Windows Networking I CNSS 250
Course introduces students to Network Administration using the latest Microsoft Network Operating System. Students will load server, configure Active Directory, and use server to perform labs. Course maps directly to Microsoft Certified Technology Specialist (MCTS) and prepares the student for certification. Emphasis on administration of users, group policies, Active Directory design and concepts, and security concepts. Accepted by most universities as CSCI transfer. Prerequisites: CNSS-130 and CNSS-150.
Correlated Learning Outcomes
- IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.
- IT. 2. Differentiate among various operating systems.
- IT. 3. Explain the process of authentication and authorization between end-user devices and computing network resources.
- IT. 4. Identify a variety of assistive or adaptive technologies and universal design considerations.
- IT. 5. Identify basic components of an end-user IT system.
- IT. 6. Implement a hardware and software configuration responsive to an identified scenario.
- IT. 8. Summarize strategies to support or train users with their IT resources.
- IT. 9. Use a variety of practices for making end-user IT systems secure.
- IT. 10. Describe the data management activities associated with the data lifecycle.
- IT. 11. Diagram a database design based on an identified scenario.
- IT. 12. Differentiate between public and private data.
- IT. 13. Discuss applications of data analytics.
- IT. 15. Identify database administration tasks.
- IT. 16. Produce simple database queries.
- IT. 18. Differentiate among a variety of technology-based sensory interactions.
- IT. 19. Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use.
- IT. 20. Illustrate the activities of a digital media design process.
- IT. 21. Implement communication principles into digital media design.
- IT. 22. Carry out basic computer network troubleshooting techniques.
- IT. 26. Differentiate among various techniques for making a computer network secure.
- IT. 27. Summarize the flow of data through a computer network scenario.
- IT. 35. Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level.
- IT. 36. Discuss data governance and its implications for users as well as IT professionals.
- IT. 37. Identify a variety of enterprise-level digital storage technologies.
- IT. 38. Implement an application of virtualization.
- IT. 39. Modify a system to improve data confidentiality or regulatory compliance.
- IT. 40. Summarize the implications of various cloud computing models.
- IT. 41. Summarize the security implications and risks for distributed IT systems.
- IT. 43. Describe the attitudes, knowledge and abilities associated with quality customer service.
- IT. 44. Produce technical documentation responsive to an identified computing scenario
- IT. 45. Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario.
- IT. 46. Discuss significant trends and emerging technologies and their impact on global society.
- IT. 47. Demonstrate professional behavior in response to an ethically-challenging scenario in computing.
- IT. 48. Summarize the tenets of ethics and professional behavior promoted by international computing societies.
- IT. 49. Describe IT procurement processes for goods and services.
- IT. 50. Summarize the role of IT in supporting the mission and goals of an organization.