal certfcatons: CompTIA A+ CompTIA Network+ CompTIA Securty+ CompTIA Lnux+ Powered by LPI Mcrosoft Certfed Professonal (MCP) Mcrosoft Certfed Solutons Assocate (MCSA) 22 23

13 Currculum Specalsts Let our knowledgeable staff help you craft a program or course that meets the needs of your local advsory board, faculty knowledge and sklls, employers, and the students comng through your nsttutons. Consultng servces nclude: Degree and Certfcate program creaton, adopton, adaptaton Techncal course creaton, adopton, adaptaton Artculaton agreement models Faculty professonal development programs Mappng servces to varous natonal and federal standards, job roles, and certfcatons and more Contact us: nfo@natonalcyberwatch.org Mappng, Mappng Oh My! Our degree, certfcate, and techncal course learnng objectves and topc areas have been mapped to the followng, ensurng your students are prepared for the cuttng-edge jobs of the knowledge economy: Professonal certfcatons Job Roles Natonal Securty Agency Knowledge Unts (KUs) Natonal Insttute of Standards & Technology (NIST) Cybersecurty Workforce Framework Knowledge, Sklls & Abltes (KSAs) Cybersecurty professonal job performance standards Industry needs ABOUT THE 34 TECHNICAL COURSES courses.natonalcyberwatch.org 24 25

14 Networkng I Networkng I (cont.) NCC 200: Networkng I: Networkng Fundamentals 3 credt/unt hours Three hours of lecture weekly; one term Ths course explores convergng computer and communcatons technologes, such as transmsson concepts, network hardware and software, protocols, and standards. It s also desgned to serve the needs of those nterested n understandng the feld of computer networkng and how t relates to other areas of Informaton Technology (IT). The materal covered n ths class provdes the broad-based knowledge necessary to prepare students for further study n specalzed networkng felds, or may be used by those nterested n an ntroducton to the feld. It also helps prepare ndvduals seekng to pass the Csco Certfed Network Assocate (CCNA) or Csco Certfed Entry Networkng Techncan (CCENT) certfcaton exams. PREREQUISITE: General Educaton IT course (can be taken concurrently) Upon completon of ths course the student wll be able to: Descrbe the devces and servces used to support communcatons n data networks and the Internet; Descrbe the role of protocol layers n data networks; Desgn, calculate and mplement varous IPv4 and IPv6 addressng and namng schemes; Descrbe fundamental Ethernet concepts (e.g., meda, servces, and operatons); Buld smple Local Area Networks (LANs); Utlze common network utltes to verfy and troubleshoot small networks; Analyze network and data traffc; and Utlze network dagrams 1.0 Explorng the Network: Globally Connected LANs, WANs, and the Internet The Network as a Platform The Changng Network Envronment 2.0 Confgurng a Network Operatng System: Internetworkng Operatng System (IOS) Gettng Basc Addressng Schemes 3.0 Network Protocols and Communcatons: Rules of Communcaton Network Protocols and Standards Movng Data 4.0 Network Access: Physcal Layer Protocols Network Meda Data Lnk Layer Protocols Meda Access Control 5.0 Ethernet: Ethernet Protocol Address Resoluton Protocol (ARP) Local Area Network (LAN) Swtches 6.0 Network Layer: Network Layer Protocols Routng Routers Confgurng a Router 7.0 Transport Layer: Transport Layer Protocols Transmsson Control Protocol (TCP) User Datagram Protocol (UDP) 8.0 Internet Protocol (IP) Addressng: IPv4 addresses IPv6 addresses Connectvty Verfcaton 9.0 Subnettng Internet Protocol (IP) Networks: Subnettng an IPv4 Network Addressng Schemes Desgn Consderatons for IPv Applcaton Layer: Applcaton Layer Protocols and Servces 11.0 Puttng It All Together: Create and Grow Network Securty Basc Network Performance Managng IOS Confguraton Fles TITLE: Networkng Fundamentals: Natonal CyberWatch Center Edton (1st Edton) AUTHOR: Solomon, Km & Carrell (2017) PUBLISHER: Jones & Bartlett Learnng PRINT ISBN: , etext ISBN (VtalSource):

15 Networkng II Networkng II (cont.) NCC 201: Networkng II: Swtchng and Routng Fundamentals 4 credt/unt hours Four hours of lecture weekly; one term Ths course ntroduces the student to the archtecture, components, and operaton of swtches and routers, as well as the fundamentals of swtchng, routng, and the prmary routng protocols. The course s desgned to help students prepare for professonal careers n the nformaton and communcaton technology (ICT) feld. It also helps prepare ndvduals seekng to pass the Csco Certfed Network Assocate (CCNA) or Csco Certfed Entry Networkng Techncan (CCENT) certfcaton exams. PREREQUISITE: NCC 200: Networkng I: Networkng Fundamentals Upon completon of ths course the student wll be able to: Descrbe basc swtchng concepts; Dscuss the purpose, nature, and operatons of a router, routng tables, and the route lookup process; Descrbe and mplement Vrtual Local Area Networks (VLANs) to create logcally separate networks and how routng occurs between them; Confgure and troubleshoot statc and dynamc routng protocols, dstance vector routng protocols, and lnkstate routng protocols; Implement, and troubleshoot Access Control Lsts (ACLs) for IPv4 and IPv6 networks; Confgure and troubleshoot Dynamc Host Confguraton Protocol (DHCP) for IPv4 and IPv6 networks; Implement and troubleshoot Network Address Translaton (NAT); Utlze network dagrams 1.0 Introducton to Swtched Networks: LAN Desgn The Swtched LAN Envronment 2.0 Basc Swtchng Concepts and Confguraton: Basc Swtch Confguraton Swtch Securty: Management and Implementaton Troubleshootng Securty Implementatons 3.0 Vrtual Local Area Networks (VLANs): VLAN Segmentaton VLAN Implementaton VLAN Securty and Desgn Troubleshootng VLAN Issues 4.0 Routng Concepts: Intal Confguraton of a Router Routng Decsons Router Operaton Troubleshootng Router Issues 5.0 Inter-VLAN Routng: Inter-VLAN Routng Confguraton Troubleshootng Inter-VLAN Routng Layer 3 Swtchng 6.0 Statc Routng: Statc Routng Implementaton Confgure Statc and Default Routes Revew of Classless Inter-Doman Routng (CIDR) and Varable-Length Subnet Mask (VLSM) Confgure Summary and Floatng Statc Routes Troubleshoot Statc and Default Route Issues 7.0 Dynamc Routng: Dynamc Routng Protocols Dstance Vector Routng Protocols Routng Informaton Protocol (RIP) and RIPng Routng Lnk-State Dynamc Routng Routng Table Troubleshootng Dynamc Routng Implementatons 8.0 Sngle-Area Open Shortest Path Frst (OSPF): Characterstcs of OSPF Confgurng Sngle-Area OSPF v2 Confgurng Sngle-Area OSPF v3 Troubleshootng OSPF Implementatons 9.0 Access Control Lsts (ACLs): Internet Protocol (IP) ACL Operatons Standard and Extended IPv4 ACLs IPv6 ACLs Troubleshootng ACLs 10.0 Dynamc Host Confguraton Protocol (DHCP): Implementng DHCP v4 and DHCP v6 Troubleshootng DHCP Implementatons 11.0 Network Address Translaton (NAT): NAT Operaton for IPv4 Confgurng NAT Troubleshootng NAT TITLE: Routng and Swtchng Essentals v6 Companon Gude PUBLISHER: Csco Press (2016) ISBN-10: ISBN-13:

16 Networkng III Networkng III (cont.) NCC 202: Networkng III: Network Scalablty 4 credt/unt hours Four hours of lecture weekly; one term Ths course ntroduces the student to advanced swtchng and routng archtectures, components, and operatons. The course s desgned to help students prepare for professonal careers n the nformaton and communcaton technology (ICT) feld. It also helps prepare ndvduals seekng to pass the Csco Certfed Network Assocate (CCNA) certfcaton exam. PREREQUISITE: NCC 201: Networkng II: Swtchng and Routng Fundamentals Upon completon of ths course the student wll be able to: Confgure and troubleshoot enhanced swtchng technologes such as Vrtual Local Area Networks (VLANs), Rapd Spannng Tree Protocol (RSTP), Per VLAN Spannng Tree Plus Protocol (PVST+), and EtherChannel; Confgure and troubleshoot frst hop redundancy protocols (HSRP) n a swtched network; Confgure and troubleshoot wreless routers and wreless clents; Confgure and troubleshoot routers n a complex routed IPv4 or IPv6 network usng sngle-area Open Shortest Path Frst (OSPF), multarea OSPF, and Enhanced Interor Gateway Routng Protocol (EIGRP); and Utlze network dagrams 1.0 Introducton to Scalng Networks: Implementng a Network Desgn Selectng Network Devces 2.0 LAN Redundancy: Spannng Tree Concepts Varetes of Spannng Tree Protocols Spannng Tree Confguraton and Troubleshootng Frst Hop Redundancy Protocols 3.0 Lnk Aggregaton: Lnk Aggregaton Concepts Lnk Aggregaton Confguraton and Troubleshootng 4.0 Wreless LANs: Wreless LAN Concepts Wreless LAN Operatons Wreless LAN Securty Wreless LAN Confguraton and Troubleshootng 5.0 Adjust and Troubleshoot Sngle-Area OSPF: Advanced Sngle-Area OSPF Confguratons Troubleshootng Sngle-Area OSPF Implementatons 6.0 Multarea OSPF: Multarea OSPF Operaton Confgurng Multarea OSPF 7.0 EIGRP: Characterstcs of EIGRP Operaton of EIGRP Confgurng EIGRP for IPv4 Confgurng EIGRP for IPv6 8.0 EIGRP Advanced Confg. and Troubleshootng: Advanced EIGRP Confguratons Troubleshootng EIGRP Implementatons 9.0 Access Control Lsts (ACLs): Internet Protocol (IP) ACL Operatons Standard and Extended IPv4 ACLs IPv6 ACLs Troubleshootng ACLs 10.0 Dynamc Host Confguraton Protocol (DHCP): Implementng DHCP v4 and DHCP v6 Troubleshootng DHCP Implementatons 11.0 Network Address Translaton (NAT): NAT Operaton for IPv4 Confgurng NAT Troubleshootng NAT TITLE: Scalng Networks v6 Companon Gude PUBLISHER: Csco Press (2017) ISBN-10: ISBN-13:

