Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
engineering & Technology yo u r U C i n S i l i c o n Va l l e y Information Technology UCSC Silicon Valley Extension’s Information Technology Certificate features rich offerings in networking fundamentals, Linux system administration, data center technology and cloud computing, virtualization, storage networking, security technologies, IT automation and database management. Select a few courses to suit your professional needs or pursue our IT certificate to access new job opportunities or advance in your career. This unique program is the only IT-specific credential of its kind available in Silicon Valley with University of California certification. ucsc-extension.edu/ engineering Cloud Computing, Introduction Certificate in Information Technology Curriculum Certificate Requirements Total: 14 units Certificate students must take two of five core courses. One related outside elective or “Also of Interest” course outside the program may be counted toward the certificate upon department approval. GPA: 3.0 with a C or better in all courses. Prerequisites Students enrolled in this program are expected to be familiar with the Internet, and possess basic knowledge of computer networking and communications. Students should be familiar with at least one modern computer operating system. Many of the courses in this program have specific prerequisites that are listed in the course descriptions. Recommended Course Sequence For those new to IT, we recommend that you begin with Network Fundamentals courses, such as “Computer Networking Essentials” and “TCP/IP Essentials”. To gain a solid understanding of the entire industry, students should consider taking all fundamental courses, though they are not required. For those on the Linux Administration track, we recommend you take courses in the order listed. For those interested in Data Center Technologies and Systems Security, courses may be taken based on your interests and background. Each advanced course has specific prerequisites that you should consider before enrolling. Program Contact Engineering and Technology Department, (408) 861-3860 or email [email protected] * Choose two of these five core courses from different tracks. UnitsCourse Network Fundamentals *Computer Networking Essentials............... 3.0.........2458 TCP/IP Essentials........................................ 2.0.........0661 Switching and Routing.............................. 3.0.........2226 Wireless and Mobile Communications, Introduction............................................... 3.0.........5455 Linux System Administration Linux, Introduction..................................... 2.5.........2215 *Linux System and Network Administration............................ 3.0.......13515 Linux System Performance in the Cloud and Data Centers....................................... 3.0.........5632 Linux Systems Programming...................... 3.0.........3493 *Relational Database Design and SQL Programming............................... 3.0.......30215 Python for Programmers............................ 3.0.........3064 Perl Programming, Comprehensive............ 2.0.........2110 This course introduces the concepts and technologies involved in cloud computing, which refers to scalable and virtualized computing over the Internet. The course surveys technologies deployed by Amazon, Google, Microsoft, and various academic and opensource providers. It explains how cloud computing services can provide on-demand access to data storage, computing resources, and messaging. You’ll also learn about the enabling technologies (Web 2.0, virtualization, grid and utility computing) that comprise the infrastructure behind a cloud computing service. You’ll get to examine case studies and technicalbusiness models. Course 22413 Computer, Network and Internet Security Fundamentals * This foundation course in computer, network and Internet security provides an in-depth discussion of traditional security domains, and examines the evolving security-threat environment and the tools, techniques, and mitigations available to all types of enterprises and home users. You’ll also learn about malware, security protocols, firewalls and remote access, biometrics, virtual private networks, architecture defense, security policy, regulatory issues, and voice over IP (VoIP) security issues. Instruction consists of lecture, lab, examples, and demonstrations of tools and techniques. Course 4100 Data Center Technologies *System Virtualization Fundamentals.......... 2.5.......30032 Storage Technology in Data Centers.......... 3.0.......30029 Cloud Computing, Introduction................. 0.5.......22413 Programming for Cloud Computing: Amazon Web Services................................ 2.0.......23094 VMware vSphere: Configuration and Management............... 3.5.......30027 Designing Networks and Systems for High Availability................................... 3.0.........4577 IO Concepts and Protocols: PCI Express, Ethernet, and Fibre Channel... 3.0.......22177 Computer Networking Essentials * This course introduces computer networking, networking technologies, and the Internet, and explores the technical areas in data communications, wide-area networking, local-area networking, and protocol design. You will gain a strong foundation in networking protocols, hardware, cabling, industry standards, and connectivity solutions. Topics include the OSI and TCP/IP models of Internet-working; physical layer fundamentals; connectors and cabling; the network, transport, and upper layers; and network management techniques and technologies. Course 2458 Systems and Internet Security *Computer, Network and Internet Security Fundamentals................. 3.0.........4100 Enrollment Information Intrusion Detection.................................... 3.0........ 2265 Visit ucsc-extension.edu/engineering for the most up-to-date information about our courses and programs, including textbooks, instructors, schedules and locations. Mobile Payments, e-Commerce Security, and Cryptocurrency.................................... 3.0.......30319 Cryptography and Network Security.......... 2.0.......19950 Copyright © 2015 The Regents of the University of California. All rights reserved. Not printed or mailed at state expense. 