Montgomery College 2017-2018 Catalog 
    
    Apr 23, 2019  
Montgomery College 2017-2018 Catalog [ARCHIVED CATALOG]

Network and Information Technology AAS: 354


Return to {$returnto_text} Return to: Programs of Study

: 354

This curriculum provides students a broad coverage of technical understanding of computer technology, networking and security as well as the communication skills and professionalism required of all entry-level IT professionals. Skills included software and hardware installation, network configuration and diagnosing, security and forensics fundamentals, and virtualization and cloud computing implementation, with more of a “hands-on” orientation focused on scenarios in which troubleshooting and tools must be applied to resolve problems. 

 

General Education Course Selections


Click here to view the Foundation/Distribution Courses  for selection to fulfill the General Education Course Requirements.

Suggestion Course Sequence


All students should consult an advisor.

First Semester


Second Semester


Third Semester


Fourth Semester


Total Credit Hours: 60


* ENGL 101/ENGL 101A, if needed for ENGL 102  /ENGL 103  , or NWIT or CMSC elective.

Program Outline/ Degree Requirements


General Education Requirements


Foundation Courses


  • English foundation 3 semester hours (ENGF)
  • Mathematics foundation 3 semester hours (MATF)

Distribution Courses


  • Arts or humanities distribution 3 semester hours (ARTD or HUMD)
  • Behavioral and social sciences distribution 3 semester hours (BSSD)
  • Natural sciences distribution with lab 4 semester hours (NSLD)

General Education Elective


Total Credit Hours: 60


* ENGL 101/ENGL 101A, if needed for ENGL 102  /ENGL 103  , or NWIT or CMSC elective.

Program Outcomes


  • Install, maintain and evaluate computer networks.

  • Describe network architecture concepts, including topology, protocols, components, and principles.

  • Demonstrate best practices in the use of lab equipment and network hardware.

  • Create a detailed plan showing the steps necessary to implement a network security system.

  • Test and configure network services, devices, and peripherals.

  • Review data and identify relevant evidence using current forensic tools.

  • Describe the evolution of cloud computing and major methods of deployment.

  • Design and implement cloud applications that can scale up on a VM (Virtual Machine and out across multiple VMs.

Return to {$returnto_text} Return to: Programs of Study