Montgomery College 2017-2018 Catalog 
    Mar 17, 2018  
Montgomery College 2017-2018 Catalog

Network and Information Technology AAS: 354

Return to {$returnto_text} Return to: Programs of Study

: 354

This curriculum provides students a broad coverage of technical understanding of computer technology, networking and security as well as the communication skills and professionalism required of all entry-level IT professionals. Skills included software and hardware installation, network configuration and diagnosing, security and forensics fundamentals, and virtualization and cloud computing implementation, with more of a “hands-on” orientation focused on scenarios in which troubleshooting and tools must be applied to resolve problems. 


General Education Course Selections

Click here to view the Foundation/Distribution Courses  for selection to fulfill the General Education Course Requirements.

Suggestion Course Sequence

A suggested course sequence for full-time students follows. All students should review the Advising Worksheet and consult an advisor.

First Semester

Second Semester

Third Semester

Fourth Semester

Total Credit Hours: 60

* ENGL 101/ENGL 101A, if needed for ENGL 102  /ENGL 103  , or NWIT or CMSC elective.

Program Outline/ Degree Requirements

General Education Requirements

Foundation Courses

  • English foundation 3 semester hours (ENGF)
  • Mathematics foundation 3 semester hours (MATF)

Distribution Courses

  • Arts or humanities distribution 3 semester hours (ARTD or HUMD)
  • Behavioral and social sciences distribution 3 semester hours (BSSD)
  • Natural sciences distribution with lab 4 semester hours (NSLD)

General Education Elective

Total Credit Hours: 60

* ENGL 101/ENGL 101A, if needed for ENGL 102  /ENGL 103  , or NWIT or CMSC elective.

Program Outcomes

  • Install, maintain and evaluate computer networks.

  • Describe network architecture concepts, including topology, protocols, components, and principles.

  • Demonstrate best practices in the use of lab equipment and network hardware.

  • Create a detailed plan showing the steps necessary to implement a network security system.

  • Test and configure network services, devices, and peripherals.

  • Review data and identify relevant evidence using current forensic tools.

  • Describe the evolution of cloud computing and major methods of deployment.

  • Design and implement cloud applications that can scale up on a VM (Virtual Machine and out across multiple VMs.

Return to {$returnto_text} Return to: Programs of Study