17 Networkng IV Networkng IV (cont.) NCC 203: Networkng IV: Network Connectvty 4 credt/unt hours Four hours of lecture weekly; one term Ths course ntroduces the student to Wde Area Network (WAN) technologes and network servces requred by converged applcatons n a complex network. The course enables students to understand the selecton crtera of network devces and WAN technologes to meet network requrements. Students learn how to confgure and troubleshoot network devces and resolve common ssues wth data lnk protocols. Students wll also develop the knowledge and sklls needed to mplement vrtual prvate network (VPN) operatons n a complex network. The course s desgned to help students prepare for professonal careers n the nformaton and communcaton technology (ICT) feld. It also helps prepare ndvduals seekng to pass the Csco Certfed Network Assocate (CCNA) certfcaton exam. 1.0 Herarchcal Network Desgn: Herarchcal Network Desgn Overvew Evolvng Network Archtectures 2.0 Connectng to the WAN: WAN Technologes Overvew Selectng a WAN Topology 3.0 Pont-to-Pont (PPP) Connectons: Seral Pont-to-Pont Overvew PPP Operaton Confgure PPP Troubleshootng WAN Connectvty SNMP Netflow 9.0 Troubleshootng the Network: Troubleshootng wth a Systematc Approach Network Troubleshootng TITLE: Connectng Networks v6 Companon Gude PUBLISHER: Csco Press (2017) ISBN-10: ISBN-13: PREREQUISITE: NCC 202: Networkng III: Network Scalablty 4.0 Frame Relay: Introducton to Frame Relay Confguraton and Troubleshootng Frame Relay Upon completon of ths course the student wll be able to: Descrbe dfferent WAN technologes and ther benefts; Dscuss the operatons and benefts of vrtual prvate networks (VPNs) and tunnelng; Confgure and troubleshoot seral connectons; Confgure and troubleshoot broadband connectons; Confgure and troubleshoot tunnelng operatons; Confgure and troubleshoot Network Address Translaton (NAT) operatons; Montor and troubleshoot network operatons usng syslog, Smple Network Management Protocol (SNMP), and NetFlow; Descrbe network archtectures (e.g., Borderless networks, Data centers and vrtualzaton, Collaboraton technology and solutons); and Utlze network dagrams 5.0 Network Address Translaton (NAT) for IPv4: NAT Operaton Confguraton and Troubleshootng NAT 6.0 Broadband Solutons: Teleworkng Comparng Broadband Solutons Confgurng xdsl Connectvty 7.0 Securng Ste-to-Ste Connectvty: VPNs Ste-to-ste Generc Routng Encapsulaton (GRE) Tunnels Introducng IP Securty (IPSec) Remote Access 8.0 Montorng the Network: Syslog 32 33

18 Lnux Server I Lnux Server I (cont.) NCC 204: Lnux Server I: Lnux Fundamentals 3 credt/unt hours Three hours of lecture weekly; one term Ths course wll provde students wth the fundamental concepts of Lnux/ UNIX operatng systems. The course covers such topcs as the Lnux/UNIX fle system, commands, utltes, text edtng, shell programmng, and text processng utltes. Students wll learn command lne syntax and features of the popular Lnux/UNIX shells, ncludng flename generaton, redrecton, ppes, and quotng mechansms. The course s desgned to help students prepare for professonal careers n the nformaton and communcaton technology (ICT) feld. It also helps prepare ndvduals seekng to pass the CompTIA Lnux+ (powered by the Lnux Professonal Insttute (LPI)) certfcaton exam (LX0-103). PREREQUISITE: General Educaton IT Course (can be taken concurrently) Upon completon of ths course the student wll be able to: Customze and utlze both GUI (Graphcal User Interface) and CLI (Command Lne Interface); Set general and advance permssons on fles and drectores; Use flename generaton standards and best practces; Use ppes and redrecton along wth nput output helper commands; Control processes locally and remote va network; Customze basc and advanced networkng and software management; and Utlze command lne search, utltes, fle system management, and confguraton modfcaton 1.0 System Archtecture: 1.1Determne and Confgure hardware settngs: Enable and dsable ntegrated perpherals Confgure systems wth or wthout external perpherals such as keyboards Dfferentate between the varous types of mass storage devces Weakest Lnk n the Securty of an IT Infrastructure Descrbe the dfferences between coldplug and hotplug devces Determne hardware resources for devces Tools and utltes to lst varous hardware nformaton (e.g. lsusb, lspc, etc.) Tools and utltes to manpulate USB devces Conceptual understandng of sysfs, udev, dbus 1.2 Boot the System: Provde common commands to the boot loader and optons to the kernel at boot tme Demonstrate knowledge of the boot sequence from BIOS to boot completon Descrbe SysVnt and system Dscuss Upstart Check boot events n the log fle 1.3 Change runlevels / boot targets and shutdown or reboot system: Set the default runlevel or boot target Change between runlevels / boot targets ncludng sngle user mode Shutdown and reboot from the command lne Alert users before swtchng runlevels / boot targets or other major system events Properly termnate processes 2.0 Lnux Installaton and Package Management: 2.1 Desgn hard dsk layout: Allocate flesystems and swap space to separate parttons or dsks Talor the desgn to the ntended use of the system Ensure the /boot partton conforms to the hardware archtecture requrements for bootng Knowledge of basc features of Logcal Volume Manager (LVM) 2.2 Install a boot manager: Provdng alternatve boot locatons and backup boot optons Install and confgure a boot loader such as GRUB Legacy Perform basc confguraton changes for GRUB 2 Interact wth the boot loader 2.3 Manage shared lbrares: Identfy shared lbrares Identfy the typcal locatons of system lbrares Load shared lbrares 2.4 Use Deban package management: Install, upgrade and unnstall Deban bnary packages Fnd packages contanng specfc fles or lbrares whch may or may not be nstalled Obtan package nformaton lke verson, content, dependences, package ntegrty, and nstallaton status (whether or not the package s nstalled) 2.5 Use RPM and YUM package management: Install, re-nstall, upgrade and remove packages usng RPM and YUM 34 35

19 Lnux Server I (cont.) Lnux Server I (cont.) Obtan nformaton on RPM packages such as verson, status, dependences, ntegrty and sgnatures Determne what fles a package provdes, as well as fnd whch package a specfc fle comes from 3.0 GNU and Unx Commands: 3.1 Work on the command lne: Use sngle shell commands and one lne command sequences to perform basc tasks on the command lne Use and modfy the shell envronment ncludng defnng, referencng and exportng envronment varables Use and edt command hstory Invoke commands nsde and outsde the defned path 3.2 Process text streams usng flters: Send text fles and output streams through text utlty flters to modfy the output usng standard 3.4 Use streams, ppes and redrects: Redrectng standard nput, standard output and standard error Ppe the output of one command to the nput of another command Use the output of one command as arguments to another command Send output to both stdout and a fle 3.5 Create, montor and kll processes: Run jobs n the foreground and background Sgnal a program to contnue runnng after logout Montor actve processes Select and sort processes for dsplay Send sgnals to processes 3.6 Modfy process executon prortes: Know the default prorty of a job that s created Run a program wth hgher or lower prorty than the default Change the prorty of a runnng process 4.0 Devces, Lnux Flesystems, Flesystem Herarchy Standard: 4.1 Create parttons and flesystems: Manage MBR partton tables Use varous mkfs commands to create varous flesystems (e.g., ext2/ext3/ext4, XFS, VFAT) Awareness of ReserFS and Btrfs Basc knowledge of gdsk and parted wth GPT 4.2 Mantan the ntegrty of flesystems: Verfy the ntegrty of flesystems Montor free space and nodes Repar smple flesystem problems 4.3 Control mountng and unmountng of flesystems: Manually mount and unmount flesystems Confgure flesystem mountng on bootup Confgure user mountable removeable flesystems 4.4 Manage dsk quotas: Set up a dsk quota for a flesystem Use lnks to support system admnstraton tasks 4.7 Fnd system fles and place fles n the correct locaton: Understand the correct locatons of fles under the FHS Fnd fles and commands on a Lnux system Descrbe the locaton and propose of mportant fle and drectores as defned n the FHS TITLE: Lnux Fundamentals: Natonal CyberWatch Center Edton (1st Edton) AUTHOR: Rchard Blum & Jesse Varsalone (2017) PUBLISHER: Jones & Bartlett Learnng etext ISBN (VtalSource): UNIX commands found n the GNU textutls package 3.7 Search text fles usng regular expressons: Create smple regular expressons contanng Edt, check and generate user quota reports 4.5 Manage fle permssons and ownershp: 3.3 Perform basc fle management: several notatonal elements Manage access permssons on regular and specal Copy, move and remove fles and drectores Use regular expresson tools to perform searches fles as well as drectores ndvdually through a flesystem or fle content Use access modes such as sud, sgd and the stcky Copy multple fles and drectores recursvely Remove fles and drectores recursvely Use smple and advanced wldcard specfcatons n commands Usng fnd to locate and act on fles based on type, sze, or tme Usage of tar, cpo, and dd 3.8 Perform basc fle edtng operatons usng v: Navgate a document usng v Use basc v modes (e.g., nsert, edt, delete, copy and fnd text) bt to mantan securty Demonstrate how to change the fle creaton mask Use the group feld to grant fle access to group members 4.6 Create and change hard and symbolc lnks: Create lnks Identfy hard and/or soft lnks Copyng versus lnkng fles 36 37

20 Lnux Server II Lnux Server II (cont.) NCC 205: Lnux Server II: System Admnstraton 3 credt/unt hours Three hours of lecture weekly; one term Ths course ntroduces the student to the fundamentals of system admnstraton usng Lnux operatng systems. Addtonally, the course provdes the broad-based knowledge necessary to prepare students for further study n other specalzed securty felds. It s also ntended to serve the needs of ndvduals seekng to pass the Computng Technology Industry Assocaton s (CompTIA) Lnux + certfcaton exam (LX0-104). PREREQUISITE: NCC 204: Lnux Server I: Lnux Fundamentals Upon completon of ths course the student wll be able to: Work at the Lnux command lne; Managng user accounts and groups; Mantan system tme and loggng; Manage server servces (e.g., SMTP); Manage prnters and prntng; Work wth shells, manage data, and mplement basc shell scrpts; Automate system admnstraton tasks by schedulng jobs; Install and confgure a workstaton (ncludng X) and connect t to a LAN; Work wth Internet protocols; Setup host securty; Secure data usng encrypton; and Demonstrate approprate and ethcal behavor and good work habts 1.0 Shells, Scrptng and Data Management: 1.1 Customze and use the shell envronment: Set envronment varables (e.g. PATH) at logn or when spawnng a new shell Wrte BASH functons for frequently used sequences of commands Mantan skeleton drectores for new user accounts Set command search path wth the proper drectory 1.2 Customze or wrte smple scrpts: Use standard sh syntax (loops, tests) Use command substtuton Test return values for success or falure or other nformaton provded by a command Perform condtonal malng to the superuser Correctly select the scrpt nterpreter through the shebang (#!) lne Manage the locaton, ownershp, executon and sud-rghts of scrpts 1.3 SQL data management: Use of basc SQL commands Perform basc data manpulaton 2.0 User Interfaces and Desktops: 2.1 Install and confgure X11: Verfy that the vdeo card and montor are supported by an X server Awareness of the X font server Basc understandng and knowledge of the X Wndow confguraton fle 2.2 Setup a dsplay manager: Basc confguraton of LghtDM Turn the dsplay manager on or off Change the dsplay manager greetng Awareness of XDM, KDM and GDM 2.3 Accessblty: Basc knowledge of keyboard accessblty settngs (AccessX) Basc knowledge of vsual settngs and themes Basc knowledge of assstve technology (ATs) 3.0 Admnstratve Tasks: 3.1 Manage user and group accounts and related system fles: Add, modfy and remove users and groups Manage user/group nfo n password/group databases Create and manage specal purpose and lmted accounts 3.2 Automate system admnstraton tasks by schedulng jobs: Manage cron and at jobs Confgure user access to cron and at servces Confgure anacron 3.3 Localsaton and nternatonalzaton: Confgure locale settngs and envronment varables Confgure tmezone settngs and envronment varables 4.0 Essental System Servces: 4.1 Mantan system tme: Set the system date and tme Set the hardware clock to the correct tme n UTC Confgure the correct tmezone 38 39

