Jan 15, 2025  
2024-25 Catalog 
    
2024-25 Catalog
Add to Portfolio (opens a new window)

CIS 161 - Advanced Systems

5 Credits


This course introduces access control as applied to organizational domains, including the trust boundaries inherent to this infrastructure. Students explore the fundamentals of operating systems and the benefits of virtualization and public cloud environments.

Pre-requisite(s) CIS 160 min 2.0 and CIS 150 min 2.0
FeesAcademic Technology Fee

Quarters Typically Offered
Designed to Serve Students enrolled in CIS programs and industry professionals with computing experience.

 
Active Date 20240401T16:33:46

Grading Basis Decimal Grade
Class Limit 24
Shared Learning Environment Yes
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline

  1. Operating System Basics
    1. History
    2. Organization and Architecture
    3. User Interface
    4. Operating System Theory
    5. Files and file structure
    6. I/O Management
    7. Memory Management
  2. Virtual Machine Basics
  3. Cloud Basics
  4. Virtual Network Design and Maintenance
  5. Identity as a pillar of Information Security
  6. Managing directories and identities
  7. Virtualization on premises and virtualization in a public cloud
  8. Domain architectures, trust boundaries, and least privilege


Student Learning Outcomes
Explain virtualization, hypervisor technologies, and cloud computing.

Recommend appropriate technologies based on business needs.

Configure the different types of virtual network interfaces.

Design and build a domain and security management plan.

Describe the role and basic functions of an operating system, and how operating systems interact with hardware and software applications.

Identify and describe basic security issues of operating systems.

Given a specific scenario, identify the design principles involved or needed, and identify security failures that result from violations of design principles.

Explain the interaction between security and system usability and the importance for minimizing the effects of security mechanisms.



Add to Portfolio (opens a new window)