611796-1502-2083 (5/15/15) Info Info Session for Information Technology and Database and Data Analytics Join us to learn about our Information Technology and the Database and Data Analytics certificate programs. The IT certificate includes tracks on Session networking fundamentals, data center technologies, system administration, enterprise security and IT automation. The Database and Data Analytics certificate offers basic database courses, as well as data science, Big Data and business intelligence. In addition to general Q&A, program staff will be available to answer your questions, help you select courses and plan a course sequence. Register early to reserve your space. Course 30047 To learn more, visit ucsc-extension.edu/events. Cryptography and Network Security Linux, Introduction Linux Systems Programming This course provides intensive coverage of cryptography. You will learn how cryptosystems are designed and how to match cryptosystems with an applications needs. You will also learn basic cryptanalysis and real life breaches of common cryptosystems to better understand the dangers of faulty design. You will use open-source cryptographic tools in a lab environment to reinforce the principles and techniques learned in the course. This course introduces the Linux operating system. Linux is gaining popularity on personal computers, devices, embedded systems and enterprise servers. The course gives you an opportunity to use Linux for personal or professional purposes. You’ll learn basic Linux administration, Linux file and directory structure, basic network configuration, shell programming, and various utilities available in Linux. The course provides a hands-on approach for learning Linux through assignments and projects. System calls are functions from within a C program which provide access to the lowest level resources of an OS. This course will enable C programmers to understand and implement standard utilities (e.g. ls, wc, cat). It provides a strong foundation in the concepts, functional interfaces and topics related to I/O control, file systems, access, docking, signal handling, process and threads management, IPC using pipes and TCP/UDP sockets. You’ll also discuss makefiles, man pages and rpm packaging utilities, the development of a complete ftp package, including client-side interface and server-side components. Course 19950 Designing Networks and Systems for High Availability This course introduces key high-availability solutions and technologies, including DNS round-robin, network appliance load balancing, SSL acceleration, server multi-homing, Web caching, RAIDs, virtual machines, database disbursement, and sparing strategies. You will learn current practices, developing industry trends, and strategies for designing complex networking systems and meeting the demands of real-world design. Course 4577 Intrusion Detection Because hacking and the loss of sensitive company data gets worse every year, enterprises need security professionals who have the technical knowledge, awareness, and understanding of the latest security threats. This course covers malware, attack mechanisms and recent attacks, such as Stuxnet, Flame, Zeus, and Aurora. You’ll review the anatomy of an attack, including several recent successful Advanced Persistent Threat attacks against large companies, and examine threats to mobile devices. The course offers hands-on lab experience with open source and commercial security tools to analyze malware. Course 2265 IO Concepts and Protocols: PCI Express, Ethernet, and Fibre Channel This course focuses on IO technologies, and walks students through the complexities of IO subsystems in modern computers, and the networking and storage subsystems to which they are attached. After an introduction to the basic concepts of IO, we will delve into the details of PCI Express, Ethernet and Fibre Channel. Discussions include operation, protocols, and an exploration of how these technologies work. We will follow an applications IO request from the system call to when the data actually makes it out of the wire. Course 22177 Course 2215 Linux System and Network Administration * Course 3493 This course provides the foundation for building and maintaining a server for Linux professionals and system administrators in a business environment. The course focuses on basic network configuration, services security, remote access configuration and administration of a Linux server. You’ll perform basic administrative tasks for users, file systems, security policy, shell and Perl scripts, and network facilities such as NFS, DNS and DHCP. By the end of the course, you’ll be able to administer and manage networked services on Linux-based platforms in a business environment. Course 13515 Linux System Performance in the Cloud and Data Center This course covers Linux workload characterization, system profiling, performance management and benchmarking in the cloud and data centers, beginning with measurement and tuning concepts. It reviews how the components of Linux kernel and application API interact and work together seamlessly as scalable solutions. You will learn how to identify resource contention issues and how to simulate production workload for problem isolation and benchmarking. You will gain hands-on experience using the rich set of basic and advanced monitoring and tracing tools offered by Linux. Course 5632 Mobile Payments, e-Commerce Security, and Cryptocurrency This introductory course covers advancements in mobile payment and transaction security and will help you engage in platform and application development or pursue new market opportunities. You’ll learn the fundamentals of secure chip-card processing mandated by the major payment brands. The course emphasizes the pros and cons of Near Field Communication (NFC), secure element, Host Card Emulation (HCE), Bluetooth, QR codes, tokens and eWallets. You’ll learn about online security risks such as Heartbleed; fraud prevention methods, biometrics, cloud-based security and Fast Identification Online (FIDO); and the role of cryptocurrency and future trends. Course 30319 Perl Programming, Comprehensive This comprehensive hands-on course covers all the basic Perl syntax and programming constructs. You will develop programs in class and as homework