21 Lnux Server II (cont.) Lnux Server II (cont.) Basc NTP confguraton Knowledge of usng the pool.ntp.org servce Awareness of the ntpq command 4.2 System loggng: Confguraton of the syslog daemon Understandng of standard facltes, prortes and actons Confguraton of logrotate Awareness of rsyslog and syslog-ng 4.3 Mal Transfer Agent (MTA) bascs: Create e-mal alases Confgure e-mal forwardng Knowledge of commonly avalable MTA programs (postfx, sendmal, qmal, exm) (no confguraton) 4.4 Manage prnters and prntng: Basc CUPS confguraton (for local and remote prnters) Manage user prnt queues Troubleshoot general prntng problems Add and remove jobs from confgured prnter queues 5.0 Networkng Fundamentals: 5.1 Fundamentals of Internet protocols: Demonstrate an understandng network masks and CIDR notaton Knowledge of the dfferences between prvate and publc dotted quad IP addresses Knowledge about common TCP and UDP ports (e.g., 20, 21, 22, 23, 25, 53, 80) Knowledge about the dfferences and major features of UDP, TCP and ICMP Knowledge of the major dfferences between IPv4 and IPv6 Knowledge of the basc features of IPv6 5.2 Basc network confguraton: Manually and automatcally confgure network nterfaces Basc TCP/IP host confguraton Settng a default route 5.3 Basc network troubleshootng: Manually and automatcally confgure network nterfaces and routng tables to nclude addng, startng, stoppng, restartng, deletng or reconfgurng network nterfaces Change, vew or confgure the routng table and correct an mproperly set default route manually Debug problems assocated wth the network confguraton 5.4 Confgure clent sde DNS: Query remote DNS servers Confgure local name resoluton and use remote DNS servers Modfy the order n whch name resoluton s done 6.0 Securty: 6.1 Perform securty admnstraton tasks: Audt a system to fnd fles wth the sud/sgd bt set Set or change user passwords and password agng nformaton Beng able to use nmap and netstat to dscover open ports on a system Set up lmts on user logns, processes and memory usage Determne whch users have logged n to the system or are currently logged n Basc sudo confguraton and usage 6.2 Setup host securty: Awareness of shadow passwords and how they work Turn off network servces not n use Understand the role of TCP wrappers 6.3 Securng data wth encrypton: Perform basc OpenSSH 2 clent confguraton and usage Understand the role of OpenSSH 2 server host keys Perform basc GnuPG confguraton, usage, and revocaton Understand SSH port tunnels (ncludng X11 tunnels) TITLE: Securty Strateges n Lnux Platforms and Applcatons, Second Edton AUTHOR: Jang & Messer (2017) PUBLISHER: Jones & Bartlett Learnng ISBN:

22 Wndows Server I Wndows Server I (cont.) NCC 206: Wndows Server I: Installng and Confgurng Wndows Server 3 credt/unt hours Three hours of lecture weekly; one term Ths course offers n-depth coverage of core servces such as Actve Drectory and networkng servces and provdes valdaton of sklls necessary to mplement a core Wndows Server 2012 Infrastructure nto an exstng enterprse envronment. Addtonally, the course provdes the broad-based knowledge necessary to prepare students for further study n other specalzed Informaton Technology and securty felds. It s also ntended to serve the needs of ndvduals seekng to pass the Mcrosoft certfcaton exam (70-410). 8.0 Creatng and Confgurng Vrtual Machne Storage 9.0 Creatng and Confgurng Vrtual Networks 10.0 Confgurng IPv4 and IPv6 Addressng 11.0 Deployng and Confgurng the DHCP Servce 12.0 Deployng and Confgurng the DNS Servce 13.0 Installng Doman Controllers 14.0 Installng Doman Controllers PREREQUISITE: NCC 200: Networkng I: Networkng Fundamentals & NCC 204: Lnux Server I: Lnux Fundamentals 15.0 Creatng and Managng Actve Drectory Groups and Organzatonal Unts 16.0 Creatng Group Polcy Objects 17.0 Confgurng Securty Polces Upon completon of ths course the student wll be able to: Implement and admnster Actve Drectory Doman Servces; Implement Local Storage; Implement Fle and Prnt Servces; Setup and manage Group Polcy; Implement and admnster Server Vrtualzaton wth Hyper-V; and Demonstrate approprate and ethcal behavor and good work habts 18.0 Confgurng Applcaton Restrcton Polces 19.0 Confgurng Wndows Frewall TITLE: Installng & Confgurng Wndows Server 2012 R2 AUTHOR: Crag Zacker (2014) PUBLISHER: John Wley & Sons ISBN: Installng Servers 2.0 Confgurng Servers 3.0 Confgurng Local Storage 4.0 Confgurng Fle and Sharng Access 5.0 Confgurng Prnt and Document Servces 6.0 Confgurng Servers for Remote Management 7.0 Creatng and Confgurng Vrtual Machne Settngs 42 43

23 Wndows Server II Wndows Server II (cont.) NCC 207: Wndows Server II: System Admnstraton 3 credt/unt hours Three hours of lecture weekly; one term Ths course bulds on Wndows Server I: Installng and Confgurng Wndows Server by contnung to provde valdaton of sklls necessary to mplement a core Wndows Server 2012 Infrastructure nto an exstng enterprse envronment. Addtonally, the course provdes the broad-based knowledge necessary to prepare students for further study n other specalzed Informaton Technology and securty felds. It s also ntended to serve the needs of ndvduals seekng to pass the Mcrosoft certfcaton exam (70-411). 4.0 Confgurng Dstrbuted Fle System (DFS) 5.0 Confgurng Fle Server Resource Manager (FSRM) 6.0 Confgurng Fle Servces and Dsk Encrypton 7.0 Confgurng Advanced Audt Polces 8.0 Confgurng DNS Zones 9.0 Confgurng DNS Records 10.0 Confgurng VPN and Routng PREREQUISITE: NCC 206: Wndows Server I: Installng and Confgurng Wndows Server 11.0 Confgurng Drect Access 12.0 Confgurng a Network Polcy Server (NPS) 13.0 Confgurng Network Polcy Server Polces Upon completon of ths course the student wll be able to: Implement a Group Polcy Infrastructure; Manage user and servce accounts; Mantan Actve Drectory Doman Servces Confgure and troubleshoot DNS; Confgure and troubleshoot Remote Access; Install, confgure, and troubleshoot the Network Polcy Server Role; Optmze fle servces; Increase fle system securty; Implement Update Management; and Demonstrate approprate and ethcal behavor and good work habts 14.0 Confgurng Network Access Protecton (NAP) 15.0 Confgurng Server Authentcaton 16.0 Confgurng Doman Controllers 17.0 Mantanng Actve Drectory 18.0 Confgurng Account Polces 19.0 Confgurng Group Polcy Processng 20.0 Confgurng Group Polcy Settngs 21.0 Managng Group Polcy Objects 22.0 Confgurng Group Polcy Preferences 1.0 Deployng and Managng Server Images 2.0 Implementng Patch Management 3.0 Montorng Servers TITLE: Admnsterng Wndows Server 2012 R2 AUTHOR: Patrck Regan (2014) PUBLISHER: John Wley & Sons ISBN:

24 Wndows Server III Wndows Server III (cont.) NCC 208: Wndows Server III: Advanced System Admnstraton 4 credt/unt hours Four hours of lecture weekly; one term Ths course valdates the sklls and knowledge necessary for mplementng, managng, mantanng and provsonng servces and nfrastructure n a Wndows Server 2012 envronment. Addtonally, the course provdes the broadbased knowledge necessary to prepare students for further study n other specalzed Informaton Technology and securty felds. It s also ntended to serve the needs of ndvduals seekng to pass the Mcrosoft certfcaton exam (70-412). 4.0 Managng Vrtual Machne Movement 5.0 Confgurng Advanced Fle Servces 6.0 Implementng Dynamc Access Control 7.0 Confgurng and Optmzng Storage 8.0 Confgurng and Managng Backups 9.0 Recoverng Servers PREREQUISITE: NCC 207: Wndows Server II: System Admnstraton 10.0 Confgurng Ste-Level Fault Tolerance 11.0 Implementng an Advanced DHCP Soluton 12.0 Implementng an Advanced DNS Soluton Upon completon of ths course the student wll be able to: Confgure advanced network servces; Implement advanced fle servces; Confgure dynamc access control; Implement network load balancng; Confgure falover clusterng; Implementng dsaster recovery; Install and mantan Actve Drectory Certfcate Servces (AD CS); Confgure and admnster Actve Drectory Federaton Servces (AD FS); and Demonstrate approprate and ethcal behavor and good work habts 13.0 Deployng and Managng IPAM 14.0 Confgurng a Doman and Forest 15.0 Confgurng Trusts 16.0 Confgurng Stes 17.0 Managng Actve Drectory and SYSVOL Replcaton 18.0 Implementng Actve Drectory Federaton Servces 19.0 Installng and Confgurng Actve Drectory Certfcate Servces (AD CS) 20.0 Managng Certfcates 21.0 Installng and Confgurng Actve Drectory Rghts Management Servces 1.0 Confgurng Network Load Balancng 2.0 Confgurng Falover Clusterng 3.0 Managng Falover Clusterng Roles TITLE: Confgurng Advanced Wndows Server 2012 R2 AUTHOR: Patrck Regan (2014) PUBLISHER: John Wley & Sons ISBN:

25 Secure Server Servces Informaton Securty Fundamentals NCC 209: Secure Server Servces 4 credt/unt hours Four hours of lecture weekly; one term Ths course ntroduces the student to the desgn, nstallaton, and secure admnstraton of popular server servces, such as web and mal. Students wll also demonstrate how to secure these servces to ensure ther confdentalty, ntegrty, and avalablty. PREREQUISITE: NCC 205: Lnux Server II: System Admnstraton & NCC 208: Wndows Server III: Advanced System Admnstraton Upon completon of ths course the student wll be able to desgn, nstall, and securely admnster the followng servces: Doman Name System; Hypertext Transfer Protocol (HTTP/HTTPS); Fle Transfer Protocol (FTP/SFTP/FTPS); Secure Shell (SSH) Sendmal; Exchange; Database servces (e.g., MySQL); and Demonstrate approprate and ethcal behavor and good work habts 1.0 Hypertext Transfer Protocol (HTTP/HTTPS) 2.0 Fle Transfer Protocol (FTP/SFTP/FTPS) 3.0 Secure Shell (SSH) 4.0 Mal Servces 5.0 Database Servces NCC 210: Informaton Securty Fundamentals 3 credt/unt hours Three hours of lecture weekly; one term Ths course offers n-depth coverage of the current rsks and threats to an organzaton s data, combned wth a structured way of addressng the safeguardng of these crtcal electronc assets. The course provdes a foundaton for those new to Informaton Securty as well as those responsble for protectng network servces, devces, traffc, and data. Addtonally, the course provdes the broad-based knowledge necessary to prepare students for further study n other specalzed securty felds. It s also ntended to serve the needs of ndvduals seekng to pass the Computng Technology Industry Assocaton s (CompTIA) Securty + certfcaton exam (SY0-401). PREREQUISITE: NCC 200: Networkng 1: Networkng Fundamentals Upon completon of ths course the student wll be able to: Descrbe why nformaton securty s essental n today s IT envronment; Identfy the goals of nformaton securty; Descrbe common securty threats and ther ramfcatons; Determne the factors nvolved n developng a secure nformaton securty strategy; Identfy common attacks and descrbe how to safeguard aganst them; Descrbe communcatons, E-mal, Web, remote access, and wreless securty ssues; Evaluate varous network devces and meda and how best to secure them; Descrbe the bascs of cryptography; Dfferentate between physcal securty, dsaster recovery, and busness contnuty; Utlze network dagrams; and Demonstrate approprate and ethcal behavor and good work habts 48 49

