Jun 26, 2024  
Course/Program Inventory 
    
Course/Program Inventory

ITT 1070 - Computer Hardware and Software II



Clock Hours: 205

Prerequisites: ITT 1060 -Computer Hardware and Software I

Course Description:
The Computer Hardware and Software II course will teach students fundamentals of Windows operating systems, other operating systems such as Linux, security fundamentals, software troubleshooting and operational procedures for customer support.

Student Learning Outcomes:
  1. Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
  2. Install Windows PC operating systems using appropriate methods.
  3. Apply appropriate Microsoft command line tools.
  4. Use appropriate Microsoft operating system features and tools.
  5. Use appropriate Microsoft operating system features and tools.
  6. Install and configure Windows networking on a client/desktop.
  7. Perform common preventive maintenance procedures using the appropriate Windows OS tools.
  8. Identify common features and functionality of the Mac OS and Linux operating systems.
  9. Set up and use client-side virtualization.
  10. Identify basic cloud concepts.
  11. Summarize the properties and purpose of services provided by networked hosts.
  12. Identify basic features of mobile operating systems.
  13. Install and configure basic mobile device network connectivity and email.
  14. Summarize methods and data related to mobile device synchronization.
  15. Identify common security threats and vulnerabilities.
  16. Identify common security threats and vulnerabilities.
  17. Compare and contrast differences of basic Windows OS security settings.
  18. Deploy and enforce security best practices to secure a workstation.
  19. Compare and contrast various methods for securing mobile devices.
  20. Use appropriate data destruction and disposal methods.
  21. Secure SOHO wireless and wired networks.
  22. Troubleshoot PC operating system problems with appropriate tools.
  23. Troubleshoot common PC security issues with appropriate tools and best practices.
  24. Troubleshoot common mobile OS and application issues with appropriate tools.
  25. Troubleshoot common mobile OS and application security issues with appropriate tools.
  26. Use appropriate safety procedures.
  27. Given a scenario with potential environmental impacts, apply the appropriate controls.
  28. Summarize the process of addressing prohibited content/ activity, and explain privacy, licensing and policy concepts.
  29. Demonstrate proper communication techniques and professionalism.
  30. Explain the troubleshooting theory.