Networking Technology 3 - Lowcountry Tech Academy

5 downloads 72 Views 248KB Size Report
27 Sep 2013 ... prepare students to pass the MCTS 70-640, MCSA 70-410. ... technology as defined by national standards as defined by MCSA + certification.
Networking Technology 3 # 531200CW (CIP CODE #531200) MCTS 70-642 MCSA 70-411 CompTIA Server + Lab Sim Server Pro Certification exam.

CCSD Career & Technology Education

9/27/2013

Networking Technology Components of a Course Syllabus Component 1. Course Description

2. Instructional Philosophy

Description The Server Networking Technology program is designed to ensure that the successful candidate has the important knowledge and skills necessary to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure, describe Server Networking technologies, basic design principles, and adhere to wiring standards and use testing tools. This course prepares students to develop the skills needed to manage a Windows Server 2008/2012 system from a Network Infrastructure perspective and to prepare students to pass the MCTS 70-640, MCSA 70-410. Server + and Server Pro certification exam. While the focus of topics is on the configuration of Active Directory and related services, coverage of Windows foundational topics such as the file system and networking are also included. Extensive coverage begins with an introduction to Windows Server 2008/2012 and goes on to active directory design, account management, group policy management and configuration, certificate services, AD LDS, AD RMS, AD FS, server core, Windows Hyper-V virtualization, and server management. It also prepares the student for postsecondary opportunities within the field of information technology as defined by national standards as defined by MCSA + certification. Examples of the standard are located on the following website: http://www.microsoft.com , http://www.comptia.org ,http://www.testout.com Upon successful completion of this course, students have the opportunity to pursue national certification. Prerequisite Computer Applications 1, Computer Applications 2, or Integrated Business Applications 2, Algebra 1 Computer Service Technology, Networking 1, 2 or 4 and/or instructor approval Grades 10-12 Course Length 1 Carnegie Unit We believe that students learn best when given the opportunity to practice and apply new concepts and skills through contextual learning experiences. We adhere to the belief that all students should have access to opportunities for learning new technologies and techniques that are emerging in today’s workplace. Students will be given challenging real-world projects and assignments based on actual computer hardware and software problems such as detecting, troubleshooting and repairing hard drives, video cards, and other peripheral devices and device drivers. As educators, we are the facilitators for learning opportunities. Students must ultimately take responsibility for their learning through active participation in class labs, projects and assignments.

3. Course Goals/Power Standards

Objectives 100. Configuring IP Addressing and Services 101. Configure IPv4 and IPv6 Addressing. 102. Configure Dynamic Host Configuration Protocol (DHCP). 103. Configure routing. 104. Configure IPSec. 200. Configuring Name Resolution 201. Configure a Domain Name System (DNS) server. 202. Configure DNS zones. 203. Configure DNS records. 204. Configure DNS replication. 205. Configure name resolution for client computers. 300. Configuring Network Access 301. Configure remote access. 302. Configure Network Access Protection (NAP). 303. Configure network authentication. 304. Configure wireless access. 305. Configure firewall settings. 400. Configuring File and Print Services 401. Configure a file server. 402. Configure Distributed Files System (DFS). 403. Configure shadow copy services. 404. Configure backup and restore. 405. Mange disk quotas. 406. Configure and monitor print services. 500. Monitoring and Managing a Network Infrastructure 501. Configure Windows Server Update Services (WSUS) server settings. 502. Capture performance data. 503. Monitor event logs.

4. Major Assignments and Projects

504. Gather network data. Technical Manual: Student technicians will be required to create and keep a Technical Reference Manual detailing their research, lab procedures gleaned from Labsim, and hand-on activities creating a LAN/Wan structure. This will be kept in an electronic format and submitted at least weekly for review via email or other electronic means. Additional materials to the manual will include video demonstrations of skills which the student will produce and edit. Resume: Each Student will be required to produce a Functional or skills based resume. Research Project: Communication skills, both oral and written, are a widely recognized issue in the field of information technology. Many proficient technicians have limited skills in communicating with coworkers and end users. Our goal is to address these issues by having each student provide a written research paper, and an oral presentation in class. See the attached document, “Guidelines for Papers and Presentations” for topic ideas and general format rules.

3

Guidelines for Papers and Presentations Goals: Success in your career will depend greatly on your written and oral communication skills. Our school recognizes the need for students to develop proficiency in these skills, and requires all students to submit a research paper and provide an oral presentation in each class in this department. Papers: Format:  Length 5 – 7 pages, excluding illustrations and bibliography  Margins 1.5” top, 1" left, right, and bottom  Spacing double-spaced for normal text, single-spaced for long quotes  Font Size 10 - 12 point  Font Styles Times New Roman or Courier  Illustrations welcome if of good quality  Cover Sheet optional but suggested – should include topic, course ID/section, student name, and date  Electronic Portfolios Optional Topics: See the list of suggested topics below. You will base your presentation on your research paper topic. Attribution: All works and illustrations used in your paper must be cited; this means crediting the source where you found the information you used to support your work. If you fail to give credit for copyrighted information you present as your own work, that constitutes plagiarism, and will be penalized by a zero for the project. Citing Sources:  Works used – This is the source material you used to support your research project.  Works consulted – You probably looked at many sources before you located usable material, and you deserve credit for this research. Your work will be considered for credit for works consulted; list your preliminary sources as consulted works. Presentations Goals:  Display your ability to research and deliver information as a career skill. Creative presentation ideas are welcome; use your imagination!  Develop public speaking skills. If you have stage fright, this is the best way to overcome it!  Play the part of instructor. Instructing others will be a part of your career. Oddly enough, some people even enjoy teaching! Format: Length 10 to 15 minutes. Rehearse and time your presentation Visual Aids Use of slideshows and the whiteboard are strongly encouraged Handouts Acceptable if of lasting value –create something students can use later Attribution / Citations: You took care of these in your paper. List your sources in your presentation, or offer to share them with the class. Closing the Presentation: When you have finished your presentation, remember to ask the courtesy question: "Are there any questions?" Suggested Research Paper Topics 1. Alternatives to Microsoft software 2. Asset / Inventory tracking 3. Backup strategies / disaster recovery 4. Buy or build your own NETWORK?

