Montgomery College 2023-2024 Catalog 
    
    Dec 18, 2024  
Montgomery College 2023-2024 Catalog [ARCHIVED CATALOG]

Cloud Computing and Networking Technology AAS: 355


Return to {$returnto_text} Return to: Programs of Study

: 355

This curriculum provides students a broad coverage and technical understanding of computer technology, networking and security as well as the communication skills and professionalism required of all entry-level IT professionals. Skills include software and hardware installation, network configuration and diagnostics, security and forensics fundamentals, and virtualization and cloud computing implementation, with a “hands-on” focus on scenarios in which troubleshooting tools must be applied to resolve problems. This program can be completed either on campus or online.

General Education Course Selections


Click here to view the Foundation/Distribution Courses  for selection to fulfill the General Education course requirements.

Suggested Course Sequence


Students should complete the required English and Math foundation courses within the first 24 credit hours. A suggested course sequence for full-time students follows. All students should review the Program Advising Guide and consult an advisor.

Third Semester


Fourth Semester


Total Credit Hours: 60


*ENGL 101 /ENGL 101A , if needed for ENGL 102 /ENGL 103 , or NWIT or CMSC or DATA or TECH Elective.

This program can be completed either on campus or online.

Program Outline/ Degree Requirements


General Education Requirements


Foundation Courses


Distribution Courses


General Education Elective


Total Credit Hours: 60


* ENGL 101 /ENGL 101A , if needed for ENGL 102 /ENGL 103 , or NWIT or CMSC or DATA or TECH Elective.

This program can be completed either on campus or online.

Program Outcomes


Upon completion of this program, a student will be able to:

  • Install, maintain and evaluate computer networks.
  • Describe network architecture concepts, including topology, protocols, components, and principles.
  • Demonstrate best practices in the use of lab equipment and network hardware.
  • Create a detailed plan showing the steps necessary to implement a network security system.
  • Test and configure network services, devices, and peripherals.
  • Review data and identify relevant evidence using current forensic tools.
  • Describe the evolution of cloud computing and major methods of deployment.
  • Design and implement cloud applications that can scale up on a VM (Virtual Machine and out across multiple VMs.

Return to {$returnto_text} Return to: Programs of Study