26 Informaton Securty Fundamentals (cont.) Informaton Securty Fundamentals (cont.) 1.0 Informaton Securty: Informaton Securty Tenets of Informaton Securty The Seven Domans of a Typcal IT Infrastructure Weakest Lnk n the Securty of an IT Infrastructure IT Securty Polcy Framework 2.0 Changng How People and Busness Communcate: Evoluton of Voce Communcatons VoIP and SIP Rsks, Threats, and Vulnerabltes Convertng to a TCP/IP World Multmodal Communcatons Evoluton from Brck-and-Mortar to E-Commerce Why Busnesses Need an Internet Marketng Strategy IP Moblty 3.0 The Drvers of the Informaton Securty Busness: Defnng Rsk Management Implementng a BIA, a BCP, and a DRP Assessng Rsk, Threats, and Vulnerabltes Closng the Informaton Securty Gap Adherng to Complance Gudelnes and Laws Keepng Prvate Data Confdental 4.0 Access Controls: The Four Parts of Access Control The Two Types of Access Control Defnng an Authorzaton Polcy Identfcaton Methods and Gudelnes Authentcaton Processes and Requrements Accountablty Polces and Procedures Formal Methods of Access Control Threats to Access Controls Effects of Access Control Volatons Centralzed and Decentralzed Access Control 5.0 Securty Operatons and Admnstraton: Securty Admnstraton Complance Professonal Ethcs The Infrastructure for an IT Securty Polcy Data Classfcaton Standards Confguraton Management The Change Management Process The System Lfe Cycle (SLC) and Systems Development Lfe Cycle (SDLC) Software Development and Securty 6.0 Audtng, Testng, and Montorng: Securty Audtng and Analyss Defnng Your Audt Plan Audtng Benchmarks Audt Data - Collecton Methods Post-Audt Actvtes Securty Montorng Types of Log Informaton to Capture How to Verfy Securty Controls Montorng and Testng Securty Systems 7.0 Rsk, Response, and Recovery: Rsk Management and Informaton Securty The Process of Rsk Management Rsk Analyss Two Approaches: Quanttatve and Qualtatve Developng a Strategy for Dealng wth Rsk Evaluatng Countermeasures Controls and Ther Place n the Securty Lfe Cycle Plannng to Survve Backng Up Data and Applcatons Steps to Take n Handlng an Incdent Recovery From a Dsaster 8.0 Cryptography: What s Cryptography? Busness and Securty Requrements for Cryptography Cryptographc Applcatons and Uses n Informaton Securty Cryptographc Prncples, Concepts, and Termnology Cryptographc Applcatons, Tools, and Resources Prncples of Certfcates and Key Management 9.0 Networks and Telecommuncatons: The Open Systems Interconnecton Reference Model The Two Types of Networks TCP/IP and How It Works Network Securty Rsks Basc Network Securty Defense Wreless Networks 10.0 Malcous Attacks, Threats, and Vulnerabltes: Malcous Actvty on the Rse What Are You Tryng to Protect? Whom Are You Tryng to Catch? What s a Securty Breach? What are Rsks, Threats, and Vulnerabltes What s Malcous Software? Characterstcs, Archtecture, and Operatons of Malcous Software Man Types of Malcous Software A Bref Hstory of Malcous Software Threats to Organzatons What s a Malcous Attack? Attack Tools Anatomy of an Attack Attack Preventon Tools and Technques Incdent Detecton Tools and Technques 11.0 Informaton Securty Standards: Standards Organzatons ISO ISO/IEC PCI DSS 12.0 Informaton Securty Professonal Certfcatons: U.S. DoD/Mltary Standard Vendor-Neutral Professonal Certfcatons Vendor-Specfc Professonal Certfcatons 13.0 U.S. Complance Gudelnes & Laws: Complance s the Law The Federal Informaton Securty Management Act (FISMA) The Health Insurance Portablty and Accountablty Act (HIPAA) The Gramm-Leach Blley Act The Sarbanes-Oxley Act The Famly Educatonal Rghts and Prvacy Act The Chldren s Internet Protecton Act Makng Sense of Laws for Informaton Securty Complance TITLE: Informaton Securty Fundamentals: Natonal CyberWatch Center Edton (1st Edton) AUTHOR: Km & Solomon (2016) PUBLISHER: Jones & Bartlett Learnng etext ISBN (VtalSource):

27 TCP/IP Fundamentals Scrptng Fundamentals NCC 211: TCP/IP Fundamentals NCC 212: Scrptng Fundamentals 3 credt/unt hours Three hours of lecture weekly; one term Ths course offers an n-depth look at the varous TCP/IP protocols that comprse today s convergng communcaton technologes and state-of the-art networks. Ths course s ntended for students wshng to understand how communcaton and network protocols operate: programmers wrtng network applcatons, system admnstrators responsble for mantanng systems and networks utlzng the varous protocols, and users who deal wth network applcatons on a daly bass. 3 credt/unt hours Three hours of lecture weekly; one term Ths course offers an n-depth ntroducton to scrptng languages ncludng basc data types, control structures, regular expressons, nput/output, and textual analyss. PREREQUISITE: NCC 200: Networkng 1: Networkng Fundamentals (can be taken concurrently) PREREQUISITE: NCC 204: Lnux Server 1: Lnux Fundamentals Upon completon of ths course the student wll be able to: Use a packet snffer to capture traffc on a network; Analyze captured network/applcaton traffc; Descrbe how varous TCP/IP sute protocols functon (e.g., DNS, TCP); Explan how the encapsulaton of varous TCP/IP sute protocols works; Descrbe the varous TCP/IP sute protocol felds and dfferentate between them; and Dscuss what normal TCP/IP sute protocol behavor looks lke Upon completon of ths course the student wll be able to: Provde a foundaton for learnng to program; Wrte, run, and debug a program; Construct logcal condtons and choose approprate control statements; Understand the software development cycle and program debuggng; Desgn and mplement smple programs from user requrements 1.0 Capturng Network Traffc 9.0 User Datagram Protocol (UDP) 1.0 Introducton to Scrptng 9.0 Accessng Databases 2.0 Trace Fle Analyss 10.0 Doman Name System (DNS) 2.0 Scrpts, Varables, and Data Types 10.0 Network Programmng 3.0 Wreshark Functonalty and Fundamentals 3.0 Decsons and Loops 11.0 Web Applcatons 4.0 Workng wth TCP/IP utltes 5.0 Address Resoluton Protocol (ARP) 6.0 Internet Protocol (IP) v4 and v6 7.0 Internet Control Message Protocol v4 and v6 8.0 Transmsson Control Protocol (TCP) TITLE: TCP/IP Illustrated, Volume 1: The Protocols (2nd Edton) AUTHOR: Fall & Stevens (2012) PUBLISHER: Pearson ISBN: Functons 5.0 Objects and Classes 6.0 Modules 7.0 Fle Access 8.0 Text Processng and Regular Expressons TITLE: Introducton to Scrptng: Natonal CyberWatch Center Edton (1st Edton) AUTHOR: Mller & Ranum (2017) Prnt ISBN: , etext ISBN:

28 Intruson Detecton/Preventon Systems Fundamentals NCC 213: Intruson Detecton/Preventon Systems Fundamentals 4 credt/unt hours Four hours of lecture weekly; one term Intruson Detecton/Preventon Systems are crtcal components of well-desgned network archtectures. These systems act as a lne of defense, helpng protect company assets from attacks. In ths course, students gan a thorough groundng n the desgn, mplementaton, and admnstraton of IDSes/ IPSes, as well as practcal, hands-on experence workng wth these systems. In addton, students analyze varous attack sgnatures and the network traffc these systems collect. Intruson Detecton/Preventon Systems Fundamentals (cont.) 1.0 Network- and Host-Based IDS/IPS Solutons 2.0 Fundamentals of Traffc Analyss 3.0 Advanced Traffc Analyss 4.0 Workng wth Flters/Rules for Network Montorng 5.0 Introducton to Network Securty Montorng 6.0 Analyzng and Deconstructng Attack Sgnatures PREREQUISITE: Cyber Defense degree/certfcate: - NCC 201: Networkng II: Swtchng & Routng Fundamentals & NCC 210: Informaton Securty Fundamentals. NOTE: NCC 211: TCP/IP Fundamentals s recommended, but not requred n ths degree/certfcate Network Securty Admnstraton degree and Network Securty Admnstraton III certfcate: - NCC 201: Networkng II: Swtchng & Routng Fundamentals & NCC 211: TCP/IP Fundamentals & NCC 210: Informaton Securty Fundamentals Network Forenscs degree: - NCC 201: Networkng II: Swtchng & Routng Fundamentals & NCC 210: Informaton Securty Fundamentals. NOTE: NCC 211: TCP/IP Fundamentals s recommended, but not requred n ths degree/certfcate TITLE: Managng Securty wth Snort & IDS Tools AUTHOR: Cox & Gerg (2004) PUBLISHER: O Relly Meda ISBN: Upon completon of ths course the student wll be able to: Dfferentate between host-based and network-based IDS solutons; Setup and admnster an IDS n a workng network; Dssect and analyze varous types of normal and unusual traffc; Identfy false postves and false negatves; and Demonstrate approprate and ethcal behavor and good work habts 54 55

29 Ethcal Hackng Ethcal Hackng (cont.) NCC 214: Ethcal Hackng and Systems Defense 4 credt/unt hours Four hours of lecture weekly; one term The course combnes an ethcal hackng methodology wth the hands-on applcaton of securty tools to better help students secure ther systems. Students are ntroduced to common countermeasures that effectvely reduce and/or mtgate attacks. 1.0 Introducton to Ethcal Hackng 2.0 Penetraton testng professonal certfcatons 3.0 Reconnassance/Open Source Intellgence Gatherng 4.0 Scannng 5.0 Enumeraton PREREQUISITE: Cyber Defense degree/certfcate: - All precedng Techncal Courses n degree/certfcate Network Securty Admnstraton degree and Network Securty Admnstraton III certfcate: - NCC 220: Network Securty I: Network Securty Fundamentals & NCC 204: Lnux Server I: Lnux Fundamentals & NCC 206: Wndows Server I: Installng & Confgurng Wndows Server Network Forenscs degree: - NCC 213: Intruson Detecton/Preventon Systems Fundamentals 6.0 Explotaton 7.0 Post-Explotaton TITLE: Ethcal Hackng and Systems Defense: Natonal CyberWatch Center Edton (1st Edton) AUTHOR: Sean-Phlp Oryano (2016) PUBLISHER: Jones & Bartlett Learnng etext ISBN: Upon completon of ths course the student wll be able to: Utlze varous nformaton securty tools gven dfferent target systems n dfferent envronments; Dscuss how the tools nterrelate wth each other n an overall penetraton testng process; Implement countermeasures for varous types of attacks; Apply a common ethcal hackng methodology to carry out a penetraton test; Analyze how penetraton testng and ethcal hackng ft nto a comprehensve enterprse nformaton securty program; and Demonstrate ethcal behavor approprate to securty-related technologes 56 57

