Top of page
Skip to main content
COVID-19 Information: Masks are required indoors on PCC campuses and in centers. Learn more on the COVID-19 & Updates Page.
Man in IT server room

Outcomes

Networking/Cyber Defense AAS

Learning Outcomes

Upon successful completion of the Networking /Cyber Defense AAS program, the learner will be able to:

  1. List the 7 layers of the OSI Reference Model and provide specific examples of protocols/concepts used at each layer. List 4 layers of the TCP/IP Protocol Suite and compare the two Models.
  2. Troubleshoot software and hardware problems on a personal computer (PC), install new PC component; develop skills required to research hardware components and their associated software drivers.
  3. Design a class A, B, or C  IPv4 networking scheme and be able to subnet the network based upon requirements for number of networks and number of hosts required.
  4. Based upon requirements, design a logical network(s), including IP networking scheme and placement of network services (e.g., DNS, DHCP, and Printing).
  5. Install, configure, and troubleshoot a Linux Operating System on a PC.
  6. Configure routers and switches to perform routing and maintain virtual LANs (VLANs) in a logical network.
  7. Configure and maintain Active Directory (AD) in a networked environment.
  8. Install, configure, and maintain a Windows OS (Operating System) on a PC.
  9. Configure & troubleshoot services (e.g., DNS, DHCP, routing, printing) in a networked environment.
  10. Given a network problem, develop a plan, use internet research, define options, and provide options for further study, leading to a problem solution.
  11. Explain the architecture for computer file storage systems (e.g., FAT), the process of how data is stored on a computer as binary code, and how the operating system or other programs locate files/information and interpret binary data.
  12. Discuss the need for data encryption, compare and contrast general encryption methods (e.g., Private vs. Public Key Encryption), and explain how hashing algorithms work in storing & protecting passwords & how the hashing process relates to the strength of a password.
  13. Compare and contrast malware types and anti-malware software used in the protection of computers and smart devices.

Program Information

«  Program

Back to main content Back to top