Sep 07, 2024  
Catalog 2024-2025 
    
Catalog 2024-2025

CIS 278 Data Communications


Lecture Hours: 4
Credits: 4

Examines computer networks and fundamental concepts in data communication including definition of terms, communicating concepts, comparison of voice and data communication, encapsulation and encryption, medium access, elementary data link protocols, topologies, servers, and operating system standards implemented in local area and wide area networks (LAN and WAN). Uses hands-on software activities related to protocols, switching, routing, and peer-to-peer networking. Students use the course materials as resources for preparing for the Network + industry certification exam.

Prerequisite: CIS 120  with a grade of C or better; or consent of instructor.
Student Learning Outcomes:
  1. Describe the various Network Topologies, encapsulation process, and signaling technologies defined by common Network Protocols and services.
  2. Differentiate the correct cabling technology required, including but not limited to, Twisted Pair, COAX, Fiber Optic, and the tools required to build and maintain each type.
  3. Demonstrate the ability to identify and install commonly utilized Network adapters, hubs, routers and switches.
  4. Explain the various Ethernet Protocol industry specifications and their implementation in a Local Area Network (LAN, and Wide Area Network (WAN); Utilize TCP/IP binary (base 2 and Decimal (Base 10) mathematics used to define and secure a typical Local Area network (LAN).
  5. Plan and configure a typical LAN switch, including but not limited to, Virtual LANs (VLans), Trunking, Spanning Tree, and switch port access/security. 
  6. Plan and configure a typical Router, including but not limited to, Network Address Translation (NAT), Route Optimization, Port Forwarding, OSPF and Static routing. 
  7. Identify the networking firewall hardware devices essential to planning and implementing a secure Local Area network (LAN). 
  8. Define and configure Virtual Machines, Virtual Networks using local and Cloud based technologies, Access Control Lists on the appropriate network device type, and remote management secure solutions for both local and wireless devices. 
  9. Develop a set of organizational policies for best practice procedures involving hardware performance, risk management, and security assessment. 
  10. Plan and configure an organizational policy for network vulnerability Detection and Prevention testing; use forensic tools to troubleshoot potentially infected networks.


Content Outline
  • Networking Basics
  • Cabling, Standards and Connectors
  • Networking Devices
  • Ethernet Standards TCP/IP Protocol Stack
  • Switch Management
  • Routing Fundamentals
  • Firewall Appliances and Security
  • Virtualized Networking and Cloud Computing
  • Network Design, Documentation, and Risk Management
  • Network Hardening and Optimization