Networking Technology 4 - Lowcountry Tech Academy

6 downloads 62 Views 269KB Size Report
Sep 27, 2013 ... CompTIAs Linux+ Powered by LPI (Exams LX0-101 and LX0-102) certification. Examples of the standard are located on the following website:.
Networking Technology 4 Linux+ Powered by LPI (Exams LX0-101 and LX0-102) certification

# 531300 CW (CIP CODE #531300)

CCSD Career & Technology Education

9/27/2013

Networking 4 Linux+ Components of a Course Syllabus Component 1. Course Description

2. Instructional Philosophy

Description The Server Networking Technology program is designed to ensures that the successful candidate has the important knowledge and skills necessary to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure, describe Server Networking technologies, basic design principles, and adhere to wiring standards and use testing tools. It also prepares the student for postsecondary opportunities within the field of information technology as defined by national standards as defined by CompTIAs Linux+ Powered by LPI (Exams LX0-101 and LX0-102) certification. Examples of the standard are located on the following website: http://www.microsoft.com http://CompTIA.org http://www.testotut.com Upon successful completion of this course, students have the opportunity to pursue national certification. Prerequisite Computer Applications 1, Computer Applications 2, or Integrated Business Applications 2, Algebra 1. Computer Service Technology Networking 2 and/or instructor approval Grades 10-12 Course Length 1 Carnegie Unit We believe that students learn best when given the opportunity to practice and apply new concepts and skills through contextual learning experiences. We adhere to the belief that all students should have access to opportunities for learning new technologies and techniques that are emerging in today’s workplace. Students will be given challenging real-world projects and assignments based on actual computer hardware and software problems such as detecting, troubleshooting and repairing hard drives, video cards, and other peripheral devices and device drivers. As educators, we are the facilitators for learning opportunities. Students must ultimately take responsibility for their learning through active participation in class labs, projects and assignments.

3. Course Goals/Power Standards

Linux+ Powered by LPI (Exams LX0-101 and LX0-102) Module 0 – Introduction This module introduces the students to the Linux+ certification exams; LX0-101 and LX0-102. Module 1 – Using Linux This module introduces the students to using Linux. They will learn about the Linux shell, help options, the role of environment variables, using aliases, text editors, redirection and piping available on a Linux system. Students will also learn about commands to manage files and directories, links, FHS, and how to locate and search files for specific character patterns. Module 2 – Installation and Localization This module examines designing an effective installation, installing a Linux operating system, and configuring country and language-specific settings.

Module 3 – Boot and Shutdown In this module students will learn concepts about the Linux boot process, installing bootloaders, managing runlevels, using init scripts, and shutting down the system. Module 4 – User Interfaces and Desktops This module teaches the students about configuring an X Window system and display managers, and providing accessibility to people with impairments. Module 5 – Software Installation This module discusses installing application packages using RPM and Debian, and managing shared libraries. Module 6 – Users and Groups This module examines the fundamentals of managing user and group accounts. Module 7 – Disk and File System Management In this module students will learn concepts about managing disk partitions, managing, monitoring and maintaining file systems, restricting disk space to users, managing file and directory ownership and permissions, and archiving data on a Linux system. Module 8 – Hardware Installation This module discusses hardware installation. Topics covered include; device drivers, managing kernel modules, and managing Hotplug and Coldplug devices. Module 9 – Processes and System Services In this module students will learn the basics of managing and prioritizing processes, managing tasks, printing, and time. This module also provides an overview of using Structured Query Language (SQL). Module 10 – System Monitoring This module discusses concepts of system monitoring; system logging, using scripts to execute commands and processing a text stream. Module 11 – Networking This module examines the basics of networking, configuring network interfaces, configuring routing, configuring DNS settings, and troubleshooting network communication problems. Module 12 – Security This module examines the fundamentals of security on the Linux system. This includes the root user account, promoting user security and restrictions, increasing network security, file auditing and login blocking. Students will also become familiar with using the xinetd and inetd super daemons, OpenSSH and SSH port tunneling, a public key to authenticate to a computer, and the GnuPG encryption tool. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification exams. 4. Major Assignments and Projects

Technical Manual: Student technicians will be required to create and keep a Technical Reference Manual detailing their research, lab procedures gleaned from Labsim, and hand-on activities creating a LAN/Wan structure. This will be kept in an electronic format and submitted at least weekly for review via email or other electronic means. Additional materials to the manual will include video demonstrations of skills which the

