|
Jan 15, 2025
|
|
|
|
CIS 265 - WAN Technologies and VPN Security5 Credits CIS265 focuses on wide area network technologies, network services and network design criteria required by complex interconnected networks. This course enables students to evaluate various network devices and wide area network technologies to meet the corporate network requirements. Students learn how to select, deploy, configure, and troubleshoot various network devices and select appropriate network devices to design small to medium size corporate network. In addition, students will gain necessary skills to design and implement virtual private network (VPN) and IPSec operations in complex network. This course can be delivered on site or hybrid.
Pre-requisite(s) CIS 262 min 2.0 FeesCF
Quarters Typically Offered
Fall Day Winter Day
Designed to Serve Network Specialist and BAS in Cyber Security/Digital Forensic majors to add cutting edge technical and designing skills required for entry level Pre-Sales Support and entry-level Network engineer, Network Design jobs for medium to small enterprise business, network operating center, data center and health industry and government sector. Active Date 2014-03-26
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Field Studies 0 Clinical 0 Independent Studies 0 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline Describe Hierarchical Network Design
Connecting to WAN
Understand and describe different WAN technologies and their benefits
Understand and describe the operations and benefits of virtual private networks (VPNs) and tunneling
Configure and troubleshoot serial connections
Configure and troubleshoot broadband connections
Configure and troubleshoot IPSec tunneling operations
Monitor and troubleshoot network operations using syslog, SNMP, and NetFlow
Design network architectures:
- Borderless networks
- Data centers and virtualization
- Collaboration technology and solutions
Student Learning Outcomes Describe different WAN technologies and their benefits
Describe the operations and benefits of virtual private networks (VPNs) and tunneling
Configure and troubleshoot serial connections
Configure and troubleshoot broadband connections
Configure and troubleshoot IPsec tunneling operations
Monitor and troubleshoot network operations using syslog, SNMP, and NetFlow
Describe network architectures
Add to Portfolio (opens a new window)
|
|