assignments. In addition to the basics, the course covers the file handle, filters, testing and system interface and introduces the object-oriented features in Perl, standard libraries, and how to package and modularize Perl programs. By the end of course, you will be able to develop sophisticated Perl scripts in several applications. Course 2110 Courses continue on reverse… Course Planning Session for Engineering and Technology Students Join us for a complimentary course planning session designed for new or returning Engineering and Technology students. If you’re interested in enrolling in a certificate program, this is an excellent opportunity to get your questions answered. In one-on-one sessions, department staff will validate your assumptions, address common course sequence questions, and suggest alternatives. We recommend that you first attend an Info Session to learn program basics and develop a draft course plan. Register early to reserve your slot. Course 30371 Programming for Cloud Computing: Amazon Web Services This course reviews cloud computing that focuses on Infrastructure-as-a-Service (IaaS). Discussions will address the various AWS computing, storage, database, networking, messaging, monitoring and deployment services as well as APIs, including EC2, Auto-Scaling, EBS, S3, SimpleDB, RDS, ElastiCache, Load Balancing, VPC, SQS, SNS, SES, CloudWatch, and Beanstalk. You will design, code and deploy a cloudfocused tool or application in an in-class project, and learn the concepts and programming techniques used by both IT professionals and application developers. Course 23094 Python for Programmers Because of its clear and elegant syntax, dynamic typing, automatic memory management, and straight-forward module architecture, Python enhances program correctness and increases efficiency. Its code is easy to read, write, extend, and modify. This labbased course builds proficiency in Python, and the knowledge using task-specific Python libraries. Topics include the Python environment and code introspection, syntax, flow control, function protocols, exception handling and functional programming. You’ll also learn about object-oriented features, classes, inheritance and overriding, as well as building applications, packages, and libraries. Course 3064 Relational Database Design and SQL Programming * This course covers the concepts and design for Relational Database Management Systems (RDMS) and the Structured Query Language (SQL) needed to define and manipulate data. You will learn how to create conceptual, logical and physical designs of relational databases. You will use an Oracle database to design the entity-relationship diagrams (ERD) and implement a working database. The course covers methods for producing readable output, creating and manipulating tables and creating and managing constraints using SQL. The concepts and SQL language learned here apply to all major RDBMS. Course 30215 Storage Technology in Data Centers TCP/IP Essentials This course explores the storage technologies needed to meet the challenges of data centers and introduces the building blocks of enterprise storage such as SAN and DAS. It demystifies the technology and the business aspects of storage performance, replication, backup, recovery, tiering and SLA. You will learn about storage and server virtualization environments and how to establish a baseline for performance, capacity and power criteria. The course also covers the blueprint of cloud computing and the implementation of public, private and hybrid cloud storage. TCP/IP is the primary protocol for connectivity on the Internet and enterprise networks. This course presents an overview of the TCP/IP protocol suite, IP addressing, and subnetting. You will also learn about routing concepts, planning and configuring IP address assignments, name-resolution processing, and troubleshooting. Course 30029 Switching and Routing Bridges, switches, and routers comprise the foundational hardware that make up layers 2 and 3. This course focuses on the operation of devices, protocols, and algorithms that make these layers interoperate. The course is taught using Cisco routers and switches in the lab. You will gain hands-on experience working with operational premises, algorithmic decisions, configuring routing protocols and troubleshooting the network. Course 2226 System Virtualization Fundamentals * In this course, you will learn the basic concepts of virtualization and how it is applied to CPUs and operating systems, networks, and storage systems. The course covers hardware virtualization and Hypervisors for applications in computer systems. For network virtualization, it addresses virtual LANs, virtual SANs, WAN acceleration, network access control, server load balancing and firewall virtualization. In the area of storage virtualization, discussions cover concepts and deployment at the device block, file system levels, and more. Course 30032 Course 0661 VMware vSPHERE: Configuration and Management This course includes lectures and hands-on labs covering the installation, configuration, and management of VMware ESXi and vCenter Server. In hands-on lab sessions, you will have your own ESXi server, vCenter Server, and SAN storage to create standard and distributed virtual switches, establish storage access, and apply access controls. Virtual machines are created and used for resource monitoring, vMotion, load balancing, and high availability. This course can help prepare you for the VMware Certified Professional 5 - Data Center Virtualization (VCP5-DCV) exam and satisfies the VCP5-DCV course requirement. Course 30027 Wireless and Mobile Communications, Introduction This course builds an understanding of the various wireless standards and techniques in use today. The course reviews traditional amplitude modulation (AM), frequency modulation (FM), and Single Side Band (SSB). After covering the foundation technologies, present-day digital modulation schemes are analyzed, including OFDM, TDMA and CDMA. You’ll also learn about the current wireless standards, including, but not limited to, Internet of Things (IoT), IS-136, IS-95, Bluetooth, 3G, 4G, 802.11, and LTE. Additional discussions address antenna and transceiver design principles and implementation in today’s mobile devices. Course 5455