Western Technical College 10154123 Emerging Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 The learner will explore new technologies requiring information technology support and troubleshooting including but not limited to handheld devices, phones, tablets, storage devices, and cloud computing. This course provides a non-technical approach to practical computer security for all users, including different types of attacks, social engineering, malware, and spyware. The student will install, configure and update a variety of security software. In addition to basic security concepts, students will gain practical skills on how to protect their computers and networks from increasingly sophisticated attacks. Information Technology Associate Degree Courses Types of Instruction Instruction Type Lecture Lab Credits/Hours 2 CR / 36 HR 1 CR / 36 HR Course History Last Approval Date 5/9/2016 Textbooks No textbook required. Program Outcomes 1. Manage Information Technology Hardware Summative 1.1. 10-154-3 TSA Rubric Course Outcome Summary - Page 1 of 6
1.1. learner selects appropriate hardware 1.2. learner demonstrates proper safety techniques 1.3. learner installs hardware (according to established specifications) 1.4. learner configures hardware (according to established specifications) 1.5. learner tests hardware 2. Manage Software Summative 2.1. 10-154-3 TSA Rubric 2.1. learner selects appropriate software 2.2. learner installs software 2.3. learner configures software 2.4. learner maintains software 2.5. learner manages data 3. Provide End User Support Summative 3.1. 10-154-3 TSA Rubric 3.1. learner performs common Help Desk functions 3.2. learner researches technology solutions 3.3. learner recommends technology solutions 3.4. learner educates end users 3.5. learner creates effective documentation 3.6. learner follows industry practices (ITIL, HDI for example) 4. Solve Information Technology Problems Summative 4.1. 10-154-3 TSA Rubric 4.1. learner follows a troubleshooting model to solve a problem 4.2. learner monitors incident management handling Course Competencies 1. Explore computer security, terminology, and several different categories of computer attackers 1.1. Written Product Performance will be satisfactory when: 1.1. you describe why it is difficult to achieve computer security 1.2. you define information security 1.3. you can identify the three layers of protection 1.4. you can define computer security terminology 1.5. you can identify the types of attackers that are common today 1.6. you can describe how to build a security strategy Course Outcome Summary - Page 2 of 6
1.7. you can identify federal and state laws enacted to protect the privacy of electronic data 1.a. Describe the challenges of securing information 1.b. Define information security and explain why it is important 1.c. Identify the types of attackers that are common today 1.d. Describe how to build a security strategy 2. Explain personal security and how to reduce the risks 2.1. Written Product 2.1. you define what qualifies as a weak versus strong password 2.2. you describe the different types of password attacks; brute force, dictionary 2.3. you can identify the different types of social engineering attacks including but not limited to, psychological approaches, impersonation, phishing and their varieties, hoaxes, shoulder surfing 2.4. you have a clear understanding of what identify theft is and the techniques for stealing personal information 2.5. you can recommend defenses to increase personal security 2.a. Define what makes a weak password 2.b. Describe the attacks against passwords 2.c. Identify the different types of social engineering attacks 2.d. Describe identity theft and the risks of using social networking 2.e. Describe personal security defenses 3. Explain different types of computer attacks and how to install and use antivirus software 3.1. Written Product 3.1. you can list and describe the different types of attacks on computers 3.2. you can explain how to manage patches 3.3. you can install antivirus software 3.4. you can use antivirus software 3.5. you explain User Account Control 3.6. you describe how to recover from an attack on a computer using a rescue disk 3.a. List and describe the different types of attacks on computers 3.b. Explain how to manage patches 3.c. Describe how to install and use antivirus software 3.d. Explain User Account Control 3.e. Describe how to recover from an attack 4. Explain the risks associated with Internet Security and possible defenses Domain Cognitive Level Evaluating Status Active 4.1. Written Product 4.1. you explain how the Internet works: HTML, TCP/IP, basic port numbers 4.2. you explain the basic e-mail systems: SMTP, POP3, and IMAP4 4.3. you describe how attackers use mobile code, cookies, and fraudulent digital certificates 4.4. you can list the security risks with using e-mail: spam, malicious attachments, embedded hyperlinks 4.5. you describe how to use Web browser settings to create stronger security Course Outcome Summary - Page 3 of 6