30 Dgtal Forenscs I Dgtal Forenscs I (cont.) NCC 215: Dgtal Forenscs I: Dgtal Forenscs Fundamentals 3 credt/unt hours Three hours of lecture weekly; one term Ths course ntroduces the student to the legal and techncal aspects of Dgtal Forenscs, ncludng general forensc processes, magng, hashng, fle recovery, fle system bascs, dentfyng msmatched fle types, reportng, and laws regardng computer evdence. 9.0 Herarchy of Access 10.0 Fle Systems 11.0 Physcal Analyss 12.0 Forensc Tool Valdaton PREREQUISITE: NCC 204: Lnux Server I: Lnux Fundamentals 13.0 Drves 14.0 Date and Tme Stamps 15.0 Logcal Analyss Upon completon of ths course the student wll be able to: Descrbe the standard dgtal forensc processes; Create a forensc copy of a pece of dgtal meda; Verfy a forensc copy; Identfy structures of the FAT fle system; Recover deleted fles manually; and Dscuss laws related to computer evdence 1.0 Introducton to Dgtal Forenscs 16.0 Commercal Tools 17.0 Wndows Regstry Analyss 18.0 Internet and Emal Forenscs 19.0 Ethcs TITLE: System Forenscs, Investgaton and Response (2nd Edton) AUTHOR: Easttom (2014) PUBLISHER: Jones & Bartlett Learnng ISBN: Overvew of Forensc Scences 3.0 Crmnal and Cvl Procedure 4.0 Courtroom Testmony 5.0 Evdence Law 6.0 Intellectual Property 7.0 Report Wrtng 8.0 Sezng and Imagng 58 59

31 Dgtal Forenscs II Operatng Systems Fundamentals NCC 216: Dgtal Forenscs II: Advanced Dgtal Forenscs 4 credt/unt hours Four hours of lecture weekly; one term Ths course ntroduces the student to the theory of forensc procedures, revew of dentfcaton, magng, and authentcaton, revew of FAT, NTFS, EXT3, and HFS Plus fle systems, ethcs, RAM capture, honeypots, Wndow s regstry analyss, moble devce forenscs, and Emal and web hstory analyss. NCC 217: Operatng Systems Fundamentals 3 credt/unt hours Three hours of lecture weekly; one term Ths course s desgned to provde an ntroducton to and basc techncal understandng of the functon and operaton of Mcrosoft Wndows operatng systems. The course wll focus on mcrocomputer operatng system features, broad concepts, and dagnostc tools that allow the student to rapdly determne the condton of a PC system and how best to rectfy a fault. Ths course also ntroduces the student to moble operatng systems. PREREQUISITE: NCC 215: Dgtal Forenscs I: Dgtal Forenscs Fundamentals Ths course s also ntended for those preparng for the Computng Technology Industry Assocaton s (CompTIA) A+ certfcaton exam ( ). Upon completon of ths course the student wll be able to: Identfy and create a forensc copy of meda, and authentcate dgtal evdence; Employ Lnux and Wndows-based dgtal forenscs tools for a partcular forensc task; Identfy key components of varous fle systems; Perform a forensc analyss usng Wndows regstry; Perform an analyss of Emal and web hstory; Demonstrate an understandng of data hdng technques 1.0 Introducton to Dgtal Forenscs 10.0 Capturng and Analyzng RAM and Swap 2.0 Introducton to Cyberforenscs 11.0 Honeypots 3.0 Imagng and Verfcaton 12.0 Moble Devce Forenscs PREREQUISITE: NCC 200: Networkng I: Networkng Fundamentals (can be taken concurrently) Upon completon of ths course the student wll be able to: Compare and contrast the features and requrements of Mcrosoft Operatng systems; Install and confgure the operatng system usng the most approprate method; Implement approprate command lne tools; Setup and confgure Wndows networkng on a clent/desktop; Perform preventve mantenance procedures usng approprate tools; Implement securty best practces to secure a workstaton; Explan the basc features of moble operatng systems; Compare and contrast methods for securng moble devces; and Implement and confgure moble devce synchronzaton 4.0 FAT Fle System 13.0 Forenscs on Sold State Drves : 5.0 Forensc Tools 6.0 NTFS 7.0 EXT Fle System 8.0 HFS Plus, Macntosh and Lnux Boot Processes 9.0 Wndows Regstry Analyss 14.0 Ethcs TITLE: Fle System Forensc Analyss AUTHOR: Carrer (2005) PUBLISHER: Pearson ISBN: Introducton to Operatng Systems 2.0 Introducng How Hardware and Software Work 3.0 Install, Mantan, and Troubleshoot Wndows OS 4.0 Workng wth the Command Lne 5.0 Mantanng and Troubleshootng Fundamentals 6.0 Implementng and Confgurng Securty Best Practces to Harden a Workstaton 7.0 Introducton to Moble Devces 60 61

32 Hardware I Hardware I (cont.) NCC 218: Hardware I: Hardware Fundamentals 4 credt/unt hours Four hours of lecture weekly; one term Ths course explores the nter-relatonshps between hardware and software at the system level. Topcs covered nclude: processors and chpsets, motherboards, memory, storage devces, and multmeda devces. Dagnostc software s used to dentfy and solate faulty devces and sub-systems. Ths course s also ntended for those preparng for the Computng Technology Industry Assocaton s (CompTIA) A+ certfcaton exam ( ). 4.0 Supportng Hard Drves 5.0 Supportng I/O and Storage Devces 6.0 Networkng 7.0 Laptops 8.0 Prnters 9.0 Troubleshootng Hardware Problems PREREQUISITE: NCC 217: Operatng Systems Fundamentals Upon completon of ths course the student wll be able to: Identfy the basc components of a mcrocomputer; Dstngush between the popular CPU chps n terms of ther basc characterstcs; Identfy basc procedures for dsk management; Identfy and nstall varous memory types; Identfy proper procedures for nstallng and confgurng perpheral devces; Identfy hardware methods of upgradng system performance, procedures for replacng basc subsystem components, unque components and when to use them; Identfy common symptoms and problems assocated wth each subsystem and how to troubleshoot and solate the problem; Dscuss the fundamental workngs of multmeda technology; Descrbe the bascs of how computers communcate wth each other; and Identfy the major components of a prnter TITLE: A+ Gude to Managng & Mantanng Your PC, 8th Edton AUTHOR: Andrews (2014) PUBLISHER: Cengage Learnng ISBN: PC Hardware 2.0 All About Motherboards 3.0 Supportng Processors and Upgradng Memory 62 63

33 Network Forenscs Network Securty I NCC 219: Network Forenscs and Incdent Response 4 credt/unt hours Four hours of lecture weekly; one term Ths course explores securty ncdents and ntrusons, ncludng dentfyng and categorzng ncdents, respondng to ncdents, log analyss, network traffc analyss, varous tools, and creatng an ncdent response team. NCC 220: Network Securty I: Network Securty Fundamentals 4 credt/unt hours Four hours of lecture weekly; one term Ths course prepares students for entry-level securty specalst careers by developng an n-depth understandng of network securty prncples and the tools and confguratons needed to secure a network. PREREQUISITE: NCC 214: Ethcal Hackng and Systems Defense PREREQUISITE: NCC 213: Intruson Detecton/Preventon Systems Fundamentals (can be taken concurrently) Upon completon of ths course the student wll be able to: Detect and characterze varous types of computer and network ncdents; Demonstrate a practcal understandng of the analyss of artfacts left on a compromsed system; Demonstrate an understandng of how to effectvely respond to prvleged and major event ncdents; Demonstrate an understandng of advsores, alerts, and management brefngs; Demonstrate the ablty to communcate ncdent response fndngs to techncal and non- techncal personnel 1.0 Overvew of Incdent Response 2.0 Malware Analyss Upon completon of ths course the student wll be able to: Descrbe the securty threats facng modern network nfrastructures; Secure routers; Implement Authentcaton, Authorzaton, and Accountng (AAA); Mtgate threats to routers and networks usng Access Control Lsts (ACLs); Implement secure network desgn, management, and reportng; Mtgate common Layer 2 attacks; Implement and admnster a frewall; Implement a ste-to-ste VPN; and Implement a remote access VPN 3.0 Workng Over a Network 4.0 Network Forenscs 5.0 Intellgence Gatherng 6.0 Host-Based Intruson Detecton Systems (IDSes) 7.0 Honeypots 8.0 Identfyng Indcators of an Intruson 9.0 Ethcs n Dgtal Forenscs : 1.0 Modern Network Securty Threats 2.0 Securng Network Devces 3.0 Authentcaton, Authorzaton, and Accountng 4.0 Implementng Frewall Technologes 5.0 Securng the Local-Area Network (LAN) 6.0 Cryptographc Systems 7.0 Implementng Vrtual Prvate Networks (VPNs) 8.0 Managng a Secure Network 64 65

34 Programmng Logc Programmng Logc (cont.) NCC 221: Introducton to Secure Programmng Logc 3 credt/unt hours - Three hours of lecture weekly; one term Ths s an ntroductory course n structured programmng logc. Students wll learn to analyze problems; defne data usng smple data types and arrays; and create algorthmc solutons usng basc control structures (sequence, selectons, loops) and functons. Students learn to systematcally break down a problem nto manageable parts; plan and desgn logcal solutons; and wrte effectve, structured, and well-documented nstructons. Emphass wll be on problem-solvng approaches (algorthms) and the fundamental concepts and programmng technques common to modern computer languages ncludng varable assgnment, expressons, nput/output statements, loops, f-then-else and case constructs, functons, arrays, etc. The concepts learned n ths course are applcable to multple modern programmng languages. 1.0 Overvew of Computers and Logc 2.0 Comparson of Programmng Languages 3.0 Number Systems/ASCII (Amercan Standard Code for Informaton Interchange) 4.0 Program Structure 5.0 Modules, Herarchy Charts, and Documentaton 6.0 Wrtng a Complete Program 7.0 Loopng 8.0 Arrays/Lsts 9.0 Valdatng Input PREREQUISITE: General Educaton IT course (can be taken concurrently) 10.0 Modularzaton Technques 11.0 Object-Orented Programmng Concepts Upon completon of ths course the student wll be able to: Descrbe the software development lfe cycle; Descrbe how securty has to be a consderaton from the pont of ntal desgn and throughout the lfecycle of a product; Analyze problems and desgn structured solutons; Create and apply smple data types and arrays; Identfy common codng errors (e.g., buffer overflow and nteger errors) that lead to nsecure programs; Create algorthmc solutons usng basc control structures (sequence, decsons, loops) and functons; Dscuss the mportance of nput valdaton and wrte correct nput valdaton code; Comple, execute, and run smple programs; Descrbe the mportance of secure and responsble programmng; and Conduct a personal code revew (focused on common codng errors) on a program component usng a provded checklst 12.0 Programmng Graphcal User Interfaces (GUIs) 13.0 Software Development Lfe Cycle 14.0 Ethcs and Intellectual Property 15.0 Globalzaton and Collaboraton TITLE: Programmng and Problem Solvng wth C++: Bref, Sxth Edton AUTHOR: Dale & Weems (2014) PUBLISHER: Jones & Bartlett Learnng ISBN:

