Download Information Technology

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Object-relational impedance mismatch wikipedia , lookup

Transcript
engineering & Technology
yo u r U C i n S i l i c o n Va l l e y
Information
Technology
UCSC Silicon Valley Extension’s Information Technology
Certificate features rich offerings in networking
fundamentals, Linux system administration, data center
technology and cloud computing, virtualization, storage
networking, security technologies, IT automation and database management. Select a few courses to suit your
professional needs or pursue our IT certificate to access new
job opportunities or advance in your career. This unique
program is the only IT-specific credential of its kind available
in Silicon Valley with University of California certification.
ucsc-extension.edu/
engineering
Cloud Computing, Introduction
Certificate in Information Technology
Curriculum
Certificate Requirements
Total: 14 units
Certificate students must take two of five core courses.
One related outside elective or “Also of Interest”
course outside the program may be counted toward
the certificate upon department approval.
GPA: 3.0 with a C or better in all courses.
Prerequisites
Students enrolled in this program are expected to be
familiar with the Internet, and possess basic knowledge of computer networking and communications.
Students should be familiar with at least one modern
computer operating system. Many of the courses in
this program have specific prerequisites that are listed
in the course descriptions.
Recommended Course Sequence
For those new to IT, we recommend that you begin
with Network Fundamentals courses, such as “Computer Networking Essentials” and “TCP/IP Essentials”.
To gain a solid understanding of the entire industry,
students should consider taking all fundamental
courses, though they are not required. For those on the
Linux Administration track, we recommend you take
courses in the order listed. For those interested in Data
Center Technologies and Systems Security, courses may
be taken based on your interests and background.
Each advanced course has specific prerequisites that
you should consider before enrolling.
Program Contact
Engineering and Technology Department,
(408) 861-3860 or email
[email protected]
* Choose two of these five core courses from different tracks.
UnitsCourse
Network Fundamentals
*Computer Networking Essentials............... 3.0.........2458
TCP/IP Essentials........................................ 2.0.........0661
Switching and Routing.............................. 3.0.........2226
Wireless and Mobile Communications,
Introduction............................................... 3.0.........5455
Linux System Administration
Linux, Introduction..................................... 2.5.........2215
*Linux System and
Network Administration............................ 3.0.......13515
Linux System Performance in the Cloud
and Data Centers....................................... 3.0.........5632
Linux Systems Programming...................... 3.0.........3493
*Relational Database Design
and SQL Programming............................... 3.0.......30215
Python for Programmers............................ 3.0.........3064
Perl Programming, Comprehensive............ 2.0.........2110
This course introduces the concepts and technologies involved in cloud computing, which refers to
scalable and virtualized computing over the Internet.
The course surveys technologies deployed by Amazon,
Google, Microsoft, and various academic and opensource providers. It explains how cloud computing
services can provide on-demand access to data
storage, computing resources, and messaging. You’ll
also learn about the enabling technologies (Web 2.0,
virtualization, grid and utility computing) that comprise
the infrastructure behind a cloud computing service.
You’ll get to examine case studies and technicalbusiness models.
Course 22413
Computer, Network and Internet
Security Fundamentals
*
This foundation course in computer, network and
Internet security provides an in-depth discussion of traditional security domains, and examines the evolving
security-threat environment and the tools, techniques,
and mitigations available to all types of enterprises
and home users. You’ll also learn about malware, security protocols, firewalls and remote access, biometrics,
virtual private networks, architecture defense, security
policy, regulatory issues, and voice over IP (VoIP)
security issues. Instruction consists of lecture, lab,
examples, and demonstrations of tools and techniques.