3

student will produce and edit. Resume: Each Student will be required to produce a Functional or skills based resume. Research Project: Communication skills, both oral and written, are a widely recognized issue in the field of information technology. Many proficient technicians have limited skills in communicating with coworkers and end users. Our goal is to address these issues by having each student provide a written research paper, and an oral presentation in class. See the attached document, “Guidelines for Papers and Presentations” for topic ideas and general format rules. Guidelines for Papers and Presentations Goals: Success in your career will depend greatly on your written and oral communication skills. Our school recognizes the need for students to develop proficiency in these skills, and requires all students to submit a research paper and provide an oral presentation in each class in this department. Papers: Format:  Length 5 – 7 pages, excluding illustrations and bibliography  Margins 1.5” top, 1" left, right, and bottom  Spacing double-spaced for normal text, single-spaced for long quotes  Font Size 10 - 12 point  Font Styles Times New Roman or Courier  Illustrations welcome if of good quality  Cover Sheet optional but suggested – should include topic, course ID/section, student name, and date  Electronic Portfolios Optional Topics: See the list of suggested topics below. You will base your presentation on your research paper topic. Attribution: All works and illustrations used in your paper must be cited; this means crediting the source where you found the information you used to support your work. If you fail to give credit for copyrighted information you present as your own work, that constitutes plagiarism, and will be penalized by a zero for the project. Citing Sources:  Works used – This is the source material you used to support your research project.  Works consulted – You probably looked at many sources before you located usable material, and you deserve credit for this research. Your work will be considered for credit for works consulted; list your preliminary sources as consulted works. Presentations Goals:  Display your ability to research and deliver information as a career skill. Creative presentation ideas are welcome; use your imagination!  Develop public speaking skills. If you have stage fright, this is the best way to overcome it!  Play the part of instructor. Instructing others will be a part of your career. Oddly enough, some people even enjoy teaching! Format: Length 10 to 15 minutes. Rehearse and time your presentation Visual Aids Use of slideshows and the whiteboard are strongly encouraged Handouts Acceptable if of lasting value –create something students can use later

4

Attribution / Citations:

5. Assessment and Grading

You took care of these in your paper. List your sources in your presentation, or offer to share them with the class. Closing the Presentation: When you have finished your presentation, remember to ask the courtesy question: "Are there any questions?" Suggested Research Paper Topics 1. Alternatives to Microsoft software 2. Asset / Inventory tracking 3. Backup strategies / disaster recovery 4. Buy or build your own NETWORK? 5. Customer service and tech support issues 6. Deployment strategies (deploying multiple NETWORKs) 7. End user education 8. High-speed hardware interfaces (SCSI, FireWire, IEEE 1394, Serial ATA, etc.) 9. High-speed Internet connectivity 10.History or overview of an operating system 11.History of the NETWORK 12.Improving NETWORK reliability 13.Network client software 14.Network hardware 15.Network operating systems 16.Network topologies (peer-peer vs. client-server) 17.Optical drives 18.NETWORK security 19.NETWORK troubleshooting applications 20.Professional certifications in the IT industry 21.Tape drives 22.Terminal emulation 23.Windows tips and tricks 24.Elective topic Factors To Be Evaluated For each academic quarter, weighted grades and averages are based on the following criteria:  Labs and hand-on performance tests 50%  Objective tests, and research paper(s) and presentation(s) 30%  Participation, quizzes, and in-class assignments 20% End of Course Exam (of overall course grade) 20% Evaluation System The standard grading scale and policies for Charleston County School District will be used. Students must make a grade of 70 for minimum competence. Students will receive Interim Reports and Nine-Weeks Report Cards. A B C D F

6. Required and Recommended Readings

93-100 85-92 77-84 70-76 0-69

Dean, Tamara. Network+ Guide to Networks, Third Edition & Lab Sim for CompTIA Network+. Howe, Dennis. FOLDOC.doc.ic.ac.uk. Lycos Inc. www.angelfire.com. Key Professional Media, Inc. Computeruser.com. Lexico Publishing Group, LLC. Dictionary.com. The Computer Language Company INC. TechDictionary.com.