35 Computer Scence I Computer Scence I (cont.) NCC 222: Computer Scence I 4 credt/unt hours Four hours of lecture weekly; one term Ths course teaches problem-solvng sklls usng accepted programmng practces. Dscussons and hands-on labs focus on algorthms, data structures, fundamental syntax of an object-orented language, data types, control structures, fle I/O, classes, objects, methods, and arrays. 3.0 Program Development Cycle: 3.1 Desgn the soluton 3.2 Code 3.3 Test 3.4 Document 4.0 Data Types 13.0 Graphcal User Interfaces: 13.1 Components used n developng a GUI wndow 13.2 Complex GUI usng layouts 13.3 ActonLsteners PREREQUISITE: NCC 221: Introducton to Secure Programmng Upon completon of ths course the student wll be able to: Use an object-orented programmng language for problem solvng; Desgn algorthms and translate them nto workng solutons; Demonstrate the mportance of testng and valdatng the soluton; Identfy the data types and varable namng conventons; Demonstrate how to do calculatons; Demonstrate nputtng and outputtng of data; Identfy technques for formattng data; Construct programs usng the three control structures: sequence, selecton, and repetton; Wrte programs usng arrays; Identfy, explan, and dscuss data organzaton; and Develop basc GUI (Graphcal User Interfaces) usng varous programmng components 1.0 Role of Dfferent Programmng Languages: 1.1 Procedural 1.2 Event-Drven 1.3 Object-Orented 2.0 Introducton to a Structured Language: 2.1 Logc dagrams 2.2 Use of Integrated Development Envronment 5.0 Arthmetc Expressons TITLE: Java Illumnated, Fourth Edton 6.0 Input and Output: AUTHOR: Anderson & Francesch (2016) 6.1 Acceptng data from the keyboard PUBLISHER: Jones & Bartlett Learnng 6.2 Formattng output ISBN: Selecton: 7.1 Smple If 7.2 Nested If 7.3 Swtch 8.0 Repetton: 8.1 whle loop 8.2 do loop 8.3 for loop 9.0 Methods and Classes 10.0 Data Fles: 10.1 Data vocabulary 10.2 Sequental fles 10.3 Text fles 11.0 Arrays 12.0 Debuggng Technques: 12.1 Use of loop nvarants 12.2 Use of method precondtons and post-condtons 12.3 Use of stubs and drvers 12.4 Program tracng, testng, documentaton and verfcaton 68 69

36 Computer Scence II Computer Scence II (cont.) NCC 223: Computer Scence II 4 credt/unt hours Four hours of lecture weekly; one term Ths course teaches sklls for solvng complex problems. Dscussons and hands-on labs focus on advanced data structures and algorthms for recurson, ponter varables, lnked lsts, stacks, queues, hash tables, collectons, sortng and searchng, and trees. PREREQUISITE: NCC 222: Computer Scence I Upon completon of ths course the student wll be able to: Analyze problems to determne most approprate data structure; Use an object-orented or structured programmng language for complex problem solvng; Develop well-wrtten, secure, and documented programs that use recurson, dynamc memory allocaton, and abstract data types; Evaluate mathematcal effcency of algorthms and sortng and searchng technques; Dscuss the advantages and dsadvantages of object-orented languages compared to procedural programmng languages; Apply abstract data types to applcatons; Use recurson to solve loopng problems; Dscuss advantages of encapsulaton and nhertance; and Work n teams to develop large, complex programs 1.0 Introducton to Abstract Data Types (ADTs): 1.1 Defnton of ADT 1.2 Use of Specfcaton and Implementaton Fles 1.3 Collectons 2.0 Recurson: 2.1 Statc Versus Dynamc Storage Allocaton 2.2 Recursve Versus Iteratve Solutons 3.0 Databases: 3.1 Basc Table and Data Commands 3.2 Connectng to a Database 4.0 Abstract Data Types: 4.1 Lnked Lsts 4.2 Stacks 4.3 Queues 4.4 Bnary Search Trees 4.5 Varous Tree Traversals 4.6 Heaps 4.7 Collectons 5.0 Bg-O Notaton and Effcency of Algorthms: 5.1 Defnton 5.2 Examples 6.0 Sortng Algorthms: 6.1 O(N2) Algorthms 6.2 O(N*logN) Algorthms 7.0 Searchng Algorthms: 7.1 Sequental Search 7.2 Bnary Search 7.3 Hashng 8.0 Object-Orented Programmng Topcs: 8.1 Encapsulaton 8.2 Inhertance 8.3 Polymorphsm and Dynamc Bndng 8.4 Operatons n Derved Classes 8.5 Constructors n Derved Classes 9.0 Advanced Sortng/Searchng Technques: 9.1 Bnary Sort 9.2 Shell Sort Trees 10.0 Advanced Graphcal User Interfaces (GUIs): 10.1 Tmers 10.2 Mouse Interface Features TITLE: Object-Orented Data Structures Usng Java, Fourth Edton AUTHOR: Dale, Joyce & Weems (2018) PUBLISHER: Jones & Bartlett Learnng ISBN:

37 Computer Archtecture Relatonal Databases NCC 224: Computer Archtecture 4 credt/unt hours Four hours of lecture weekly; one term Ths course s an ntroducton to the organzaton and operaton of a computer system. The focus of the course s on machne representaton of nstructons and data through the study of a low-level, machne-orented assembly language. NCC 225: Introducton to Relatonal Databases 3 credt/unt hours Three hours of lecture weekly; one term Ths course ntroduces elementary relatonal database concepts, ncludng but not lmted to database modelng and Structured Query Language (SQL). PREREQUISITE: NCC 223: Computer Scence II PREREQUISITE: NCC 222: Computer Scence I Upon completon of ths course the student wll be able to: Descrbe the operatonal components of a Von Neumann Machne and explan how they work together to as a modern computer; Desgn hgher-level language program control constructs usng a lower-level (assembly-level) language; Model hgher-level language data structures such as arrays, queues and stacks, usng a lower-level language; Solve arthmetc problems when numbers are represented n bases other than decmal (e.g., bnary, octal and hexadecmal); and Locate and dentfy data and nstructons represented n memory dumps 1.0 The 7 Layer Model of the Modern Computer 9.0 Basc Theorems of Boolean Algebra, Truth Tables and Logc Crcuts 2.0 Program Control Structures 10.0 Dgtal Logc 3.0 Data representaton Systems 4.0 Von Neumann s Machne and Machne Cycle 5.0 Revew of Boolean Operatons TITLE: Essentals of Computer Organzaton and 6.0 Hgher Level Language Program Constructs Archtecture, Enhanced Fourth Edton AUTHOR: Null & Lobur (2015) 7.0 Data Modelng PUBLISHER: Jones & Bartlett Learnng 8.0 Array Representaton and Implementaton ISBN: Upon completon of ths course the student wll be able to: Understand the purpose, phlosophy, and motvaton behnd databases; Understand the capabltes of relatonal databases; Perform data modelng; Consder specal database desgns; Implement a database desgn; Perform basc database admnstrator functons; and Demonstrate approprate and ethcal behavor and good work habts : 1.0 Introducton to databases 2.0 Data modelng 3.0 Database desgn 4.0 Database mplementaton wth the relatonal model - SQL 5.0 Mult-user databases 6.0 Enterprse databases 72 73

38 Secure Codng Secure Codng (cont.) NCC 226: Secure Codng 5.0 Integer overflow and msuse of strngs and ponters 3 credt/unt hours Three hours of lecture weekly; one term Ths course covers securty vulnerabltes of programmng n weakly typed languages lke C and n more modern languages lke Java. Common weaknesses exploted by attackers are dscussed, as well as mtgaton strateges to prevent those weaknesses. Students practce programmng and analyss of software systems through testng and statc analyss. PREREQUISITE: NCC 223: Computer Scence II Upon completon of ths course the student wll be able to: Dfferentate between types of securty vulnerabltes; Descrbe varous explotatons and rsks n software; Use securty assurance technques n ther codng to mtgate vulnerabltes; Testng and analyze software to provde securty assurance; and Demonstrate approprate and ethcal behavor and good work habts 6.0 Communcaton Vulnerabltes: 6.1 Concurrency 6.2 Secure nter-process communcaton and authorzaton 6.3 Authentcaton and networkng protocols 7.0 Unt Testng for Securty Vulnerabltes: 7.1 Fuzzng, 7.2 Abuse Cases 8.0 Code Revew: 8.1 Formal nspectons 8.2 Statc analyss 9.0 Vulnerabltes n Modern Languages: 9.1 Insecurtes n Java and hypertext preprocessor (PHP) 10.0 Standard Rsk Mtgaton Strateges and Resources: 10.1 Codng standards 10.2 Enterprse Securty API (ESAPI) 1.0 Overvew of securty vulnerabltes and rsks n software: 1.1 Common Weakness Enumeraton(CWE) 1.2 Open Web Applcaton Securty Project (OWASP) Top Data Protecton: 2.1 Methods for preventng unauthorzed access or manpulaton of data 3.0 Input valdaton and user authentcaton 4.0 Memory Management: 4.1 Buffer overflows 4.2 Memory corrupton 4.3 Prvlege volatons 74 75

39 Computer Scence III Computer Scence III (cont.) NCC 227: Computer Scence III 5.0 Desgn, mplementaton and use of sngly-lnked lsts and doubly-lnked lsts 3 credt/unt hours Three hours of lecture weekly; one term Ths course covers desgn and mplementaton of large-scale problems; abstract data types; data structures (fles, sets, ponters, lsts, stacks, queues, trees, graphs); algorthmc analyss; software engneerng prncples; software and nformaton assurance; and an ntroducton to searchng and sortng algorthms. 6.0 Desgn, mplementaton and use of stacks and queues 7.0 Desgn, mplement and use of sets, hashng, maps, trees and graphs 8.0 Implementaton and use of generc programmng PREREQUISITE: NCC 223: Computer Scence II 9.0 Tenets of ethcal and professonal behavor of programmers 10.0 Securty awareness and assurance through secure desgn and formal testng Upon completon of ths course the student wll be able to: Desgn, mplement and formally test for the elmnaton of common software securty vulnerabltes n a medum-szed software applcaton, utlzng super-classes, subclasses, abstract classes, and nterfaces; Implement and utlze excepton-handlng technques; Desgn, construct, and assess approprateness of solutons usng a varety of basc recursve technques; Desgn, mplement, and utlze data structures ncludng arrays, lnked lsts, stacks, queues, trees, sets, hashng, maps and graphs; Understand tme and space effcency analyss of searchng and sortng algorthms; and Practce the tenets of ethcal and professonal behavor promoted by professonal socetes and accept the professonal responsbltes and labltes assocated wth software development TITLE: Introducton to Java Programmng - Comprehensve Verson, 10th Edton AUTHOR: Danel Y. Lang (2014) PUBLISHER: Upper Saddle Rver: Pearson Publshng ISBN-13: ISBN-10: Desgn, mplementaton and use of the basc classes and object-orented programs ncludng encapsulaton, nhertance, polymorphsms, dynamc bndng, abstract classes and nterface 2.0 Implementaton and use of excepton handlng n wrtng Java programs 3.0 Prncples and use of recursve technques n wrtng Java programs 4.0 Implementaton of varous searchng and sortng algorthms, and the analyss of algorthm complexty and program verfcaton 76 77

