Introduction to new technologies and employment opportunities in computer networking and information technology. Guest speakers currently working in the field describe opportunities, working conditions, pay levels, and training required to succeed in the field today.
City College of San Francisco
The Computer Networking and Information Technology (CNIT) Department prepares students to seek employment in entry-level network administration, computer technical support, and web development positions. The Department also offers courses that prepare students for well-known industry certificates such as: CompTIA A+, Cisco CCNA, EMCISA, CEH, CISSP and others.
This course list provides an overview of courses per college course catalogs. Not all of the courses listed use NETLAB+. For complete information, please see the individual college website.
Introduction to the field of technical support, including the critical people skills and exceptional technical knowledge required to provide outstanding service. Emphasis on information resources and technical tools needed most to function effectively in a technical support position.
Hardware diagnosis and troubleshooting, software maintenance, upgrading, and problem-solving. Work with Help Desk software to log calls and real end-user problems in a simulated service center. Designed to provide hands-on practice with hardware and software, techniques and procedures, covered in CNlT 105. Teamwork will be emphasized.
This course will teach the skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. Follows objectives of CompTIA Network+ certification exam.
This is a course for students in related disciplines such as audiovisual technology, who need a basic understanding of networking to use equipment in the field.
Selection, installation and configuration of wireless networks, including: fundamentals and standards of wireless communication, installation of network access points, and installation, configuration and management of typical products. Also included: common applications, monitoring the network, security, troubleshooting, upgrade, and modification. Students in this course should be already familiar with LAN technologies.
Students will design, install, configure, manage, and maintain wireless networks with advanced fundamentqls ofWLANs, current and developing standards and protocols, boosting, detecting and extending signal, troubleshooting and monitoring the network, security issues, research of proposed security solutions. The course follows objectives for the Certified Wireless Network Administrator Exam (CWNA).
Skills and techniques for effective professional self-promotion and workplace rapport in an Information Technology environment. Establishing a professional image and reputation, including resumes and portfolio building, and adhering to workplace protocols and standards for professional conduct.
Knowledge and skills - to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).
Forensics tools, methods and procedures for investigating computers. Data recovery techniques and evidence collection, protection of evidence, expert witness skills and computer crime investigation techniques. Analysis of various file systems and specialized diagnostic software to retrieve data. Prepares in part for CompTIA Security+ and maps to Computer Investigation Specialists exam.
Fundamentals, techniques, and procedures to design an effective secure Internet connection using software or hardware firewalls. Discussion of types of firewalls, packet filtering, proxy servers, Intrusion Detection Systems, and Virtual Private Networks (VPNs).
Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Advanced techniques in ethical hacking of Windows and Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, web servers, and Denial of Service attacks.
In-depth course in information security, including access control, application security, enterprise continuity, cryptography, technical risk management, physical security, and telecommunications and network security. This course supports preparation for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.
Learn how to analyze malware, including computer viruses, trojans, and rootkits, using basic static analysis and dynamic analysis, including IDA Pro and other tools.
Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems. Covers essential exploit development skills for advanced penetration testers and security professionals. Students will be required to obey high
ethical principles and not exploit systems without authorization.
Mobile devices run specialized operating systems with security problems. Students will learn how mobile operating systems and apps work, how to find and exploit vulnerabilities and how to defend them. Topics will include phone call, voicemail, SMS intrusion, jailbreaking, rooting, NFC attacks, mal ware, browser exploitation, and application vulnerabilities.
Overview of Wordpress and social media technologies to develop websites and/or use together with existing websites. Covers Web 2.0 and 3.0 technologies such as blogs, sites, social media, wikis, video and photo sharing and other tools how to integrate those technologies together.
This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.
Methods of using the Internet. History, design and protocol methods used on Internet including: electronic mail, connection to remote computers, file transfer, World Wide Web, basic web page creation and publishing using HTML and CSS. Additional topics include: computer security, copyright and electronic commerce, and basic Unix shell commands requisite to shell account use.
This is a beginning course in the use of HTML and CSS. It will prepare students to build simple web pages using basic HTML and CSS according to the latest standards. Students will also learn how to upload the web page files to a web server.
Creation and maintenance of web pages using server side technologies such as ASP.NET. Server controls, HTML controls, database access, validation of input data, sitemap, navigation (menu) based on the most current ASP.NET technology. First part requires Windows OS to install Visual Studio
Intensive training and preparation for national security competitions and CTF (capture the flag) events. Material includes penetration testing methodology, network defense methodology, and report writing.
The class focuses on practical applications: selecting, implementing, testing, and maintaining systems to protect data on modern computer networks. Mathematical underpinnings and practical applications of modern cryptographic systems, including the Advanced Encryption Standard (AES), the Secure Hash Algorithms (SHA), and Rivest-Shamir-Adleman (RSA).
This course is an introduction to virtualization. Students will learn about server, cloud, client, storage networking and application virtualization in the public and private cloud, and requirements for virtual environments, administration, and data security. Students will be exposed to different virtualization applications and platforms such as: VMware, Oracle VBox and Azure.