Course 4100
Data Center Technologies
*System Virtualization Fundamentals.......... 2.5.......30032
Storage Technology in Data Centers.......... 3.0.......30029
Cloud Computing, Introduction................. 0.5.......22413
Programming for Cloud Computing:
Amazon Web Services................................ 2.0.......23094
VMware vSphere:
Configuration and Management............... 3.5.......30027
Designing Networks and Systems
for High Availability................................... 3.0.........4577
IO Concepts and Protocols:
PCI Express, Ethernet, and Fibre Channel... 3.0.......22177
Computer Networking Essentials
*
This course introduces computer networking,
networking technologies, and the Internet, and
explores the technical areas in data communications,
wide-area networking, local-area networking, and
protocol design. You will gain a strong foundation
in networking protocols, hardware, cabling, industry
standards, and connectivity solutions. Topics include
the OSI and TCP/IP models of Internet-working;
physical layer fundamentals; connectors and cabling;
the network, transport, and upper layers; and network
management techniques and technologies.
Course 2458
Systems and Internet Security
*Computer, Network and
Internet Security Fundamentals................. 3.0.........4100
Enrollment Information
Intrusion Detection.................................... 3.0........ 2265
Visit ucsc-extension.edu/engineering for
the most up-to-date information about our
courses and programs, including textbooks,
instructors, schedules and locations.
Mobile Payments, e-Commerce Security,
and Cryptocurrency.................................... 3.0.......30319
Cryptography and Network Security.......... 2.0.......19950
Copyright © 2015 The Regents of the University of California. All rights reserved.
Not printed or mailed at state expense. 611796-1502-2083 (5/15/15)
Info
Info Session for Information Technology and Database and Data Analytics
Join us to learn about our Information Technology and the Database and Data Analytics certificate programs. The IT certificate includes tracks on
Session
networking fundamentals, data center technologies, system administration, enterprise security and IT automation. The Database and Data Analytics
certificate offers basic database courses, as well as data science, Big Data and business intelligence. In addition to general Q&A, program staff will be
available to answer your questions, help you select courses and plan a course sequence. Register early to reserve your space.
Course 30047
To learn more, visit ucsc-extension.edu/events.
Cryptography and Network Security
Linux, Introduction
Linux Systems Programming
This course provides intensive coverage of cryptography. You will learn how cryptosystems are designed
and how to match cryptosystems with an applications
needs. You will also learn basic cryptanalysis and
real life breaches of common cryptosystems to better
understand the dangers of faulty design. You will use
open-source cryptographic tools in a lab environment
to reinforce the principles and techniques learned
in the course.
This course introduces the Linux operating system.
Linux is gaining popularity on personal computers,
devices, embedded systems and enterprise servers.
The course gives you an opportunity to use Linux for
personal or professional purposes. You’ll learn basic
Linux administration, Linux file and directory structure,
basic network configuration, shell programming, and
various utilities available in Linux. The course provides
a hands-on approach for learning Linux through
assignments and projects.
System calls are functions from within a C program
which provide access to the lowest level resources of
an OS. This course will enable C programmers to
understand and implement standard utilities (e.g. ls,
wc, cat). It provides a strong foundation in the
concepts, functional interfaces and topics related to
I/O control, file systems, access, docking, signal
handling, process and threads management, IPC
using pipes and TCP/UDP sockets. You’ll also discuss
makefiles, man pages and rpm packaging utilities, the
development of a complete ftp package, including
client-side interface and server-side components.
Course 19950
Designing Networks and Systems for
High Availability
This course introduces key high-availability solutions
and technologies, including DNS round-robin, network
appliance load balancing, SSL acceleration, server
multi-homing, Web caching, RAIDs, virtual machines,
database disbursement, and sparing strategies. You will
learn current practices, developing industry trends, and
strategies for designing complex networking systems
and meeting the demands of real-world design.
Course 4577
Intrusion Detection
Because hacking and the loss of sensitive company
data gets worse every year, enterprises need security
professionals who have the technical knowledge,
awareness, and understanding of the latest security
threats. This course covers malware, attack mechanisms and recent attacks, such as Stuxnet, Flame, Zeus,
and Aurora. You’ll review the anatomy of an attack,
including several recent successful Advanced Persistent
Threat attacks against large companies, and examine
threats to mobile devices. The course offers hands-on
lab experience with open source and commercial
security tools to analyze malware.