4.6. you can list several different e-mail defenses 4.a. Explain how the Internet and e-mail work 4.b. Describe how attackers can use mobile code, cookies, and fraudulent digital certificates 4.c. List the security risks with using e-mail 4.d. Describe how to use Web browser settings to create stronger security 4.e. List several different e-mail defenses 5. Explain mobile security and the attacks that may be encountered 5.1. Written Product 5.1. you define wi-fi and bluetooth 5.2. you explain how wi-fi and bluetooth work 5.3. you describe the various attacks that can be launched against a wireless network 5.4. you list the defenses for a home wi-fi network 5.5. you describe how to securely use a public wireless network 5.6. you list the types of mobile device security for laptops, tablets, and smartphones 5.a. Define Wi-Fi and Bluetooth and explain how they work 5.b. Describe the various attacks that can be launched against a wireless network 5.c. List the defenses for a home Wi-Fi network 5.d. Describe how to use a public wireless network securely 5.e. List the types of mobile device security for laptops, tablets, and smartphones 6. Identify what workplace security may be required 6.1. Written Product 6.1. you define physical access 6.2. you can list tools to restrict physcial access to facilities with sensitive equipment or resources 6.3. you describe how tokens and cards can be used for security 6.4. you explain what a security policy is and list several different types of subpolicies 6.5. you define technology and procedural access control 6.6. you list the steps that should be taken to prepare for a crisis 6.a. Define physical access and list the tools used to restrict it 6.b. Describe how tokens and cards can be used for security 6.c. Explain what a security policy is and list several different subpolicies 6.d. Define technology and procedural access control 6.e. List the steps to be taken to prepare for a crisis 7. Compare different tablets and evaluate their hardware for business use 7.1. Written Product 7.2. Oral Presentation 7.1. you identify several different tablet computers available in the current market 7.2. you evaluate the tablet computers specifications 7.3. you compare and contrast the tablet computers specifications with their competitors 7.4. you document the use of a tablet for a new user Course Outcome Summary - Page 4 of 6
7.5. you can troubleshoot basic problems with a tablet device 7.a. Identify several tablets available today 7.b. Evaluate the tablets specifications 7.c. Compare and contrast the specifications to their competition 7.d. Document the use of a tablet for a new user 7.e. Troubleshoot basic problems with a tablet device 8. Evaluate a variety of different tablet software applications for business use Domain Cognitive Level Evaluating Status Active 8.1. Skill Demonstration 8.1. you identify several business applications for use on a tablet computer 8.2. you research and evaluate several similar business applications for a tablet device 8.3. you explain the use of several business applications for a tablet device 8.4. you can troubleshoot basic problems with tablet software applications 8.5. you recommend a business application for a specific user 8.a. Identify several business applications for use on tablets 8.b. Evaluate similar business applications 8.c. Explain the use of several business applications for tablets 8.d. Troubleshoot basic problems with tablet software applications 9. Investigate current cell phones and evaluate the options for a business 9.1. Written Product 9.2. Oral Presentation 9.1. you identify several mobile phone models available today 9.2. you compare and contrast the specifications of selected mobile phones 9.3. you explain the use of new and advanced features of mobile phones 9.4. you can troubleshoot minor problems or direct the user to the appropriate location for assistance with their mobile phone 9.a. Identify several mobile phone models available today 9.b. Compare and contrast the specifications of selected mobile phones 9.c. Explain the use of new and advanced features of mobile phones 9.d. Troubleshoot basic problems with mobile phones 10. Explain cloud computing and demonstrate its use Domain Cognitive Level Evaluating Status Active 10.1. Written Product 10.1. you describe the concept of cloud computing 10.2. you use cloud computing with application software on a mobile device 10.3. you can demonstrate the use of cloud computing to a user 10.a. Describe cloud computing 10.b. Demonstrate the use of cloud computing 11. Explore new technologies that may require Information Technology support and Course Outcome Summary - Page 5 of 6
troubleshooting Domain Cognitive Level Applying Status Active 11.1. Written Product 11.2. Reflection 11.1. you identify new technologies in Information Technology 11.2. you explain the use of new technologies 11.3. you determine the significance of the new technologies in business 11.a. Identify new technologies in Information Technology 11.b. Explain the use of new technologies 11.c. Determine the significance of the new technology in business Course Outcome Summary - Page 6 of 6