Montgomery College 2019-2020 Catalog 
    
    Apr 25, 2024  
Montgomery College 2019-2020 Catalog [ARCHIVED CATALOG]

Network and Information Technology AAS: 354


Return to {$returnto_text} Return to: Catalog Search

: 354

This curriculum provides students a broad coverage of technical understanding of computer technology, networking and security as well as the communication skills and professionalism required of all entry-level IT professionals. Skills included software and hardware installation, network configuration and diagnosing, security and forensics fundamentals, and virtualization and cloud computing implementation, with more of a “hands-on” orientation focused on scenarios in which troubleshooting and tools must be applied to resolve problems. 

 

General Education Course Selections


Click here to view the Foundation/Distribution Courses  for selection to fulfill the General Education Course Requirements.

Suggested Course Sequence


A suggested course sequence for full-time students follows. All students should review the Program Advising Guide and consult an advisor.

First Semester


Second Semester


Third Semester


Fourth Semester


Total Credit Hours: 60


*ENGL 101 /ENGL 101A , if needed for ENGL 102 /ENGL 103 , or NWIT or CMSC elective.

Program Outline/ Degree Requirements


General Education Requirements


Foundation Courses


  • English foundation 3 semester hours (ENGF)
  • Mathematics foundation 3 semester hours (MATF)

Distribution Courses


  • Arts or humanities distribution 3 semester hours (ARTD or HUMD)
  • Behavioral and social sciences distribution 3 semester hours (BSSD)
  • Natural sciences distribution with lab 4 semester hours (NSLD)

General Education Elective


Total Credit Hours: 60


* ENGL 101 /ENGL 101A , if needed for ENGL 102 /ENGL 103 , or NWIT or CMSC elective.

Program Outcomes


Upon completion of this program a student will be able to:

  • Install, maintain and evaluate computer networks.
  • Describe network architecture concepts, including topology, protocols, components, and principles.
  • Demonstrate best practices in the use of lab equipment and network hardware.
  • Create a detailed plan showing the steps necessary to implement a network security system.
  • Test and configure network services, devices, and peripherals.
  • Review data and identify relevant evidence using current forensic tools.
  • Describe the evolution of cloud computing and major methods of deployment.
  • Design and implement cloud applications that can scale up on a VM (Virtual Machine and out across multiple VMs.

Return to {$returnto_text} Return to: Catalog Search