4

5. Assessment and Grading

6. Required and Recommended Readings

5. Customer service and tech support issues 6. Deployment strategies (deploying multiple NETWORKs) 7. End user education 8. High-speed hardware interfaces (SCSI, FireWire, IEEE 1394, Serial ATA, etc.) 9. High-speed Internet connectivity 10.History or overview of an operating system 11.History of the NETWORK 12.Improving NETWORK reliability 13.Network client software 14.Network hardware 15.Network operating systems 16.Network topologies (peer-peer vs. client-server) 17.Optical drives 18.NETWORK security 19.NETWORK troubleshooting applications 20.Professional certifications in the IT industry 21.Tape drives 22.Terminal emulation 23.Windows tips and tricks 24.Elective topic Factors To Be Evaluated For each academic quarter, weighted grades and averages are based on the following criteria:  Labs and hand-on performance tests 50%  Objective tests, and research paper(s) and presentation(s) 30%  Participation, quizzes, and in-class assignments 20% End of Course Exam (of overall course grade) 20% Evaluation System The standard grading scale and policies for Charleston County School District will be used. Students must make a grade of 70 for minimum competence. Students will receive Interim Reports and Nine-Weeks Report Cards. A 93-100 B 85-92 C 77-84 D 70-76 F 0-69 Dean, Tamara. Network+ Guide to Networks, Third Edition & Lab Sim for CompTIA Network+. Howe, Dennis. FOLDOC.doc.ic.ac.uk. Lycos Inc. www.angelfire.com. Key Professional Media, Inc. Computeruser.com. Lexico Publishing Group, LLC. Dictionary.com. The Computer Language Company INC. TechDictionary.com. Jupitermedia Corporation. Webopedia.com. ComTIA Certification Site http://certification.comptia.org/ Free Practice Exams http://www.techexams.net/index.shtml Glencoe Server Networking Companion Site http://www.glencoe.com/sec/computered/network Understanding and Troubleshooting Your NETWORK http://www.scsite.com/understanding/ Whatis Whatis.com Cisco Network Academy Standards Alignment Format. Semesters 1-4, copyright 2000. Cisco Network Academy Scope and Sequence. Semesters 1-4, copyright 2000. Cisco Systems, Inc. Cisco Server Networking Academy Program: First Year Companion Guide. Cisco Press/Prentice Hall, copyright 2000.

5

Cisco Systems, Inc. Cisco Server Networking Academy Program: Second Year Companion Guide. Cisco Press/Prentice Hall, copyright 2000. Hudson, Kurt and Cannon, Kelly. Cisco Server Networking Fundamentals. Course Technology, a division of Thomson Learning, copyright 2000. Hudson, Kurt and Caudle, Kelly. Cisco Routing. Course Technology, a division of Thomson Learning, copyright 2000. 7. Extra Help

8. Course Standards

Extra help is available upon prior arrangement. Any student who has not met minimum proficiency standards at the grading mark will receive a parent contact. Students who continue in doing work that is below the proficient level will be asked to develop a specific contract for the improvement in the course grade and quality of work. Parents will be involved in creating and implementing the improvement contract. Windows Server 2008/2012 Network Infrastructure This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network. Module 0 – Introduction This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course. Module 1 – IPv4 This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet. Module 2 – IPv6 In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored. Module 3 – DHCP This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options. Module 4 – DNS In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution. Module 5 – Routing Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and ICS and NAT solutions. Module 6 – Remote Access Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access.

6

9. Course Outline

Module 7 – Network Access and Security In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission. Module 8 – File and Print This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services. Module 9 – WSUS In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance. Module 10 – Performance and Reliability This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test. 1 COURSE OUTLINE Week Topics 1 2 to 3

IPv4

4

IPv6

5 to 6

DHCP

7 to 8

DNS

9 to 10

Routing

11 12 to 14 15

10. SCANS Alignment

Introduction

Remote Access Network Access and Security WSUS

16 to 17

Performance and Reliability

17 to 18

Review

Subject to change based on course length. 18 weeks=132 instructional hours which may be adjusted to school schedule http://www.unr.edu/k16/standard/scans.htm http://www.scois.net/Resources/UpdatedskillbuildSept06english.pdf http://www.jobweb.com/studentarticles.aspx?id=198&terms=second+interview http://www.bls.gov/oco/home.htm http://www.engr.ncsu.edu/learningstyles/ilsweb.html http://www.scois.net/Resources/ClusterPoster06-07.pdf

Ethics of IT Security: 1. 2. 3. 4.

Ten Rules of Computer Ethics I will not use a computer to harm other people. I will not interfere with other people's computer work. I will not snoop around in other people's computer files. I will not use a computer to steal.

7

5. 6. 7. 8. 9. 10.

I will not use a computer to bear false witness. I will not copy or use proprietary software for which you have not paid. I will not use other people's computer resources without authorization or proper compensation. I will not appropriate other people's intellectual output. I will think about the social consequences of the program you are writing or the system you are designing. I will always use a computer in ways that insure consideration and respect for your fellow humans.

8