Course 2265
IO Concepts and Protocols: PCI Express,
Ethernet, and Fibre Channel
This course focuses on IO technologies, and walks
students through the complexities of IO subsystems in
modern computers, and the networking and storage
subsystems to which they are attached. After an
introduction to the basic concepts of IO, we will delve
into the details of PCI Express, Ethernet and Fibre
Channel. Discussions include operation, protocols, and
an exploration of how these technologies work. We
will follow an applications IO request from the system
call to when the data actually makes it out of the wire.
Course 22177
Course 2215
Linux System and Network
Administration
*
Course 3493
This course provides the foundation for building and
maintaining a server for Linux professionals and
system administrators in a business environment.
The course focuses on basic network configuration,
services security, remote access configuration and
administration of a Linux server. You’ll perform basic
administrative tasks for users, file systems, security
policy, shell and Perl scripts, and network facilities such
as NFS, DNS and DHCP. By the end of the course, you’ll
be able to administer and manage networked services
on Linux-based platforms in a business environment.
Course 13515
Linux System Performance in the Cloud
and Data Center
This course covers Linux workload characterization,
system profiling, performance management and
benchmarking in the cloud and data centers,
beginning with measurement and tuning concepts.
It reviews how the components of Linux kernel and
application API interact and work together seamlessly
as scalable solutions. You will learn how to identify
resource contention issues and how to simulate
production workload for problem isolation and benchmarking. You will gain hands-on experience using the
rich set of basic and advanced monitoring and tracing
tools offered by Linux.
Course 5632
Mobile Payments, e-Commerce Security,
and Cryptocurrency
This introductory course covers advancements in
mobile payment and transaction security and will help
you engage in platform and application development
or pursue new market opportunities. You’ll learn the
fundamentals of secure chip-card processing mandated
by the major payment brands. The course emphasizes
the pros and cons of Near Field Communication
(NFC), secure element, Host Card Emulation (HCE),
Bluetooth, QR codes, tokens and eWallets. You’ll learn
about online security risks such as Heartbleed; fraud
prevention methods, biometrics, cloud-based security
and Fast Identification Online (FIDO); and the role of
cryptocurrency and future trends.
Course 30319
Perl Programming, Comprehensive
This comprehensive hands-on course covers all the
basic Perl syntax and programming constructs.
You will develop programs in class and as homework
assignments. In addition to the basics, the course
covers the file handle, filters, testing and system
interface and introduces the object-oriented features
in Perl, standard libraries, and how to package and
modularize Perl programs. By the end of course, you
will be able to develop sophisticated Perl scripts in
several applications.
Course 2110
Courses continue on reverse…
Course Planning Session for Engineering and Technology Students
Join us for a complimentary course planning session designed for new or returning
Engineering and Technology students. If you’re interested in enrolling in a certificate program,
this is an excellent opportunity to get your questions answered. In one-on-one sessions,
department staff will validate your assumptions, address common course sequence
questions, and suggest alternatives. We recommend that you first attend an Info Session to
learn program basics and develop a draft course plan. Register early to reserve your slot.
Course 30371
Programming for Cloud Computing:
Amazon Web Services
This course reviews cloud computing that focuses
on Infrastructure-as-a-Service (IaaS). Discussions
will address the various AWS computing, storage,
database, networking, messaging, monitoring and
deployment services as well as APIs, including EC2,
Auto-Scaling, EBS, S3, SimpleDB, RDS, ElastiCache,
Load Balancing, VPC, SQS, SNS, SES, CloudWatch, and
Beanstalk. You will design, code and deploy a cloudfocused tool or application in an in-class project, and
learn the concepts and programming techniques used
by both IT professionals and application developers.