40 C# Programmng C# Programmng (cont.) NCC 228: C# Programmng 8.0 Wrtng applcatons that use a Wndows user nterface 3 credt/unt hours Three hours of lecture weekly; one term Ths course ntroduces a current Object Orented Programmer to the C# programmng language, a part of the Mcrosoft.NET platform. All programmng elements of the language are presented n a rapd survey of the language. Emphass s placed on nterfacng wth databases and class desgn. The sklls needed to wrte console applcatons, Wndows applcatons, and begnnng Internet applcatons are presented. PREREQUISITE: NGen Ed: Math and NCC 222: Computer Scence I 9.0 Wrtng begnnng Internet applcatons TITLE: Startng out wth Vsual C# 2012 (wth CD-ROM), 3rd Edton AUTHOR: Tony Gadds (2014) PUBLISHER: Addson-Wesley ISBN-13: ISBN-10: Upon completon of ths course the student wll be able to: Create graphcal Wndows applcatons that use the standard graphcal objects of the Wndows platform; Interface wth databases and perform routne database queres va the C# applcaton; Make effectve use of Object Orented Class Desgn, ncludng nhertance, and to make use of the advanced features of the language; Wrte console applcatons as well as begnnng Internet applcatons; and Demonstrate approprate and ethcal behavor and good work habts 1.0 Developng C# programs that run n a console wndow, n a graphcal wndows envronment, and n deployment on a webste 2.0 Presentng the key features of the language, ncludng language elements, class desgn, and nhertance 3.0 Handlng C# exceptons to avod program crashes 4.0 Usng C# arrays, strngs, and propertes 5.0 Codng C# ndexers and enumerators 6.0 Utlzng the C# nterfaces, delegates, and event handlers 7.0 Effectve utlzaton of the C# contaner classes 78 79

41 Structured Query Language Assured Software Engneerng NCC 229: Structured Query Language 3 credt/unt hours Three hours of lecture weekly; one term Ths course covers programmng n the Structured Query Language. Students are taught to create and mantan database objects and to store, retreve, and manpulate data. In addton, students learn to create blocks of applcaton code that can be shared by multple forms, reports, and data management applcatons. Students also learn how to wrte and apply trggers, procedures, and packages. Demonstratons and hands-on practce renforce the fundamental concepts. NCC 230: Assured Software Engneerng 3 credt/unt hours Three hours of lecture weekly; one term Ths course covers the basc prncples and concepts of assured software engneerng; system requrements; secure programmng n the large; modelng and testng; object-orented analyss and desgn usng the Unfed Modelng Language (UML); desgn patterns; frameworks and Applcaton Programmng Interfaces (APIs); clentserver archtecture; user nterface technology; and the analyss, desgn and programmng of software systems. PREREQUISITE: NCC 225: Introducton to Relatonal Databases PREREQUISITE: NCC 227: Computer Scence III Upon completon of ths course the student wll be able to: Use SQL commands to create, mantan, and query a relatonal database; Wrte SQL scrpts that create, mantan, and query relatonal databases; Develop, mantan, and use trggers, procedures, and packages wthn a relatonal database; and Demonstrate approprate and ethcal behavor and good work habts 1.0 Query commands 14.0 Functons 2.0 Jonng multple tables 15.0 Packages 3.0 Sngle row and group functons 16.0 Trggers 4.0 Subqueres 17.0 Performance tunng 5.0 Creatng and managng tables 6.0 Constrants 7.0 Data manpulaton TITLE: Mcrosoft SQL Server 2008: T-SQL Fundamentals 8.0 Vews (1st Edton) & Insde Mcrosoft SQL Server Other objects: sequences, ndexes AUTHOR: Itzk Ben-Gan (2008 & 2009) 10.0 Creatng and managng users PUBLISHER: Mcrosoft Press 11.0 Formattng output ISBN-13: /ISBN-10: & 12.0 PL/SQL blocks ISBN-13: Procedures ISBN-10: Upon completon of ths course the student wll be able to: Dscuss software project management and securty process models; Descrbe the role of assured software engneerng; Apply analyss sklls to assure functonalty and qualty requrements; Descrbe software archtecture, archtectural patterns, and clent-server computng; Dscuss msuse cases; Descrbe desgn patterns: composte, player-role, sngleton, etc.; Develop and revew core UML dagrams; Descrbe doman modelng; Dscuss reusable technologes; Assure correct software behavor under all condtons; Verfy and valdate software ncludng acceptance testng; and Demonstrate approprate and ethcal behavor and good work habts : 1.0 Evaluatng the assurance and performance of varous smple software desgns 2.0 Addton of features, ncludng assurance features, to exstng systems 3.0 Testng a system to verfy conformance to test cases ncludng assurance 4.0 Buldng a graphcal user nterface (GUI) for an applcaton 5.0 Buldng and readng core subset of UML 6.0 Developng and presentng a smple set of assured software requrements 7.0 Implementng and usng the above usng reusable technology, whle understandng rsks of reuse 80 81

42 Moble Applcaton Programmng Database Admnstraton NCC 231: Moble Applcaton Programmng NCC 232: Database Admnstraton 3 credt/unt hours Three hours of lecture weekly; one term Ths course covers the fundamental programmng prncples for moble devces. The software archtecture and user experence consderatons underlyng handheld software applcatons and ther development envronments wll be nvestgated. Concepts wll be renforced by hands- on programmng assgnments, whch wll be run on a current moble platform. PREREQUISITE: NCC 223: Computer Scence II Upon completon of ths course the student wll be able to: Understand the meanng and uses of moble computng; Understand of one or more major moble operatng systems; Descrbe the basc structures and objects of moble programmng; Understand how busnesses use moble applcatons; Plan, develop, and code moble applcatons; Have a frm bass for further tranng n moble applcaton development; and Demonstrate approprate and ethcal behavor and good work habts 1.0 Introducton to Moble Operatng System 2.0 Moble Applcaton Market/Busness Issues TITLE: Androd: How to Program, 2nd Edton 3.0 Introducton to Applcatons AUTHOR: Paul Detal, Harvey Detal, Abbey Detal (2014) 4.0 Classes, Objects, Methods PUBLISHER: Pearson 5.0 Varables/Constants and Assgnment ISBN-13: Data Types ISBN-10: Control Structures 8.0 Decson/Selecton 9.0 Iteraton/Repetton 10.0 Arrays 3 credt/unt hours Three hours of lecture weekly; one term Ths course s desgned to gve the database admnstrator (DBA) a frm foundaton n basc admnstratve tasks and provde the necessary knowledge and sklls to set up, mantan, and troubleshoot a relatonal database. Students learn to use an admnstraton tool to startup and shutdown a database, create a database, manage fle and database storage, and manage users and ther prvleges. In addton, students learn to organze the database and to move data nto and between databases under dfferent envronments. Hands-on practces help to renforce key concepts. PREREQUISITE: NCC 229: Structure Query Language Upon completon of ths course the student wll be able to: Manage database fles; Manage tablespaces, segments, extents, and blocks; Manage users, prvleges, and resources; Start up and shut down an nstance and database; Use Natonal Language Support Features (NLSF); and Demonstrate approprate and ethcal behavor and good work habts : 1.0 DBMS nstallaton 2.0 SQL*Plus, Import, SQL*Loader, and other DBA tools, ncludng the new wzards 3.0 DBMS account management 4.0 DBMS performance tunng, ncludng the use of rules-based or cost-based optmzer, SQL statement tunng, and nstance tunng 5.0 Advanced topcs from PL/SQL programmng and the enhanced resource management tools to audtng and parttonng 6.0 Internet functonalty usng Portal, the HTML server, Java, etc. 7.0 Syntax references for SQL, PL/SQL bult-n functons, and SQL*Plus 82 83

43 Structured System Analyss Structured System Analyss (cont.) NCC 233: Structured System Analyss 3 credt/unt hours Three hours of lecture weekly; one term Ths course presents the System Development Lfe Cycle (SDLC), as the bass for the development of computer systems. Varous analyss tools are taught to ad students n the preparaton of all aspects of system development. PREREQUISITE: NCC 227: Computer Scence III Upon completon of ths course the student wll be able to: Develop the ablty to analyze present nformaton flow; Use data flow dagrams for system specfcaton; Wrte process specfcatons; Buldng data dctonares; Descrbe the use of CASE tools; Test systems; Desgn nput, output, and user nterfaces; and Demonstrate approprate and ethcal behavor and good work habts 1.0 Introducton: 1.1 The system lfe cycle 1.2 CASE tools 1.3 Organzatonal styles 1.4 Feasblty studes 3.0 The analyss process: 3.1 Data flow dagrams 3.2 Data dctonares 3.3 Process specfcatons 3.4 Decson support system 3.5 The systems proposal 4.0 Elements of desgn: 4.1 Output 4.2 Input 4.3 Database and fles 4.4 User nterfaces 4.5 Data entry 5.0 Qualty assurance: 5.1 Concepts 5.2 Tranng users 5.3 Testng systems TITLE: Systems Analyss and Desgn, 10th Edton AUTHOR: Harry Rosenblatt (2013) PUBLISHER: Cengage Learnng ISBN-13: ISBN-10: The use of structured methodologes: 2.1 Samplng 2.2 Intervewng 2.3 Questonnares 2.4 Observaton 2.5 Prototypng 84 85

44 NATIONALCYBERWATCH.ORG

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Product documentation. Issue:

Product documentation. Issue: Product documentaton Issue: 02.05.2017 Table of Contents Product documentaton 1 enet SMART HOME system... 5 1.1 System requrements... 5 1.2 Commssonng va... 5 1.3 Operaton va enet SMART HOME app... 7 2

More information

Cisco TelePresence MCU 4200 Series

Cisco TelePresence MCU 4200 Series Csco TelePresence MCU 4200 Seres Gettng started 61-0002-08 Contents General nformaton... 3 About the Csco TelePresence MCU 4200 Seres... 3 Package contents... 3 Port and LED locaton... 3 LED behavor...