When computer networks are breached, incident response (IR) is required to assess the damage, eject the attackers, and improve security measures so attackers cannot return. This class covers the IR tools and techniques required to defend modern corporate networks. This class is part of the Advanced Cybersecurity Certificate.
This hands-on training course explores installation, configuration, and management of VMware products. Upon completion of this course students can take the examination to become a VMware Certified Professional. The course is based on the latest release of VMware software available.
Students will learn about the transition from a Classic Data Center environment to Virtual Data Center and the Cloud virtualization at each layer - compute, storage, network, desktop, and application - along with business continuity in a VDC environment. Students will also learn Cloud computing basics, infrastructure components, service management activities, security concerns, and considerations for Cloud adoption.
Explores security technology, risks, countermeasures, and consequences, to help cybersecurity analysts protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.
Develop, design and program a professional web application or web site project in a team environment. Set professional social media profile and e-portfolio and learn about tools used in web application projects to work on realistic projects.
Architecture, structure, functions, components, and models of the Internet and other computer networks. Use of OSI and TCP layered models to examine protocols and services. IP addressing and subnetting. Fundamentals of Ethernet concepts, media, and operations. First course of Cisco Networking Academy Exploration series preparing for CCENT and CCNA Certifications.
Architecture, components, and operations of routers and switches in a small network. Configure router and switch for basic functionality. Troubleshoot and resolve common issues with RIPvl, RIPv2, single-area OSPF, virtual LAN, and inter-VLAN routing in IPv4 and IPv6 networks. Second course in Cisco Networking Academy towards CCENT and CCNA Certifications.
Architecture, components, and operations of routers and switches in larger and more complex networks. Configuration and troubleshooting of routers and switches for advanced functionality with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks. Knowledge and skills needed to implement a WLAN in a small-to-medium network.
WAN technologies and network services required by converged applications in a complex network. Selection criteria of network devices and WAN technologies to meet network requirements. Configuration and troubleshooting of network devices with data link protocols. Implementation of virtual private network (VPN) operations in a complex network.
Cisco Certified Network Associate (CCNA) Security provides the knowledge and skills needed to prepare for entry-level security specialist careers. CCNA Security aims to develop an in-depth understanding of network security principles as well as the tools and configurations required to secure a network. Preparation for the CCNA-Security certification exam.
Introduction to the Internet of Things (IoT), where people, processes, things, and data are connected via emerging Internet technologies. A variety of networking and computer hardware devices will be integrated into end-to-end systems to solve practical problems.
DNS is essential but has numerous security issues: hijacking, packet amplification, spoofing, snooping, and more. Configure secure DNS servers and detect malicious activity. DNSSEC (DNS Security) principles and deployment. Hands-on projects using both Windows and Linux platforms.
Knowledge, skills and hands-on experience to install, configure, and maintain Windows 10 Operating system. Course aligned with the Microsoft Certification Certificates.
Knowledge and skills required to install and configure Windows 2012 core infrastructure services. This course is aligned with the Microsoft Certified System Administrator 70-410.
This course is introduced to account for the new line of servers introduced by Microsoft. It provides students with the knowledge and skills required to administer Windows core infrastructure services. This course is aligned with the Microsoft Certified System.
This course provides students with the knowledge and skills required to administer advanced Microsoft servers. The students acquire hands-on knowledge of real world experience to become IT administrators. This course is aligned with the Microsoft Certifications exams on configuring advanced server services.
Covers the SQL Server database management system. In this advanced course, students will gain the knowledge and skills to install, configure and maintain SQL Server and manage the day-to-day administration of a client/server database in an enterprise network environment.
This course introduces the new line of servers by Microsoft. It provides students with the knowledge and skills required to install and configure Windows 2016 core infrastructure services.
This course is aligned with the Microsoft Certified System Administrator 70-740.
This course introduces the new line of servers by Microsoft. It provides students with the knowledge and skills required to administer Windows core infrastructure services.
This course is aligned with the Microsoft Certified System Administrator exam.
This course provides the knowledge and skills required to administer advanced Microsoft servers. The students acquire hands-on knowledge of real world experience to become IT administrators. This course is aligned with the Microsoft Certifications exams on configuring advanced server services.
Azure administrator skills training needed to be successful deploying Software-as-a-Service (Saas), Infrastructure-as-a-Service (IaaS), and Platform-as-a-Service (PaaS) solutions. Includes training in planning IaaS solutions for fault tolerance and performance, deployment of Virtual Machines (VMs), and systems management using Windows Powershell and the Azure CLI V2.
Learn modern, powerful techniques to inspect and analyze network traffic, to quickly detect abuse and attacks and respond to them. This class also covers the configuration and use of Security Onion, a popular open-source Linux distribution designed for network security monitoring.
Preparation for the Certified Information Systems Auditor (CISA) credential. This field includes information systems audit, governance, life cycle, system implementation, protecting information assets, business continuity, and disaster recovery.