Course 23094
Python for Programmers
Because of its clear and elegant syntax, dynamic
typing, automatic memory management, and
straight-forward module architecture, Python enhances
program correctness and increases efficiency. Its code
is easy to read, write, extend, and modify. This labbased course builds proficiency in Python, and the
knowledge using task-specific Python libraries. Topics
include the Python environment and code introspection, syntax, flow control, function protocols, exception
handling and functional programming. You’ll also learn
about object-oriented features, classes, inheritance
and overriding, as well as building applications,
packages, and libraries.
Course 3064
Relational Database Design and SQL
Programming
*
This course covers the concepts and design for
Relational Database Management Systems (RDMS)
and the Structured Query Language (SQL) needed
to define and manipulate data. You will learn how
to create conceptual, logical and physical designs of
relational databases. You will use an Oracle database
to design the entity-relationship diagrams (ERD) and
implement a working database. The course covers
methods for producing readable output, creating
and manipulating tables and creating and managing
constraints using SQL. The concepts and SQL language
learned here apply to all major RDBMS.
Course 30215
Storage Technology in Data Centers
TCP/IP Essentials
This course explores the storage technologies needed
to meet the challenges of data centers and introduces
the building blocks of enterprise storage such as SAN
and DAS. It demystifies the technology and the
business aspects of storage performance, replication,
backup, recovery, tiering and SLA. You will learn about
storage and server virtualization environments and
how to establish a baseline for performance, capacity
and power criteria. The course also covers the blueprint of cloud computing and the implementation of
public, private and hybrid cloud storage.
TCP/IP is the primary protocol for connectivity on
the Internet and enterprise networks. This course
presents an overview of the TCP/IP protocol suite,
IP addressing, and subnetting. You will also learn
about routing concepts, planning and configuring IP
address assignments, name-resolution processing,
and troubleshooting.
Course 30029
Switching and Routing
Bridges, switches, and routers comprise the foundational hardware that make up layers 2 and 3. This
course focuses on the operation of devices, protocols,
and algorithms that make these layers interoperate.
The course is taught using Cisco routers and switches
in the lab. You will gain hands-on experience working
with operational premises, algorithmic decisions,
configuring routing protocols and troubleshooting
the network.
Course 2226
System Virtualization Fundamentals
*
In this course, you will learn the basic concepts of
virtualization and how it is applied to CPUs and
operating systems, networks, and storage systems.
The course covers hardware virtualization and
Hypervisors for applications in computer systems.
For network virtualization, it addresses virtual LANs,
virtual SANs, WAN acceleration, network access
control, server load balancing and firewall virtualization. In the area of storage virtualization, discussions
cover concepts and deployment at the device
block, file system levels, and more.
Course 30032
Course 0661
VMware vSPHERE: Configuration and
Management
This course includes lectures and hands-on labs covering the installation, configuration, and management
of VMware ESXi and vCenter Server. In hands-on lab
sessions, you will have your own ESXi server, vCenter
Server, and SAN storage to create standard and distributed virtual switches, establish storage access, and
apply access controls. Virtual machines are created and
used for resource monitoring, vMotion, load balancing,
and high availability. This course can help prepare you
for the VMware Certified Professional 5 - Data Center
Virtualization (VCP5-DCV) exam and satisfies the
VCP5-DCV course requirement.
Course 30027
Wireless and Mobile Communications,
Introduction
This course builds an understanding of the various
wireless standards and techniques in use today.
The course reviews traditional amplitude modulation
(AM), frequency modulation (FM), and Single Side
Band (SSB). After covering the foundation technologies, present-day digital modulation schemes are
analyzed, including OFDM, TDMA and CDMA. You’ll
also learn about the current wireless standards,
including, but not limited to, Internet of Things (IoT),
IS-136, IS-95, Bluetooth, 3G, 4G, 802.11, and LTE.
Additional discussions address antenna and
transceiver design principles and implementation
in today’s mobile devices.
Course 5455