More information

Security. Workplace Manager

Security. Workplace Manager User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

kccvoip.com basic voip training NAT/PAT extract 2008

kccvoip.com basic voip training NAT/PAT extract 2008 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of

More information

CCNA Routing and Switching Course Overview

CCNA Routing and Switching Course Overview CCNA Routing and Switching Course Overview Course Structure and Sequences Market research and global employers have consistently indicated that the skills gap for general networking skills is shrinking,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Codian MCU MCU 4200 Series

Codian MCU MCU 4200 Series Codan MCU MCU 4200 Seres Gettng started Codan MCU MCU 4200 Seres Gettng started Copyrght Codan 2008. All rghts reserved. Ths Gettng Started Gude may not be coped, photocoped, translated, reproduced, or

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Guidelines for Developing Effective Slide Presentations

Guidelines for Developing Effective Slide Presentations Gudelnes for Developng Effectve Slde Presentatons Most presentatons consst of three man components: Content Vsuals Delvery Content Know your materal. No matter how great your presentaton looks, nothng

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

CCNA Routing and Switching Scope and Sequence

CCNA Routing and Switching Scope and Sequence Cisco Network Academy Network Engineering technology 1, 2, 3&4 CCNA 1 2 3 4 CCNA Routing and Switching Scope and Sequence Target Audience The Cisco CCNA Routing and Switching curriculum is designed for

More information

F-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727)

F-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727) ONICON Flow and Energy Measurement F-5000 Vew Software Installaton and Operaton Gude 11451 Belcher Road South, Largo, FL 33773 USA Tel +1 (727) 447-6140 Fax +1 (727)442-5699 2032-1 / 107050 Rev B www.oncon.com

More information

ANSYS FLUENT 12.1 in Workbench User s Guide

ANSYS FLUENT 12.1 in Workbench User s Guide ANSYS FLUENT 12.1 n Workbench User s Gude October 2009 Copyrght c 2009 by ANSYS, Inc. All Rghts Reserved. No part of ths document may be reproduced or otherwse used n any form wthout express wrtten permsson

More information

CCNA ROUTING & SWITCHING

CCNA ROUTING & SWITCHING CCNA ROUTING & SWITCHING Curriculum Overview The CCNA Routing and Switching curriculum consists of four courses that make up the recommended learning path. Students will be prepared to take the Cisco CCENT

More information

Mellanox CloudX, Mirantis Fuel Solution Guide

Mellanox CloudX, Mirantis Fuel Solution Guide Mellanox CloudX, Mrants Fuel Soluton Gude Rev.0 www.mellanox.com NOTE: THIS HARDWARE, SOFTWARE OR TEST SUITE PRODUCT ( PRODUCT(S) ) AND ITS RELATED DOCUMENTATION ARE PROVIDED BY MELLANOX TECHNOLOGIES AS-IS

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

User Manual SAPERION Web Client 7.1

User Manual SAPERION Web Client 7.1 User Manual SAPERION Web Clent 7.1 Copyrght 2016 Lexmark. All rghts reserved. Lexmark s a trademark of Lexmark Internatonal, Inc., regstered n the U.S. and/or other countres. All other trademarks are the

More information

InfoTerminal Touch Installation Instructions

InfoTerminal Touch Installation Instructions Order no.: 2071 xx 1. Safety warnngs Electrcal equpment must be nstalled and ftted by qualfed electrcans only and n strct observance of the relevant accdent preventon regulatons. Cut out the crcut breaker

More information

VideoJet X10 SN Network Video Server. Installation and Operating Manual

VideoJet X10 SN Network Video Server. Installation and Operating Manual VdeoJet X10 SN Network Vdeo Server en Installaton and Operatng Manual VdeoJet X10 SN VdeoJet X10 SN Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

CCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018

CCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018 CCNA Routing and Switching Scope and Sequence Last updated August 22, 2018 Target Audience The Cisco CCNA Routing and Switching curriculum is designed for Cisco Networking Academy students who are seeking

More information

IP Training Programme

IP Training Programme IP Tranng Programme Module 1: IP Generc Sesson 4: Applcatons and protocols ROUTING PROTOCOLS 1 Route table creaton The route table n routers can be created and mantaned n two ways 1: Statc route table

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory.

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory. wth Optc6 and Optc Cameras Quck Start Gude FOR OUTDOOR TRACKING ONLY unless used n conjuncton wth the Indoor Trackng Accessory. CONGRATULATIONS ON SCORING YOUR SOLOSHOT Our category-creatng lne of personal

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

Network Engineering/Cyber Security I & II

Network Engineering/Cyber Security I & II Network Engineering/Cyber Security I & II Program Description: The first year course teaches the basic techniques of computer safety and maintenance. Students learn to assemble/disassemble personal computers

More information

PRIMERGY ECONEL 30. Operating manual. Introduction. Important notes. Preparing for use. Operation. Troubleshooting and tips.

PRIMERGY ECONEL 30. Operating manual. Introduction. Important notes. Preparing for use. Operation. Troubleshooting and tips. Introducton Important notes PRIMERGY ECONEL 30 Preparng for use Operaton Operatng manual Troubleshootng and tps System expansons Techncal data Index November 2002 edton Mcrosoft, MS, MS-DOS, Wndows, and

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Scope and Sequence: CCNA Exploration v4.0

Scope and Sequence: CCNA Exploration v4.0 Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are

More information

Modelling a Queuing System for a Virtual Agricultural Call Center

Modelling a Queuing System for a Virtual Agricultural Call Center 25-28 July 2005, Vla Real, Portugal Modellng a Queung System for a Vrtual Agrcultural Call Center İnc Şentarlı, a, Arf Orçun Sakarya b a, Çankaya Unversty, Department of Management,06550, Balgat, Ankara,

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Informaton Assurance Certfcaton Paper Copyrght SANS Insttute Author Retans Full Rghts Ths paper s taken from the GIAC drectory of certfed professonals. Repostng s not permted wthout express wrtten

More information

Operating Manual CELVIN NAS

Operating Manual CELVIN NAS Operatng Manual System CELVIN NAS Congratulatons on your purchase of an nnovatve product from Fujtsu. Latest nformaton about our products, tps, updates etc. can be found on the Internet at: http://www.fujtsu.com/fts/

More information

A plan-driven dynamic reconfiguration mechanism for C2 Communities of Interest

A plan-driven dynamic reconfiguration mechanism for C2 Communities of Interest 15 th ICCRTS The Evoluton of C2 Ttle of Paper: A plan-drven dynamc reconfguraton mechansm for C2 Communtes of Interest Topcs Topc 6: Modelng and Smulaton Paper ID ID# 080 Authors JngJng Yan ZhuYun Duanmu

More information

Thomson Gateways and Multiple IP Adresses

Thomson Gateways and Multiple IP Adresses Thomson Gateways and Multple IP Adresses Date: June 2007 Verson: v1.0 Abstract: Applcablty: Ths applcaton note provdes techncal nformaton on how the Thomson Gateway DSL routers can be ntegrated n varous

More information

4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management.

4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management. //7 Prnceton Unversty Computer Scence 7: Introducton to Programmng Systems Goals of ths Lecture Storage Management Help you learn about: Localty and cachng Typcal storage herarchy Vrtual memory How the

More information

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9

More information

5.0 Quality Assurance

5.0 Quality Assurance 5.0 Dr. Fred Omega Garces Analytcal Chemstry 25 Natural Scence, Mramar College Bascs of s what we do to get the rght answer for our purpose QA s planned and refers to planned and systematc producton processes

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

If you miss a key. Chapter 6: Demand Paging Source:

If you miss a key. Chapter 6: Demand Paging Source: ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Transit Networking in ATM/B-ISDN based on Service Category

Transit Networking in ATM/B-ISDN based on Service Category Transt Networkng n ATM/B-ISDN based on Servce Category Young-Tak Km Dept. of Informaton and Communcaton Engneerng, College of Engneerng, YeungNam Unv. E-mal : ytkm@ynucc.yeungnam.ac.kr ABSTRACT The ATM

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Operating Manual CELVIN NAS

Operating Manual CELVIN NAS Operatng Manual System CELVIN NAS Congratulatons on your purchase of an nnovatve product from Fujtsu. Latest nformaton about our products, tps, updates etc. can be found on the Internet at: http://www.fujtsu.com/fts/

More information

Installation Instructions. METRAwin Version 8/ Calibration Software

Installation Instructions. METRAwin Version 8/ Calibration Software Installaton Instructons METRAwn 90 Calbraton Software 3-349-717-15 Verson 8/05.13 Copyrght Copyrght 2003-2013 GMC-I Messtechnk GmbH. All rghts reserved. These nstallaton nstructons, as well as the software

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Configuration guide. PlantWatchPRO. supervisor for small-medium installations LEGGI E CONSERVA QUESTE ISTRUZIONI READ AND SAVE THESE INSTRUCTIONS.

Configuration guide. PlantWatchPRO. supervisor for small-medium installations LEGGI E CONSERVA QUESTE ISTRUZIONI READ AND SAVE THESE INSTRUCTIONS. 30/06/2006 30/06/2006 30/06/2006 30/06/2006 16:36:16 16:36:16 16:36:16 16:36:16 X X X 30/06/2006 30/06/2006 30/06/2006 30/06/2006 16:36:16 16:36:16 16:36:16 16:36:16 X X 30/06/2006 16:36:16 16:36:16 16:36:16

More information

User s Guide for Express and Select Class Printers

User s Guide for Express and Select Class Printers User s Gude for Express and Select Class Prnters ImageCard and UltraGrafx Seres June 2000 Part No. 526945-001 Lablty statement Regulatory complance Trademark acknowledgments Propretary Notce Please note

More information

INSTALL AND REGISTER PASTEL EVOLUTION

INSTALL AND REGISTER PASTEL EVOLUTION INSTALL AND REGISTER PASTEL EVOLUTION LESSON 1 LEARNING OUTCOME The purpose of ths lesson s to successfully nstall and regster Pastel Evoluton. LEARNING OBJECTIVES On completon of ths lesson, you wll be

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Computer models of motion: Iterative calculations

Computer models of motion: Iterative calculations Computer models o moton: Iteratve calculatons OBJECTIVES In ths actvty you wll learn how to: Create 3D box objects Update the poston o an object teratvely (repeatedly) to anmate ts moton Update the momentum

More information

Setup and Use. Version 3.7 2/1/2014

Setup and Use. Version 3.7 2/1/2014 Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng

More information

Parallelization of a Series of Extreme Learning Machine Algorithms Based on Spark

Parallelization of a Series of Extreme Learning Machine Algorithms Based on Spark Parallelzaton of a Seres of Extreme Machne Algorthms Based on Spark Tantan Lu, Zhy Fang, Chen Zhao, Yngmn Zhou College of Computer Scence and Technology Jln Unversty, JLU Changchun, Chna e-mal: lutt1992x@sna.com

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

Design of an interactive Web-based e-learning course with simulation lab: a case study of a fuzzy expert system course

Design of an interactive Web-based e-learning course with simulation lab: a case study of a fuzzy expert system course World Transactons on Engneerng and Technology Educaton Vol.8, No.3, 2010 2010 WIETE Desgn of an nteractve Web-based e-learnng course wth smulaton lab: a case study of a fuzzy expert system course Che-Chern

More information

AC : TEACHING SPREADSHEET-BASED NUMERICAL ANAL- YSIS WITH VISUAL BASIC FOR APPLICATIONS AND VIRTUAL IN- STRUMENTS

AC : TEACHING SPREADSHEET-BASED NUMERICAL ANAL- YSIS WITH VISUAL BASIC FOR APPLICATIONS AND VIRTUAL IN- STRUMENTS AC 2011-1615: TEACHING SPREADSHEET-BASED NUMERICAL ANAL- YSIS WITH VISUAL BASIC FOR APPLICATIONS AND VIRTUAL IN- STRUMENTS Nkunja Swan, South Carolna State Unversty Dr. Swan s currently a Professor at

More information

Scalability of a Mobile Cloud Management System

Scalability of a Mobile Cloud Management System Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV SMART PHOTO PRINTER MODEL SmartD90-EV USER'S GUIDE Verson V1.5.2.0 1 TABLE OF CONTENTS Introducton Introducton 3 Bascs 4 Constructon of compostons 5 Operaton Easy Prnt Servce 8 Fun Prnt Servce 10 Sharng

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013 Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com

More information

T3 (IP) Comfort connected to Integral 5

T3 (IP) Comfort connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Comfort connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents...

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Alufix Expert D Design Software #85344

Alufix Expert D Design Software #85344 238 ALUFIX SOFTWARE Alufx Expert 2014 3D Desgn Software #85344 Alufx Expert software makes automatc desgns for fxtures wth correspondng partlsts. You choose the system and defne clampng ponts. The software

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information