5

Jupitermedia Corporation. Webopedia.com. ComTIA Certification Site http://certification.comptia.org/ Free Practice Exams http://www.techexams.net/index.shtml Glencoe Server Networking Companion Site http://www.glencoe.com/sec/computered/network Understanding and Troubleshooting Your NETWORK http://www.scsite.com/understanding/ Whatis Whatis.com Cisco Network Academy Standards Alignment Format. Semesters 1-4, copyright 2000. Cisco Network Academy Scope and Sequence. Semesters 1-4, copyright 2000. Cisco Systems, Inc. Cisco Server Networking Academy Program: First Year Companion Guide. Cisco Press/Prentice Hall, copyright 2000. Cisco Systems, Inc. Cisco Server Networking Academy Program: Second Year Companion Guide. Cisco Press/Prentice Hall, copyright 2000. Hudson, Kurt and Cannon, Kelly. Cisco Server Networking Fundamentals. Course Technology, a division of Thomson Learning, copyright 2000. Hudson, Kurt and Caudle, Kelly. Cisco Routing. Course Technology, a division of Thomson Learning, copyright 2000. 7. Extra Help

Extra help is available upon prior arrangement. Any student who has not met minimum proficiency standards at the grading mark will receive a parent contact. Students who continue in doing work that is below the proficient level will be asked to develop a specific contract for the improvement in the course grade and quality of work. Parents will be involved in creating and implementing the improvement contract.

6

8. Course Standards

Unix/ Linux+ Powered by LPI (Exams LX0-101 and LX0-102) Objectives 101. System Architecture 101.1 Determine and configure hardware settings 101.2 Boot the system 101.3 Change run levels and shutdown or reboot system 102. Linux Installation and Package Management 102.1 Design hard disk layout 102.2 Install a boot manager 102.3 Manage shared libraries 102.4 Use Debian package management 102.5 Use RPM and YUM package management 103. GNU and Unix Commands 103.1 Work on the command line 103.2 Process text steams using filters 103.3 Perform basic file management 103.4 Use streams, pipes and directs 103.5 Create, monitor and kill processes 103.6 Modify process execution priorities 103.7 Search text files using regular expressions 103.8 Perform basic file editing operations using VI 104. Devices, Linux File systems, File system Hierarchy Standard 104.1 Create partitions and file systems 104.2 Maintain the integrity of file systems 104.3 Control mounting and un-mounting of file systems 104.4 Manage disk quotas 104.5 Manage file permissions and ownerships 104.6 Create and change hard and symbolic links 104.7 Find system files and place files in the correct location 105. Shells, Scripting and Data Management 105.1 Customize and use the shell environment 105.2 Customize or write simple scripts 105.3 SQL data management 106. User Interfaces and Desktops 106.1 Install and configure Xl I 106.2 Setup a display manager 106.3 Accessibility 107. Administrative Tasks 107.1 Manage user and group accounts and related system files 107.2 Automate system administration tasks by scheduling jobs 107.3 Localization and internationalization 108. Essential System Services

7

9. Course Outline

COURSE OUTLINE Week 1

Introduction

2

Using Linux

3 4

Installation and Localization Boot and Shutdown

5 to 6

User Interfaces and Desktops

7

Ethics of IT Security:

Software Installation

8 to 10

Users and Groups

11 to 13

Disk and File System Management

14

Hardware Installation

15

System Monitoring

16

Networking

17 to 18

10. SCANS Alignment

Topics

Security

Subject to change based on course length. 18 weeks=132 instructional hours which may be adjusted to school schedule http://www.unr.edu/k16/standard/scans.htm http://www.scois.net/Resources/UpdatedskillbuildSept06english.pdf http://www.jobweb.com/studentarticles.aspx?id=198&terms=second+interview http://www.bls.gov/oco/home.htm http://www.engr.ncsu.edu/learningstyles/ilsweb.html http://www.scois.net/Resources/ClusterPoster06-07.pdf Ten Rules of Computer Ethics I will not use a computer to harm other people. I will not interfere with other people's computer work. I will not snoop around in other people's computer files. I will not use a computer to steal. I will not use a computer to bear false witness. I will not copy or use proprietary software for which you have not paid. I will not use other people's computer resources without authorization or proper compensation. 8. I will not appropriate other people's intellectual output. 9. I will think about the social consequences of the program you are writing or the system you are designing. 10. I will always use a computer in ways that insure consideration and respect for your fellow humans. 1. 2. 3. 4. 5. 6. 7.

8