Advanced Linux CNSS 231

In depth look at Linux, focusing on proper installation, user administration, and system monitoring. This course will be presented (in seat or hybrid online) in a "hands-on approach." Students will either install Linux on their own or lab system or use VMWare operating system images to perform work. Labs include user\group management, logging, NFS, SAMBA, RAID, DHCP, IPTABLES, and implementing Security. Prerequisite: CNSS-230.

Correlated Learning Outcomes

  • IT. 2. Differentiate among various operating systems.
  • IT. 3. Explain the process of authentication and authorization between end-user devices and computing network resources.
  • IT. 7. Summarize life-cycle strategies for replacement, reuse, recycling IT technology and resources.
  • IT. 10. Describe the data management activities associated with the data lifecycle.
  • IT. 11. Diagram a database design based on an identified scenario.
  • IT. 12. Differentiate between public and private data.
  • IT. 13. Discuss applications of data analytics.
  • IT. 16. Produce simple database queries.
  • IT. 17. Use data analytics to support decision making for a given scenario.
  • IT. 18. Differentiate among a variety of technology-based sensory interactions.
  • IT. 19. Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use.
  • IT. 22. Carry out basic computer network troubleshooting techniques.
  • IT. 28. Demonstrate best practices for designing end-user computing interfaces.
  • IT. 29. Demonstrate the techniques of defensive programming and secure coding.
  • IT. 30. Diagram the phases of the Secure Software Development Lifecycle.
  • IT. 31. Discuss software development methodologies.
  • IT. 32. Summarize the differences among various programming languages.
  • IT. 33. Use a programming or a scripting language to share data across an integrated IT system.
  • IT. 34. Use a programming or a scripting language to solve a problem.
  • IT. 38. Implement an application of virtualization.
  • IT. 39. Modify a system to improve data confidentiality or regulatory compliance.
  • IT. 43. Describe the attitudes, knowledge and abilities associated with quality customer service.
  • IT. 44. Produce technical documentation responsive to an identified computing scenario
  • IT. 45. Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario.
  • IT. 46. Discuss significant trends and emerging technologies and their impact on global society.
  • IT. 47. Demonstrate professional behavior in response to an ethically-challenging scenario in computing.
  • IT. 48. Summarize the tenets of ethics and professional behavior promoted by international computing societies.
  • IT. 50. Summarize the role of IT in supporting the mission and goals of an organization.