Montgomery College 2018-2019 Catalog 
    
    Nov 21, 2024  
Montgomery College 2018-2019 Catalog [ARCHIVED CATALOG]

Network and Information Technology AAS: 354


Return to {$returnto_text} Return to: Programs of Study

: 354

This curriculum provides students a broad coverage of technical understanding of computer technology, networking and security as well as the communication skills and professionalism required of all entry-level IT professionals. Skills included software and hardware installation, network configuration and diagnosing, security and forensics fundamentals, and virtualization and cloud computing implementation, with more of a “hands-on” orientation focused on scenarios in which troubleshooting and tools must be applied to resolve problems. 

 

General Education Course Selections


Click here to view the Foundation/Distribution Courses  for selection to fulfill the General Education Course Requirements.

Suggested Course Sequence


A suggested course sequence for full-time students follows. All students should review the Advising Worksheet and consult an advisor.

First Semester


Second Semester


Third Semester


Fourth Semester


Total Credit Hours: 60


* ENGL 101/ENGL 101A, if needed for ENGL 102  /ENGL 103  , or NWIT or CMSC elective.

Program Outline/ Degree Requirements


General Education Requirements


Foundation Courses


  • English foundation 3 semester hours (ENGF)
  • Mathematics foundation 3 semester hours (MATF)

Distribution Courses


  • Arts or humanities distribution 3 semester hours (ARTD or HUMD)
  • Behavioral and social sciences distribution 3 semester hours (BSSD)
  • Natural sciences distribution with lab 4 semester hours (NSLD)

General Education Elective


Total Credit Hours: 60


* ENGL 101/ENGL 101A, if needed for ENGL 102  /ENGL 103  , or NWIT or CMSC elective.

Program Outcomes


  • Install, maintain and evaluate computer networks.

  • Describe network architecture concepts, including topology, protocols, components, and principles.

  • Demonstrate best practices in the use of lab equipment and network hardware.

  • Create a detailed plan showing the steps necessary to implement a network security system.

  • Test and configure network services, devices, and peripherals.

  • Review data and identify relevant evidence using current forensic tools.

  • Describe the evolution of cloud computing and major methods of deployment.

  • Design and implement cloud applications that can scale up on a VM (Virtual Machine and out across multiple VMs.

Return to {$returnto_text} Return to: Programs of Study